UW CSEP 590 Term paper - PowerPoint PPT Presentation

Uw csep 590 term paper
1 / 9

  • Updated On :
  • Presentation posted in: General

UW CSEP 590 Term paper. Biometric Authentication Shankar Raghavan. Definition and Advantages. Physical or behavioral characteristics Much longer, random than a traditional password Always there with the person Unique to a person. Common biometric identifiers.

Related searches for UW CSEP 590 Term paper

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

Download Presentationdownload

UW CSEP 590 Term paper

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript

Uw csep 590 term paper l.jpg

UW CSEP 590 Term paper

Biometric Authentication

Shankar Raghavan

Definition and advantages l.jpg

Definition and Advantages

Physical or behavioral characteristics

Much longer, random than a traditional password

Always there with the person

Unique to a person

Common biometric identifiers l.jpg

Common biometric identifiers

FRR/FAR are measures for accuracy

Authentication mechanism threats l.jpg

Authentication mechanism, threats

  • If template is compromised, is the biometric identifier lost for ever?

  • Is there any good method for Tye 1 or type 2 attacks?

Fingerprint minutiae l.jpg

Fingerprint minutiae

Attacks and defences l.jpg

Attacks and Defences

  • Dummy finger (Type 1)

  • Gummy finger – Matsumoto (Type 1)

  • Hill climbing attack (Type 4)

  • Liveness detection (Type 1)

  • WSQ data hiding (Type 2)

  • Advantages of iris/retinal scannings

  • Image based challenge response systems

Fuzziness in biometrics l.jpg

Fuzziness in biometrics

  • n of N attributes match

  • Application of Shamir’s secret sharing

  • Identity based encryption using bilinear maps

    • Uses different polynomials for each user

    • Generates a private key for every attribute user has, this is distinct and not shared with another user.

    • Interpolates polynomial in an exponent

Fuzzy biometrics backup l.jpg

Fuzzy biometrics (backup)

  • Fuzzy commitment

    • x and x’ will both decode to a similar value

    • Not able to handle rotational/translational aspects of order invariances in an image very well.

  • Fuzzy vault

    • Maps a set that hold the key to a secret onto a polynomial p ie each value in the set is an x coordinate for a point evaluated by p.

    • Adds some noise or chaff so that the encrypted set becomes p(x),

Questions l.jpg


  • Login