1 / 28

Selecting the Right Biometric Presentation

Learn about the different biometric attributes, evaluating options, cost and affordability, pros and cons, and myths associated with choosing a biometric. Understand factors involved in selecting a biometric, application requisites, and the importance of affordability and cost. Explore the drawbacks of various biometrics and the calculation of mismatches. Discover the characteristics and weightings of different biometrics.

jwax
Download Presentation

Selecting the Right Biometric Presentation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 8 Selecting a Biometric Presentation by Phani Dogiparthi

  2. Contents: • Biometric Attributes • Properties of Applications • Evaluating Biometric Options • Cost and Affordability of Biometric • Pros and Cons of Various Biometrics • Myths and Misrepresentations

  3. Factors Associated with choosing a Biometric

  4. Comparison of the Various Attributes

  5. Application Requisites • What is the protected asset; • Who are the authorized users and operators; • Who are the adversaries of the application; • What can be the costs of security violations; • What is the actual cost of the security; and • What is the added cost of inconvenience?

  6. Categories of Applications • Cooperative and Non-cooperative • Overt and Covert • Habituated and Non-habituated • Attended and Non-attended • Standard Environment • Public and Private • Open and Closed

  7. Importance Weightings

  8. Drawbacks of various Biometrics

  9. Mismatch Calculation

  10. Zephyr Charts

  11. Characteristics Weighting

  12. Affordability and Cost • Total Cost of ownership • Verification versus Identification • Single and Multiple Authentication protocols • Training -> System Training -> Enrollment • Continued Enrollment • Failure to Enroll • User Education • Supervisory Labor • Maintenance Labor

  13. Positives and Negatives of the Biometrics

  14. Fingerprint - Pros • Long Tradition of usage of fingerprint as immutable identification in law enforcement • Existing of large databases of fingerprints comprising largely of criminals • Forensic investigation uses fingerprint • Sampling of the fingerprint is easy • Conversion of fingerprints into digital images is getting easier, better and cheaper • Various state departments of motor vehicles are working to establish a fingerprint biometric system for driver’s license and record data

  15. Fingerprint-Cons • Finger print suffer from poor public reputation • Social stigma such that it is related to illiterate • Variation occurs due to age, cut or due to working conditions • Sampling variations due to improper usage of the apparatus • Rare situations like people without fingers.

  16. Face - Pros • Photos are widely used and usage is public accepted • Face recognition systems are least intrusive. • In theory this biometric works with image sources • In theory can be applied to identify criminals in crowd • It is good biometric for small scale verification purpose

  17. Face - Cons • Face authentication requires images taken in a good controlled lighted environment • Presently it is a poor biometric for usage in pure identification protocol • Disguise - a major obstacle • Usage may hamper due to social stigma

  18. Voice - Pros • Like face voice is natural biometric • Voice sampling can also be obtained unobtrusively • Great public acceptance of this biometric • Voice uses inexpensive hardware and can be established on current communications systems • Voice allows incremental protocols • Voice may achieve high accuracy and flexibility when combined with knowledge verification • Voice allows continuous identity checking

  19. Voice - Cons • Imitation by possible in voice • Possibility of creating nonexistent identities with text-to-speech technology • Depends on high quality capturing of audio signal • Possibility in rare cases where voice is lost

  20. Iris - pros • Widely believed to be the most accurate biometric • Sample acquisition is unobtrusive – no physical contact • Received only little negative press • Present claim is that iris does not involve high training costs

  21. Iris - Cons • There are no or few legacy iris databases • Sampling the iris patterns requires much user cooperation or complex, expensive input devices • Iris authentication is hampered by vision aid • This biometric is not left as an evidence in the scene of crime, so not used for forensic applications • Cases like missing eye

  22. Hand - Pros • Certain amount of public acceptance • Termed as “do-it-yourself” operation • Existing of at least one scenario evaluation of hand geometry • Can be used in place in stronger biometric where stronger might induce public fear

  23. Hand - Cons • Physical contact induces public hygiene • Not very distinctive • Existence of only one scenario application rises doubts about Hand as Biometric • Mutation

  24. Signature - Pros • Man-made biometric- extensive study in forgery • Used to identify impersonation even at enrollment stage • Training is fast • Has fast response and low storage requirements • Independent of the native language of speaker • Combination of information and biometric • Unaffected by high compression rates

  25. Signature - Cons • Excessive usage of signature rises perception that it is not secure enough for protection • Scaling properties and identifier standards are hard to set • A five-dimensional pen is needed to get desired accuracy which makes hardware costly • Medical conditions prevent people from writing consistently

  26. Myths and Misrepresentations • Biometric “X” is best for all applications • Biometric “X” is unique for each individual • A single number quantifies system accuracy • System is “ plug and play “ • Real accuracy performance can be predicted • The vendors reporting best FAR and FRR has the “most accurate system” • Multiple biometrics outperform single biometrics • “Our biometric system does not use a decision threshold”

  27. “Our feature extractor can be used with any match engine” • Large templates mean better accuracy • Face recognition prevents terrorism • Biometrics means 100 percent security • Biometric systems invade our privacy • Biometric sensors are unhygienic or otherwise harmful

  28. Thank you

More Related