SlideShare a Scribd company logo
Biometrics and its Hacking
Neel Parikh
3rd year CP
110110107020
Subtopics
• Introduction to the term Biometrics
• How it is connected to Computers..??
• Parameters
• How it works..??
• Applications
• Future of this field
• Conclusion
‘Biometrics’
Relation between BIOMETRICS and
COMPUTERS
• Authentication
• Make the work easier, faster
• Managing accounts and users with ease
Types based on characteristics
1. Physiological characteristics :
 Finger-Print
 Face recognition
 DNA
 Palm Print
 hand geometry
 Iris recognition
 odour/scent
2. Behavioural characteristics :
 Typing rhythm
 Gait
 Voice
Parameters
A.K. Bolle, R. Pankanti eds. (1999). Biometrics:
Personal Identification in Networked Society.
Kluwer Academic Publications
• Universality
• Uniqueness
• Permanence
• Measurability
• Performance
• Acceptability
• Circumvention
Biometrics and its hacking
How Templates are Generated???
Applications
• Industries, Offices
• Schools, Colleges, Classes
• Smart cards, Passports, License
• Residential security (Door locks etc.)
• Gun safe
• Cell phones
Attendance systems
Security purpose
Future
Biometrics and its hacking
Value Chain Market Sizing 2013-2017
($m USD X 10000)
0
1
2
3
4
5
6
2013 2014 2015 2016 2017
Biometrics Core
Technology
Technical Integrated
solution
Application/point solution
•Apple takes a Giant Leap in Future
“Biometrics”
•Intel's McAfee brings biometric authentication to cloud
storage
Companies in race for Biometrics
Conclusion
Biometrics is the safest and easiest way
for authentication and security. It has
its advantages as well as disadvantages
but finally it’s the newest and smartest
solution to security problems…
Questions???
Biometrics and its hacking
Biometrics and its Hacking
Neel Parikh
3rd year CP
110110107020
Summary
• Introduction to the term Biometrics
• How it is connected to Computers..??
• Parameters
• How it works..??
• Applications
• Future of this field
• Conclusion
Subtopics
• Brief introduction
• Major contributor
• Methods:
1) On basic level
2) On professional level
• Major Issues
• Conclusion
The 6th Day
•Science Fiction Action Thriller Movie
•Directed by Roger Spottiswoode
•Starring Arnold Schwarzenegger
iPhone 5S fingerprint sensor hacked
by Germany's Chaos Computer Club
Chaos Computer Club (CCC)
Europe's largest association of hackers.
Major Contributor
• Prof. Tsutomu Matsumoto
• “gummy finger” concept:
1)Direct experiment
2)Professional level
Required Material
Freeplastic used for finger print mold
Gelatin sheet used for gummy
finger
Creation of fingerprint mold
Creation of gummy finger
Professional Level
Creation of gummy finger from latent
fingerprint mold
Hacking from the another
point of view
• In another test of biometric security, an Australian National
University student was able to hack through the device
using the information stored within the system itself.
• Chris Hill worked on discovering the way the system stored
the template information and then created images that had
enough similar “features” of the desired fingerprint to trick
the device.
• He said, “Really all I had to do was crack the code of the
template, so the images I created that were accepted by
the security system did not even look like thumbprints they
just displayed the characteristics required by the computer
program.”
Major Issues
• Other issues needing discussion are: What
happens when the part of the body getting
validated is somehow damaged, such as a
finger getting badly burned or deeply cut Or if
someone does manage to create a fake
fingerprint from your finger, how is that issue
resolved, since a finger can’t be easily
changed like a password can?
CONCLUSION
Biometric devices have flaws, but so does every
other security hardware and software solution.
Biometric security measures offer such a strong
level of security, that they cannot be thrown out
or ignored simply because a few flaws have been
discovered. They need to be incorporated into an
organization’s already strong defence in depth.
Biometrics, especially in conjunction with
passwords or passcards, offers the level of
security that we need at this stage in the
development of information security…
Biometrics and its hacking
Biometrics and its hacking

More Related Content

PDF
Biometrics/fingerprint sensors
PPTX
Keystroke dynamics
DOCX
Biometric Authentication Technology - Report
PDF
Introduction of Biometrics
PPTX
Biometrics ppt
PPT
Ict Biometrics & Authentication
PPT
Biometrics ppt
PPT
Biometricstechnology in iot and machine learning
Biometrics/fingerprint sensors
Keystroke dynamics
Biometric Authentication Technology - Report
Introduction of Biometrics
Biometrics ppt
Ict Biometrics & Authentication
Biometrics ppt
Biometricstechnology in iot and machine learning

What's hot (20)

PPTX
Biometrics
PPTX
Biometrics
DOC
Biometrics poster
PPTX
biometrics
PPTX
Biometric Authentication PPT
DOC
Biometric technology
DOCX
Cover page
PPTX
PROJECT POWERPOINT
PPT
Biometric Sensors
DOCX
Final report
PPTX
Biometrics technology
PPTX
Biometrics For Security Systems
PPTX
Ppt on use of biomatrix in secure e trasaction
PPTX
Biometric of technology.ppt
PPTX
Biometricsppt
PPTX
Biometrics technology
PPTX
Biometrics Pros & cons
PPTX
Biometric authentication
PPTX
Biometrics Technology In the 21st Century
PPTX
Biometric security tech
Biometrics
Biometrics
Biometrics poster
biometrics
Biometric Authentication PPT
Biometric technology
Cover page
PROJECT POWERPOINT
Biometric Sensors
Final report
Biometrics technology
Biometrics For Security Systems
Ppt on use of biomatrix in secure e trasaction
Biometric of technology.ppt
Biometricsppt
Biometrics technology
Biometrics Pros & cons
Biometric authentication
Biometrics Technology In the 21st Century
Biometric security tech

Viewers also liked (20)

PPTX
Slide-show on Biometrics
PPT
Bio-metrics Technology
PPT
Biometric's final ppt
PPT
Biometric Security advantages and disadvantages
PDF
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
PDF
Pure-bending of curved bar
PPTX
Biometrics
PPTX
Biometrics
PDF
Biometric Technology Introduction
PPTX
Biometrics--The Technology of Tomorrow
PPTX
Biometric Technology
PPTX
Biometric Technology and Human Factor Engineering
PPT
Ict Security Measures
PPT
Biometric
PPT
Biometric
PPTX
Slideshare fintech-may26th-def
PPT
biometric technology
PPTX
Biometrics Technology, Types & Applications
PDF
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
PPSX
Biometrics Technology by Capt Awal
Slide-show on Biometrics
Bio-metrics Technology
Biometric's final ppt
Biometric Security advantages and disadvantages
Fingerprint Anti-Spoofing [ Talk in Stanford Nov. 2013]
Pure-bending of curved bar
Biometrics
Biometrics
Biometric Technology Introduction
Biometrics--The Technology of Tomorrow
Biometric Technology
Biometric Technology and Human Factor Engineering
Ict Security Measures
Biometric
Biometric
Slideshare fintech-may26th-def
biometric technology
Biometrics Technology, Types & Applications
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Biometrics Technology by Capt Awal

Similar to Biometrics and its hacking (20)

PPS
Ranjith_Bm
PPT
PPT
Biometric by amin
DOC
Poster on biometrics
PDF
Integration of Biometric authentication procedure in customer oriented paymen...
PPTX
Biometric security using cryptography
PDF
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
PDF
Biometrics
PDF
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
DOCX
Biometrics
PPTX
Biometrics Based Authentication AKASH
PPTX
Biometrics bbb dajhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Fingerprint Based Biometric ATM Authentication System
PDF
Biometrics Essay
DOCX
Cybersecurity governance-1.docx
PPTX
Biometric Systems and Security
DOCX
Fingerprint detection
PDF
Biometric technology 2023 report.pdf
PDF
International Journal of Engineering Research and Development (IJERD)
Ranjith_Bm
Biometric by amin
Poster on biometrics
Integration of Biometric authentication procedure in customer oriented paymen...
Biometric security using cryptography
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
Biometrics
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
Biometrics
Biometrics Based Authentication AKASH
Biometrics bbb dajhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
International Journal of Computational Engineering Research(IJCER)
Fingerprint Based Biometric ATM Authentication System
Biometrics Essay
Cybersecurity governance-1.docx
Biometric Systems and Security
Fingerprint detection
Biometric technology 2023 report.pdf
International Journal of Engineering Research and Development (IJERD)

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Mechanical Engineering MATERIALS Selection
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Digital Logic Computer Design lecture notes
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Internet of Things (IOT) - A guide to understanding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Embodied AI: Ushering in the Next Era of Intelligent Systems
Mechanical Engineering MATERIALS Selection
UNIT 4 Total Quality Management .pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
573137875-Attendance-Management-System-original
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Model Code of Practice - Construction Work - 21102022 .pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Foundation to blockchain - A guide to Blockchain Tech
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Digital Logic Computer Design lecture notes
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Internet of Things (IOT) - A guide to understanding

Biometrics and its hacking

  • 1. Biometrics and its Hacking Neel Parikh 3rd year CP 110110107020
  • 2. Subtopics • Introduction to the term Biometrics • How it is connected to Computers..?? • Parameters • How it works..?? • Applications • Future of this field • Conclusion
  • 4. Relation between BIOMETRICS and COMPUTERS • Authentication • Make the work easier, faster • Managing accounts and users with ease
  • 5. Types based on characteristics 1. Physiological characteristics :  Finger-Print  Face recognition  DNA  Palm Print  hand geometry  Iris recognition  odour/scent 2. Behavioural characteristics :  Typing rhythm  Gait  Voice
  • 6. Parameters A.K. Bolle, R. Pankanti eds. (1999). Biometrics: Personal Identification in Networked Society. Kluwer Academic Publications • Universality • Uniqueness • Permanence • Measurability • Performance • Acceptability • Circumvention
  • 8. How Templates are Generated???
  • 9. Applications • Industries, Offices • Schools, Colleges, Classes • Smart cards, Passports, License • Residential security (Door locks etc.) • Gun safe • Cell phones
  • 14. Value Chain Market Sizing 2013-2017 ($m USD X 10000) 0 1 2 3 4 5 6 2013 2014 2015 2016 2017 Biometrics Core Technology Technical Integrated solution Application/point solution
  • 15. •Apple takes a Giant Leap in Future “Biometrics” •Intel's McAfee brings biometric authentication to cloud storage
  • 16. Companies in race for Biometrics
  • 17. Conclusion Biometrics is the safest and easiest way for authentication and security. It has its advantages as well as disadvantages but finally it’s the newest and smartest solution to security problems…
  • 20. Biometrics and its Hacking Neel Parikh 3rd year CP 110110107020
  • 21. Summary • Introduction to the term Biometrics • How it is connected to Computers..?? • Parameters • How it works..?? • Applications • Future of this field • Conclusion
  • 22. Subtopics • Brief introduction • Major contributor • Methods: 1) On basic level 2) On professional level • Major Issues • Conclusion
  • 23. The 6th Day •Science Fiction Action Thriller Movie •Directed by Roger Spottiswoode •Starring Arnold Schwarzenegger
  • 24. iPhone 5S fingerprint sensor hacked by Germany's Chaos Computer Club Chaos Computer Club (CCC) Europe's largest association of hackers.
  • 25. Major Contributor • Prof. Tsutomu Matsumoto • “gummy finger” concept: 1)Direct experiment 2)Professional level
  • 26. Required Material Freeplastic used for finger print mold Gelatin sheet used for gummy finger
  • 30. Creation of gummy finger from latent fingerprint mold
  • 31. Hacking from the another point of view • In another test of biometric security, an Australian National University student was able to hack through the device using the information stored within the system itself. • Chris Hill worked on discovering the way the system stored the template information and then created images that had enough similar “features” of the desired fingerprint to trick the device. • He said, “Really all I had to do was crack the code of the template, so the images I created that were accepted by the security system did not even look like thumbprints they just displayed the characteristics required by the computer program.”
  • 32. Major Issues • Other issues needing discussion are: What happens when the part of the body getting validated is somehow damaged, such as a finger getting badly burned or deeply cut Or if someone does manage to create a fake fingerprint from your finger, how is that issue resolved, since a finger can’t be easily changed like a password can?
  • 33. CONCLUSION Biometric devices have flaws, but so does every other security hardware and software solution. Biometric security measures offer such a strong level of security, that they cannot be thrown out or ignored simply because a few flaws have been discovered. They need to be incorporated into an organization’s already strong defence in depth. Biometrics, especially in conjunction with passwords or passcards, offers the level of security that we need at this stage in the development of information security…