The document discusses biometrics, which uses physiological or behavioral human characteristics to identify individuals. It defines biometrics and describes a generic biometric system involving enrollment, sensors, feature extraction, and matching. The document outlines several types of biometrics including face recognition, fingerprints, hand geometry, iris/retina scans, DNA, keystrokes, and voice. It also discusses vulnerabilities in biometric systems such as spoofing attacks, template database leaks, and intrinsic limitations like false matches. The document proposes security approaches like feature transformations and cryptosystems to enhance biometric security.
2. Contents
1.Defination
2.Generic Biometric
System
3.Types of biometrics
4.Biometric System
Vulnerabilities
5.Security Approaches
3. Biometrics
It is a physiological or behavioral
characteristic of a human being that can
distinguish one person from another and
that theoretically can be used for
identification or verification of identity.
Who are you? Prove it.
9. Hand Geometry
Captured using a
CCD camera, or LED
Orthographic
Scanning
The system is often
bulky
10. Eyes:Iris,Retina
Extracts features
from the colored
tissue surrounding
the pupil.
Monochrome
camera with visible
and near infra red
light
Liveness detection
11. DNA
Deoxyribonucliec
Acid
Contains Genetic
information
Differentiated
using base pairs
12. Keystrokes
No special
hardware
Required
Transparent
capture
13. Voice
Speaker recognition uses
a microphone to record
the voice
Your voice can vary with
age, illness and
emotions
Interesting with the
increasing use of mobile
phones
14. Biometric System Vulnerabilities
Biometric
System
Vulnerabilities
Adversary
Attacks
Spoofing
Template
database
leakage
Intrinsic
Limitations
16. Adversary Attacks
Caused due to
negligence of
authorized persons
An adversary
exploiting the
system security
using insiders
Direct attack on the
sensors