biometrics: a tool for information security anil k.jain, arun ross, sharath pankanti ieee...
TRANSCRIPT
Biometrics: A Tool For Biometrics: A Tool For Information SecurityInformation Security
Anil K.Jain, Arun Ross, Sharath PankantiAnil K.Jain, Arun Ross, Sharath Pankanti
IEEE Transactions on Information Forensics and Security, Volume 1, IEEE Transactions on Information Forensics and Security, Volume 1, Issue 2, June 2006, pp. 125 - 143Issue 2, June 2006, pp. 125 - 143
Presented by Sumit PoddarEmail: [email protected]
SummarySummary
• Biometrics: Recognition technique based on “who you Biometrics: Recognition technique based on “who you are” rather than “what you know” or “what you have”.are” rather than “what you know” or “what you have”.
• This paper provides an overview of biometrics.This paper provides an overview of biometrics.
Critical CommentCritical Comment In the section corresponding to template security the In the section corresponding to template security the
author uses “Hill Climbing Attack” in multiple places author uses “Hill Climbing Attack” in multiple places without describing it in detail.without describing it in detail.
Appreciative CommentAppreciative Comment
Explains the important aspects of biometric systems Explains the important aspects of biometric systems which are listed belowwhich are listed below
•The characteristics used in biometric systemsThe characteristics used in biometric systems•Biometric VarianceBiometric Variance•Operation of a Biometric SystemOperation of a Biometric System•Functionalities of a Biometric SystemFunctionalities of a Biometric System•Attacks on a Biometric SystemAttacks on a Biometric System•Multi-Biometric SystemsMulti-Biometric Systems
Appreciative CommentAppreciative Comment• Highlights the aspects which are currently areas of Highlights the aspects which are currently areas of
research and can make biometrics an improved research and can make biometrics an improved technology.technology.
Effective representation and matchingEffective representation and matching Characterizing signal quality and enhancementCharacterizing signal quality and enhancement Empirical Performance MeasurementEmpirical Performance Measurement
Appreciative CommentAppreciative CommentFailures in biometric systems can be clearly explained with the help of a fish-bone diagram.
Figure1: Fishbone (cause and effect) diagram of biometric failures
DiscussionDiscussion
How can we use a fish-bone diagram to model security failures in the example scenario mentioned below?
Example scenario: biometric passport