Uw csep 590 term paper
Download
1 / 9

UW CSEP 590 Term paper - PowerPoint PPT Presentation


  • 114 Views
  • Updated On :

UW CSEP 590 Term paper. Biometric Authentication Shankar Raghavan. Definition and Advantages. Physical or behavioral characteristics Much longer, random than a traditional password Always there with the person Unique to a person. Common biometric identifiers.

Related searches for UW CSEP 590 Term paper

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'UW CSEP 590 Term paper' - burke


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Uw csep 590 term paper l.jpg
UW CSEP 590 Term paper

Biometric Authentication

Shankar Raghavan


Definition and advantages l.jpg

Definition and Advantages

Physical or behavioral characteristics

Much longer, random than a traditional password

Always there with the person

Unique to a person


Common biometric identifiers l.jpg
Common biometric identifiers

FRR/FAR are measures for accuracy


Authentication mechanism threats l.jpg
Authentication mechanism, threats

  • If template is compromised, is the biometric identifier lost for ever?

  • Is there any good method for Tye 1 or type 2 attacks?



Attacks and defences l.jpg
Attacks and Defences

  • Dummy finger (Type 1)

  • Gummy finger – Matsumoto (Type 1)

  • Hill climbing attack (Type 4)

  • Liveness detection (Type 1)

  • WSQ data hiding (Type 2)

  • Advantages of iris/retinal scannings

  • Image based challenge response systems


Fuzziness in biometrics l.jpg
Fuzziness in biometrics

  • n of N attributes match

  • Application of Shamir’s secret sharing

  • Identity based encryption using bilinear maps

    • Uses different polynomials for each user

    • Generates a private key for every attribute user has, this is distinct and not shared with another user.

    • Interpolates polynomial in an exponent


Fuzzy biometrics backup l.jpg
Fuzzy biometrics (backup)

  • Fuzzy commitment

    • x and x’ will both decode to a similar value

    • Not able to handle rotational/translational aspects of order invariances in an image very well.

  • Fuzzy vault

    • Maps a set that hold the key to a secret onto a polynomial p ie each value in the set is an x coordinate for a point evaluated by p.

    • Adds some noise or chaff so that the encrypted set becomes p(x),



ad