biometrics: a tool for information security anil k.jain, arun ross, sharath pankanti ieee...

Post on 29-Jan-2016

214 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Biometrics: A Tool For Biometrics: A Tool For Information SecurityInformation Security

Anil K.Jain, Arun Ross, Sharath PankantiAnil K.Jain, Arun Ross, Sharath Pankanti

IEEE Transactions on Information Forensics and Security, Volume 1, IEEE Transactions on Information Forensics and Security, Volume 1, Issue 2, June 2006, pp. 125 - 143Issue 2, June 2006, pp. 125 - 143

Presented by Sumit PoddarEmail: spod002@ec.auckland.ac.nz

SummarySummary

• Biometrics: Recognition technique based on “who you Biometrics: Recognition technique based on “who you are” rather than “what you know” or “what you have”.are” rather than “what you know” or “what you have”.

• This paper provides an overview of biometrics.This paper provides an overview of biometrics.

Critical CommentCritical Comment In the section corresponding to template security the In the section corresponding to template security the

author uses “Hill Climbing Attack” in multiple places author uses “Hill Climbing Attack” in multiple places without describing it in detail.without describing it in detail.

Appreciative CommentAppreciative Comment

Explains the important aspects of biometric systems Explains the important aspects of biometric systems which are listed belowwhich are listed below

•The characteristics used in biometric systemsThe characteristics used in biometric systems•Biometric VarianceBiometric Variance•Operation of a Biometric SystemOperation of a Biometric System•Functionalities of a Biometric SystemFunctionalities of a Biometric System•Attacks on a Biometric SystemAttacks on a Biometric System•Multi-Biometric SystemsMulti-Biometric Systems

Appreciative CommentAppreciative Comment• Highlights the aspects which are currently areas of Highlights the aspects which are currently areas of

research and can make biometrics an improved research and can make biometrics an improved technology.technology.

Effective representation and matchingEffective representation and matching Characterizing signal quality and enhancementCharacterizing signal quality and enhancement Empirical Performance MeasurementEmpirical Performance Measurement

Appreciative CommentAppreciative CommentFailures in biometric systems can be clearly explained with the help of a fish-bone diagram.

Figure1: Fishbone (cause and effect) diagram of biometric failures

DiscussionDiscussion

How can we use a fish-bone diagram to model security failures in the example scenario mentioned below?

Example scenario: biometric passport

top related