Biometric Authentication

Similar documents
1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

CPSC 467b: Cryptography and Computer Security

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Computer Security Seminar Biometrics. Aviv Abramovich Spring 2015 University of Haifa

Introduction-cont Pattern classification

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics & Accessibility

Here s our nickel tour of biometrics well, okay, that d be a dollar or

Biometrics: primed for business use

(Approved December 30, 2010) AN ACT

The Open Biometrics Initiative and World Card

Research Article. ISSN (Print)

BIOMETRICS - WHY NOW?

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

Opinion 3/2012 on developments in biometric technologies

International Biometrics & Identification Association

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

Biometrics Technology for Human Recognition

Biometrics how to put to use and how not at all?

SUMMARY INTRODUCTION. xiii

Biometrics How to Put to Use and How Not at All?

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

Biometrics how to put to use and how not at all?

Case Study. MegaMatcher Accelerator

SECURE REMOTE VOTER REGISTRATION

1. Delete the words and registration. 3. Delete the word person and substitute therefor the word individual.

THE KEYLESS SOCIETY. Reading Practice

Recommended Practice 1701 l

EVIDENCE OF IDENTIFICATION

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Singapore's Automated Clearance using Biometrics

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

Identity Verification in Passport Issuance

Background and Status of the Tanzania National ID System

Biometric Technology for DLID

Consumer Attitudes About Biometric Authentication

Smart Voting System using UIDAI

INTRODUCTION BACKGROUND. Chapter One

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

Prepared by Space and Naval Warfare Systems Center Atlantic

Position Paper IDENT Implementation for U.S. VISIT

fraud prevention done right

Biometrics Explained: Answers to 13 Basic Biometrics Questions I B I

Smarter European borders through an increased use of biometric recognition

DBS basic checks - Responsible Organisation ID Guidance

Ad-Hoc Query on identity documents issued by EU Member States. Requested by EE EMN NCP on 2 nd June Compilation produced on 9 th August 2010

CHAPTER Committee Substitute for House Bill No. 1277

The Perception of Biometric Technology: A Survey

FOIA Exemptions 6 & 7C Personal Privacy Exemptions

DTIq felect, AD-A NAVAL POSTGRADUATE SCHOOL THESIS Monterey, California. % C - AM 1 r9 D SIGNATURE VERIFICATION FOR ACCESS CONTROL

The Biometric Devil's in the Details

Changes in Schengen visa application process

Biometrics in the Workplace. The Promise and Peril of It s Use

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011]

Immigration Compliance Fraud in education applications

The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers

European Biometrics Portal. Biometrics in Europe. Trend Report

MoneyPad, The Future Wallet

Acceptance of Biometrics: Things That Matter That We Are Ignoring

Samiah Ibrahim. Canada Border Services Agency

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

CRS Report for Congress

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

Identity Documents Act

How biometrics can improve the targeting of social protection. What we do. How we do it.

International Journal of Research and Review E-ISSN: ; P-ISSN:

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

Occupational License Application

Biometrics. Version Prepared by: Michael Davis- Hannibal. Softcon Software Control Services (Pty) Ltd.

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

Policy Framework for the Regional Biometric Data Exchange Solution

STRATEGIES AND USEFULNESS OF ID-e (DNI-e) Benito Fernández Fernández, Head secretary at CNP Identification Department.

Emerging Biometric Data Risks

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

Biometrics: New Laws and Potential Litigation Implications

NAVAL POSTGRADUATE SCHOOL

INFORMATION Note. No 008: CrB checks and when to use them. About IMSPA. First issued: December 2011

OIG Closing Memorandum Re: Airport Security Employee s False Employment Documents, Ref OIG

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

German Federal Ministry of the Interior 20 August / 6

FOIA Exemptions 6 & 7C Personal Privacy Exemptions

The Upcoming International Biometric Vocabulary Standard

Visa Information System (VIS) FAQs

Verify and Authenticate Identities before Issuing a Driver s License or State Identification Card.

Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals

Identification checking guidelines

Federal Agencies + Travel = Quality Control

Biometrics from a legal perspective dr. Ronald Leenes

Biometric Technologies in Schools. Draft Guidance for Education Authorities: Consultation Analysis Report

Revised and enhanced identification checking guidelines (effective from 28 May 2012)

ID checking guidelines for DBS check applications

Data Breach Charts. November 2017

Transcription:

CS 361S Biometric Authentication Vitaly Shmatikov

Biometric Authentication Nothing to remember Passive Nothing to type, no devices to carry around Can t share (usually) Can be fairly unique if measurements are sufficiently accurate slide 2

Identification vs. Authentication Goal: associate an identity with an event Example: a fingerprint at a crime scene Key question: given a particular biometric reading, does there exist another person who has the same value of this biometric? Goal: verify a claimed identity Example: fingerprint scanner to enter a building Key question: do there exist any two persons who have the same value of this biometric? Birthday paradox! slide 3

Problems with Biometrics Private, but not secret Biometric passports, fingerprints and DNA on objects Even random-looking biometrics may not be sufficiently unique for authentication Birthday paradox! Potentially forgeable Revocation is difficult or impossible slide 4

Forging Handwriting [Ballard, Monrose, Lopresti] Generated by computer algorithm trained on handwriting samples slide 5

Biometric Error Rates (Benign) Fraud rate vs. insult rate Fraud = system accepts a forgery (false accept) Insult = system rejects valid user (false reject) Increasing acceptance threshold increases fraud rate, decreases insult rate For biometrics, U.K. banks set target fraud rate of 1%, insult rate of 0.01% [Ross Anderson] Common signature recognition systems achieve equal error rates around 1% - not good enough! slide 6

Biometrics (1) Face recognition (by a computer algorithm) Error rates up to 20%, given reasonable variations in lighting, viewpoint and expression Fingerprints Traditional method for identification 1911: first US conviction on fingerprint evidence U.K. traditionally requires 16-point match Probability of a false match is 1 in 10 billion No successful challenges until 2000 Fingerprint damage impairs recognition Ross Anderson s scar crashes FBI scanner slide 7

Biometrics (2) Iris scanning Irises are very random, but stable through life Different between the two eyes of the same individual 256-byte iris code based on concentric rings between the pupil and the outside of the iris Equal error rate better than 1 in a million Hand geometry Used in nuclear premises entry control, INSPASS (discontinued in 2002) Voice, ear shape, vein pattern, face temperature slide 8

Biometrics (3) Identifies wearer by his/her unique heartbeat pattern slide 9

Biometrics (4) All you need to do is sit [Advanced Institute of Industrial Technology, Japan] Forget Fingerprints: Car Seat IDs Driver s Rear End 70,000 360 disc-shaped sensors identify a unique buttprint with 98% accuracy slide 10

Biometrics (5) slide 11

Risks of Biometrics Criminal gives an inexperienced policeman fingerprints in the wrong order Record not found; gets off as a first-time offender Can be cloned or separated from the person Ross Anderson: in countries where fingerprints are used to pay pensions, there are persistent tales of Granny s finger in the pickle jar being the most valuable property she bequeathed to her family Birthday paradox With the false accept rate of 1 in a million, probability of a false match is above 50% with only 1609 samples slide 12

Surgical Change slide 13

Stealing Biometrics slide 14

Involuntary Cloning Clone a biometric without victim s knowledge or assistance my voice is my password Bad news: it works! cloned retina Fingerprints from beer bottles Eye laser scan slide 15

Cloning a Finger [Matsumoto] slide 16

Cloning Process [Matsumoto] slide 17

Fingerprint Image [Matsumoto] slide 18

Molding [Matsumoto] slide 19

The Mold and the Gummy Finger [Matsumoto] slide 20

Side By Side [Matsumoto] slide 21

Play-Doh Fingers [Schuckers] Alternative to gelatin Play-Doh fingers fool 90% of fingerprint scanners Clarkson University study Suggested perspiration measurement to test liveness of the finger slide 22