Uw csep 590 term paper l.jpg
This presentation is the property of its rightful owner.
Sponsored Links
1 / 9

UW CSEP 590 Term paper PowerPoint PPT Presentation


  • 66 Views
  • Uploaded on
  • Presentation posted in: General

UW CSEP 590 Term paper. Biometric Authentication Shankar Raghavan. Definition and Advantages. Physical or behavioral characteristics Much longer, random than a traditional password Always there with the person Unique to a person. Common biometric identifiers.

Download Presentation

UW CSEP 590 Term paper

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Uw csep 590 term paper l.jpg

UW CSEP 590 Term paper

Biometric Authentication

Shankar Raghavan


Definition and advantages l.jpg

Definition and Advantages

Physical or behavioral characteristics

Much longer, random than a traditional password

Always there with the person

Unique to a person


Common biometric identifiers l.jpg

Common biometric identifiers

FRR/FAR are measures for accuracy


Authentication mechanism threats l.jpg

Authentication mechanism, threats

  • If template is compromised, is the biometric identifier lost for ever?

  • Is there any good method for Tye 1 or type 2 attacks?


Fingerprint minutiae l.jpg

Fingerprint minutiae


Attacks and defences l.jpg

Attacks and Defences

  • Dummy finger (Type 1)

  • Gummy finger – Matsumoto (Type 1)

  • Hill climbing attack (Type 4)

  • Liveness detection (Type 1)

  • WSQ data hiding (Type 2)

  • Advantages of iris/retinal scannings

  • Image based challenge response systems


Fuzziness in biometrics l.jpg

Fuzziness in biometrics

  • n of N attributes match

  • Application of Shamir’s secret sharing

  • Identity based encryption using bilinear maps

    • Uses different polynomials for each user

    • Generates a private key for every attribute user has, this is distinct and not shared with another user.

    • Interpolates polynomial in an exponent


Fuzzy biometrics backup l.jpg

Fuzzy biometrics (backup)

  • Fuzzy commitment

    • x and x’ will both decode to a similar value

    • Not able to handle rotational/translational aspects of order invariances in an image very well.

  • Fuzzy vault

    • Maps a set that hold the key to a secret onto a polynomial p ie each value in the set is an x coordinate for a point evaluated by p.

    • Adds some noise or chaff so that the encrypted set becomes p(x),


Questions l.jpg

Questions?


  • Login