html5-img
1 / 7

Biometrics: A Tool for Information Security

Biometrics: A Tool for Information Security. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 2, JUNE 2006. Authors: Anil K. Jain , Arun Ross , Sharath Pankanti. Presenter: Eugene Phan. Summary.

fay
Download Presentation

Biometrics: A Tool for Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Biometrics: A Tool for Information Security IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 1, NO. 2, JUNE 2006 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti Presenter: Eugene Phan Biometrics: A Tool for Information Security

  2. Summary • The need for reliable user authentication and identification has risen from concerns in content ownership, information security, border control. • Instead of authenticating the possession of an identity item (license key, password), verify the person himself (biometrics): claimed identity (duplication), known identity (in database), a wanted person? Biometrics: A Tool for Information Security

  3. Comments (Positive) I • Goes to some lengths in explaining Biometrics: • Types & properties of biometric feature (face, voice, iris, fingerprint, etc) • Limitations of acquisition (presentation is inconsistent and irreproducible, quality is not always guaranteed) • Imperfect matching (unlike password) resulting in false positive and false negative Biometrics: A Tool for Information Security

  4. Comments (Positive) II • Goes to some lengths in explaining Biometrics (cont): • Describes the function of biometric system (authentication, ‘wanted list’) and how it works • Vulnerability to attacks (Zero-Effort where 2 individuals have very similar biometric features, Adversary where spoofing, circumvention, etc are attempted) Suggests watermarking and steganography coupled with encryption to protect biometric templates. Biometrics: A Tool for Information Security

  5. Comments (Negative) • Presents the idea of Biometric Crypto-System - use of biometric as part of the key generation & storage. • Current implementation is to unlock the key. • Introduces “fuzzy vault” technique but not clearly explained. • Novel concept but explanation of implementation is not clear. Biometrics: A Tool for Information Security

  6. Question • With the current performance in enrollment and verification, would you be comfortable (trust) having biometric system protect your bank account - miss identification as a bad person or overnight billionaire? Biometrics: A Tool for Information Security

  7. Thank You Very Much! • Questions? Biometrics: A Tool for Information Security

More Related