SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Biometrics
Agenda
I.
Video
II.
Biometric Overview
III.
Biometric Technologies
IV.
Accuracy Metrics
V.
BioPrivacy Concerns
by Alvaro E. Escobar

1
Biometrics
Agenda
I.
Video
II.
Biometric Overview
III.
Biometric Technologies
IV.
Accuracy Metrics
V.
BioPrivacy Concerns
by Alvaro E. Escobar

2
Biometrics
Agenda
I.
Video
II.
Biometric Overview
III.
Biometric Technologies
IV.
Accuracy Metrics
V.
BioPrivacy Concerns
by Alvaro E. Escobar

3
Biometrics
Definition:
“Automated measurement of Physiological
and/or behavioral characteristics to
determine or authenticate identity ”

by Alvaro E. Escobar

4
Biometrics
“Automated measurement”
No human involvement.
Comparison takes place in Real-Time.
–DNA is not a Biometric

by Alvaro E. Escobar

5
Biometrics
“Physiological and/or behavioral characteristics “
1.
Behavioral:
–
–
–

2.

User speaks.
Types on a keyboard.
Signs name.

–
–
–
–

Fingerprint
Hand
Eyes
Face

Physiological:

by Alvaro E. Escobar

6
Biometrics
“determine or authenticate identity ”
 Identification Systems:
–
–


Who am I?
Determine Identity

Verification Systems:
–
–

Am I who I claim to be?
Authenticate Identity
by Alvaro E. Escobar

7
Biometrics
“determine or authenticate identity ”
 Verification Systems (cont):
–
–
–
–
–

More accurate.
Less expensive.
Faster.
More limited in function.
Requires more effort by user.
by Alvaro E. Escobar

8
Biometrics


Benefits:

–

Security




–

Accountability



–
–

PC, Network, Web
Physical access to Buildings/Rooms
Audit Trails
Recordkeeping

Convenience
Savings

by Alvaro E. Escobar

9
Biometrics


Primary drivers:
–
–
–

Size and cost decreased.
Improved FAR, FRR & FTE
Mature standards



–

BioAPI
BAPI

Public awareness
by Alvaro E. Escobar

10
Biometrics
Agenda
I.
Video
II.
Biometric Overview
III.
Biometric Technologies
IV.
Accuracy Metrics
V.
BioPrivacy Concerns
by Alvaro E. Escobar

11
Biometrics
Identification and verification:



–
–
–
–

Finger scan
Iris scan
Retina scan
Facial scan (optical and infrared)

–
–
–
–

Hand Geometry
Voice Print
Keystroke Behavior
Signature

Verification only:





Other Biometric Technologies in the making.
by Alvaro E. Escobar

12
Biometrics
Finger scan: Measures unique
characteristics in a fingerprint (minutiae)



–
–
–
–
–
–
–

Crossover
Core
Bifurcations
Ridge ending
Island
Delta
Pore
by Alvaro E. Escobar

13
Biometrics


Iris scan: Measures unique
characteristics of the iris
–
–
–

Ridges (rings)
Furrows
Straitions (freckles)

by Alvaro E. Escobar

14
Biometrics


Retina scan:
Measures unique
characteristics of the retina.
–
–

Blood vessel patterns
Vein patterns

by Alvaro E. Escobar

15
Biometrics
Facial scan: Uses off-the-shelf camera to
measure the following facial features:



–
–
–
–
–

Distance between the eyes.
Distance between the eyes and nose ridge.
Angle of a cheek.
Slope of the nose.
Facial
Temperatures.

by Alvaro E. Escobar

16
Biometrics


Hand scan: measures the top and side
of the hand, not the Palm.
–
–
–

Hand Geometry.
Most widely used technique for physical
access.
INSpass system

by Alvaro E. Escobar

17
Biometrics


Voice scan: Measures the sound
waves of human speech.
–
–

user talks to a microphone a passphrase.
Voice print is compared
to a previous one

by Alvaro E. Escobar

18
Biometrics


Keystroke scan: Measures the time
between strokes and duration of key
pressed.
–

Most commonly used in systems where
keyboard is already being used.

by Alvaro E. Escobar

19
Biometrics


Signature scan: Measures speed,
pressure, stroke order an image of
signature.
–

Non-repudiation

by Alvaro E. Escobar

20
Biometrics


Biometric techniques still in the drawing
board
–
–

Vein scan : vein pattern in back of the
hand.
Lip movement : camera captures images
of how user lips move while user speaks a
passphrase.

by Alvaro E. Escobar

21
Biometrics

by Alvaro E. Escobar

22
Biometrics
Agenda
I.
Video
II.
Biometric Overview
III.
Biometric Technologies
IV.
Accuracy Metrics
V.
BioPrivacy Concerns
by Alvaro E. Escobar

23
Biometrics
False Acceptance Rate (FAR)
False Rejection Rate (FRR)
Failure To Enroll Rate (FTE)
Ability To Verify (AVT)






–

AVT = (1 - FTE)(1 - FRR)

by Alvaro E. Escobar

24
Biometrics
Agenda
I.
Video
II.
Biometric Overview
III.
Biometric Technologies
IV.
Accuracy Metrics
V.
BioPrivacy Concerns
by Alvaro E. Escobar

25
Biometrics


Informational privacy concerns:
–
–

Misuse
Addressed by:





System Design
Careful Audit

Personal privacy concerns
–

cultural or religious beliefs
by Alvaro E. Escobar

26
Biometrics


Bioprivacy Framework (25 best
practices)
–
–
–
–

Scope & Capabilities
Data Protection
User Control of Personal Data
disclosure, auditing and accountability.

by Alvaro E. Escobar

27
Biometrics


Scope & Capabilities:

–
–


Limit system scope.
Limit storage of identifiable biometric data.

Data Protection:

–

Security Tools:





–

Encryption
private networks
secure facilities

Limited System Access
by Alvaro E. Escobar

28
Biometrics


User Control of Personal Data :
–
–



Allow user un-enrollment (voluntarily)
Allow user view, correct and update data

Disclosure, Auditing and Accountability:
–
–

Explain system purpose
Third party auditing

by Alvaro E. Escobar

29
Biometrics


Q&A

by Alvaro E. Escobar

30

Weitere ähnliche Inhalte

Ähnlich wie Biometrics Overview and Technologies in 40 Characters

Ähnlich wie Biometrics Overview and Technologies in 40 Characters (20)

BiometricsPresentation.pptx
BiometricsPresentation.pptxBiometricsPresentation.pptx
BiometricsPresentation.pptx
 
Biometrics Report ppt
Biometrics Report pptBiometrics Report ppt
Biometrics Report ppt
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics.pptx
Biometrics.pptxBiometrics.pptx
Biometrics.pptx
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometrics ppt.pptx
Biometrics ppt.pptxBiometrics ppt.pptx
Biometrics ppt.pptx
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
FORENSIC BIOMETRIC
FORENSIC BIOMETRICFORENSIC BIOMETRIC
FORENSIC BIOMETRIC
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Biometrics Overview and Technologies in 40 Characters

Hinweis der Redaktion

  1. This is the agenda for this morning. I will be showing you at two minute, quick video that talks about biometrics in the news. Then I’ll cover an overview of biometrics, its definition, classifications, etc. Then I will present all the biometric technologies available, both been used today and under research. Then I will be covering the accuracy metrics by which biometric systems are graded and which determine how secure is a biometric system. And finally, I will cover bioprivacy, which are privacy concerns with the use of biometrics and how to address them.
  2. So, first let’s see the video.
  3. Now, let’s get into a Biometrics Overview.
  4. The definition of biometrics is, “an automated measurement off physiological and/or behavioral characteristics, to determine or authenticate identity”. Let’s spread the definition into it’s three major components, shown in diff. colors on the screen. These components will determine what is and what is not a biometric and also its different types and functionalities.
  5. Let’s start with the First component of the definition: “Automated measurement”, which means no human intervention or involvement is required. Biometrics are automated in as much as the processes involved in sample acquisition, feature extraction, record retrieval, and algorithm-based matching are computerized or machine-based. Also the record retrieval and comparison against another measurement must take place in Real-Time. So for an instance ,DNA sampling, is NOT a biometric measurement because today it still requires human intervention and it’s NOT done in real time.
  6. The second component of the definition : “Physiological and/or behavioral characteristics”, determine the two main biometric categories: behavioral and physiological. The behavioral characteristics measure the movement of a user, when users walk, speak, type on a keyboard or sign their name. The physiological characteristics would be the physical human traits like fingerprints, hand shape, eyes and face, veins, etc.
  7. And the last component of the definition is “determine or authenticate identity”, which categorizes the two types of biometric functionalities. The first type is identification systems or the systems that answer the question who am I ? and determine the identity of a person. The second type is verification systems or systems that answer the question, am I who I claim to be ? and authenticate a person. An example of an Identification System using biometrics would be: You approach an ATM with NO card, NO claimed identity, NO PIN. The ATM scans your iris and determines who you are and gives you access to your money. An example of a Verification System using biometrics would be: You approach an ATM and swipe a card or enter an account number. The ATM scans your iris and uses it as a password to authenticate you are the rightful owner of the card and therefore give you access to your money.
  8. Verification systems are more accurate, less expensive and faster than Identification systems. However, their drawbacks are: they are more limited in function, and they require a lot more effort from the user, to use the system.
  9. The benefits of biometrics are: Enable security, because it helps protect data at the PC and/or network level.Also it may restrict access to buildings or specific rooms. Enforce Accountability, because can improve the audit trail and recordkeeping process. For instance, recent HIPPA regulations require careful audit logs of who access special data and for what reason. User Convenience, because users no longer have to memorize passwords or carry keys or badges that can get lost, stolen or forgotten. Improve Savings, because Biometric implementers, no longer need to reset passwords or reissue badges, change locks, etc.
  10. Recent primary drivers for the use of biometrics are: Size and cost of biometric devices have decreased dramatically, with hardware getting smaller, faster and cheaper. All types of Biometric systems have Improved their accuracy and reliability by improving on their metrics, like false acceptance rate, false rejection rate and failure to enroll rate which I will cover later on and explain what they are. We can find today much more Mature standards and APIs (like BioAPI and BAPI) that have made it easier and less expensive to develop Biometric Applications. And finally, recently there has been more public awareness of Biometric uses and their convenience.
  11. Now let’s take a look at the different Biometric Technologies out there.
  12. There are two major classifications of biometric technologies: Those that do identification and verification (like Finger scan, Iris scan, Retina scan and Facial scan) and those that do verification only (like Hand Geometry, Voice Print, Keystroke Behavior and Signature). This classification is driven by the # of distinctive characteristics each technology is able to consistently measure. Therefore biometric technologies that do Identification and verification will have more distinctive characteristics to work with, than the ones that only do verification. There are also other Biometric Technologies in the making, at Universities and Colleges, which I will cover later on.
  13. In the case of finger scan, It measures unique characteristics in a fingerprint. These characteristics or minutiae (as they are called), are crossover, core, bifurcations, ridge ending, island, delta and Pores. Fingerprint samples like the one you’re looking at, typically don’t have all the minutiae types available. It is desirable but not always possible. Today we may find many automated fingerprint identification systems or AFIS, because of the high quality scanners available. This technique is used mostly for forensic and background checks and is being used in both logical and physical security. Logical security costs are aprox. $50 - $200 and physical security costs aprox. $500 – $1,000 per device.
  14. In the case of iris scan, It measures unique characteristics of the colored part of the eye also known as the Iris. These characteristics are: Ridges or rings , Furrows and Straitions or freckles. This technique just like finger scan is being used in both logical and physical security.
  15. In the case of Retina scan, It measures unique characteristics of the back of the eye, which is called the Retina. These characteristics are: Blood vessel patterns and Vein patterns. Retina scan requires significant more effort to use than Iris scan, and it is more challenging because the slightest movement causes rejection by the system. It also needs more sophisticated cameras than Iris scan.
  16. In the case of facial scan, It measures facial features like the Distance between the eyes And Distance between the eyes and nose ridge, Angle of a cheek, Slope of the nose, thickness of the lips, or facial temperatures. Is the most common Biometric technique used to obtain a personal identification. Facial scan has many challenges like changes in lightning, changes in camera angles, etc. This technique is used at all US embassies worldwide, and government agencies. Also used to guarantee uniqueness against an image databases usually to prevent identity theft. Many ATMs and casinos around the country, use this techniques to identify users. Very recent uses of this technique have been super bowl 35 to compare facial scans against known criminals. Or at Ybor City, Florida in the west coast (for citizen surveillance in public streets).
  17. In the case of hand scan, It measures the top and side of the hand, not the Palm as it is commonly thought. It is typically known as the hand geometry. (Finger lengths, widths, curves etc) Is the most widely used technique for physical access and their price ranges from $1,200 – $1,500 per door. Recent uses include the I. N. S. pass System, which scans a hand of frequent travelers, so instead of presenting a passport for authentication these frequent travelers swipe a card and do a hand scan. It is both convenient to consumers and frees up human resources to attend for more higher risk passengers.
  18. In the case of Voice scan, It measures the sound waves of human speech. Voice scan could be based on either text-dependent or text-independent speech input. If it is text-dependent, user talks to a microphone a passphrase and will repeat the same pass phrase when needed to be authenticated. The most common use of voice scan biometric systems is where a telephone is already being used. For instance home arrest verification is a very common use. Any time of the day or night a computer calls the home of a person under home arrest, and that person has to answer the phone and speak a passphrase to be authenticated. Voice scan Biometrics is currently restricted to low security applications because of high variability in an individual’s voice (depends on the user mood) and poor accuracy performance of a typical speech-based authentication system (affected by background noise).
  19. In the case of keystroke scan, It Measures the time between strokes and duration of key pressed. Most commonly used in systems where keyboard is already being used.
  20. In the case of signature scan, It measures the speed, pressure, stroke order and image of a signature. So it’s not only the signature image as it is commonly believed. If a signature from a user is already captured, this biometric technology adds an extra level of security with non-repudiation. Typically signature scan devices go for $50.00 or less.
  21. To compare the different biometric techniques I will use the Zephyr chart analysis. In this chart the further away the characteristic is from the center, the better is the biometric technique. So for instance keystroke scan and signature scan are low cost, require very little effort, and are not intrusive at all, however they are not distinctive. On the other end of the spectrum, retina scan and iris scan, provide very high distinctiveness, however they are both expensive, and intrusive.
  22. Now let’s talk about some of the accuracy metrics in biometric systems.
  23. False Acceptance Rate (FAR): Measures how often imposters would be let in into the system. (Type II Error) False Rejection Rate (FRR): Measures how often legitimate users will be rejected by the system. (Type I Error ) Now all biometric systems have threshold levels to minimize the FAR and FRR as necessary depending on the application. Failure To Enroll Rate (FTE): Measures the percentage of the population that are unable to enroll in the system (not only handicapped people), but for one reason or the other the user cannot enroll in the system. Ability To Verify (AVT) is a metric based on FTE and FRR. This metric usually characterizes user experience, cost of the system and level of security. The higher this ATV metric the more users are able to be processed, the less number of exceptions, making criminals easier to identify. Both AVT and FAR are excellent measures of a biometric system’s level of security.
  24. Finally let’s cover some of the bioprivacy concerns.
  25. There are two main categories of biometric privacy concerns: as informational privacy concerns and personal privacy concerns Just like your name and address, biometric information can be sold, so there are valid concerns about the use of this information. These concerns can be addressed through careful system design and careful audit. Personal privacy concerns create inherent discomfort because of cultural or religious beliefs. These concerns can be address by educating the users.
  26. To help mitigate both informational privacy concerns and personal privacy concerns the bioprivacy framework was created and layouts the 25 best practices. These bioprivacy best practices have been broken down into four main categories. Scope & Capabilities, Data Protection, User Control of Personal Data and Disclosure, Auditing and Accountability.
  27. The first category of bioprivacy best practices is scope and capabilities: includes limiting the system scope (slight expansion may have significant privacy implications) limit storage of the identifiable biometric data (actual Images and recordings should be discarded whenever possible). The second category is data protection: Use security tools to protect biometric information. These tools include encryption, private networks and secure facilities. System access should be limited to the smallest number of operators to prevent internal compromise.
  28. The third category of bioprivacy best practices is user control of personal data : Systems should allow for the un-enrollment of a user in a voluntarily way. System should allow user to view, correct and update Information stored in the system. The last category of bioprivacy best practices is “Disclosure, Auditing and Accountability”: Explain The purpose of The system to operators and enrollees. Provisions should be made for third party auditing.
  29. And now I will answer any questions you might have.