biometrics: a tool for information security anil k.jain, arun ross, sharath pankanti ieee...

7
Biometrics: A Tool Biometrics: A Tool For Information For Information Security Security Anil K.Jain, Arun Ross, Sharath Pankanti Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and IEEE Transactions on Information Forensics and Security, Volume 1, Issue 2, June 2006, pp. Security, Volume 1, Issue 2, June 2006, pp. 125 - 143 125 - 143 Presented by Sumit Poddar Email: [email protected]

Upload: sherilyn-mcdonald

Post on 29-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,

Biometrics: A Tool For Biometrics: A Tool For Information SecurityInformation Security

Anil K.Jain, Arun Ross, Sharath PankantiAnil K.Jain, Arun Ross, Sharath Pankanti

IEEE Transactions on Information Forensics and Security, Volume 1, IEEE Transactions on Information Forensics and Security, Volume 1, Issue 2, June 2006, pp. 125 - 143Issue 2, June 2006, pp. 125 - 143

Presented by Sumit PoddarEmail: [email protected]

Page 2: Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,

SummarySummary

• Biometrics: Recognition technique based on “who you Biometrics: Recognition technique based on “who you are” rather than “what you know” or “what you have”.are” rather than “what you know” or “what you have”.

• This paper provides an overview of biometrics.This paper provides an overview of biometrics.

Page 3: Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,

Critical CommentCritical Comment In the section corresponding to template security the In the section corresponding to template security the

author uses “Hill Climbing Attack” in multiple places author uses “Hill Climbing Attack” in multiple places without describing it in detail.without describing it in detail.

Page 4: Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,

Appreciative CommentAppreciative Comment

Explains the important aspects of biometric systems Explains the important aspects of biometric systems which are listed belowwhich are listed below

•The characteristics used in biometric systemsThe characteristics used in biometric systems•Biometric VarianceBiometric Variance•Operation of a Biometric SystemOperation of a Biometric System•Functionalities of a Biometric SystemFunctionalities of a Biometric System•Attacks on a Biometric SystemAttacks on a Biometric System•Multi-Biometric SystemsMulti-Biometric Systems

Page 5: Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,

Appreciative CommentAppreciative Comment• Highlights the aspects which are currently areas of Highlights the aspects which are currently areas of

research and can make biometrics an improved research and can make biometrics an improved technology.technology.

Effective representation and matchingEffective representation and matching Characterizing signal quality and enhancementCharacterizing signal quality and enhancement Empirical Performance MeasurementEmpirical Performance Measurement

Page 6: Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,

Appreciative CommentAppreciative CommentFailures in biometric systems can be clearly explained with the help of a fish-bone diagram.

Figure1: Fishbone (cause and effect) diagram of biometric failures

Page 7: Biometrics: A Tool For Information Security Anil K.Jain, Arun Ross, Sharath Pankanti IEEE Transactions on Information Forensics and Security, Volume 1,

DiscussionDiscussion

How can we use a fish-bone diagram to model security failures in the example scenario mentioned below?

Example scenario: biometric passport