Anda di halaman 1dari 22

A SEMINAR ON BIOMETRICS (FOR FOOL PROOF SECURITY)

INTRODUCTION
Password based attacks Advancement in technology Powerful solution to illegal authenticationBIOMETRICS Passwords are out , biometrics is in

DEFINITION

Biometrics is a means of using the physiological or behavioral characteristics of a person as a kind of permanent password. Biometrics is an automated method of recognizing a person based on a physiological or behavioral characteristic.

WHY MOVE TO BIOMETRICS?


Cyber crimes and credit card thefts due to leakage of passwords The person to be identified is required to be physically present at the point-of-identification Biometric trait cannot be easily stolen or lost Identifies the person, not the machine

THE BIOMETRIC MODEL


User interface or the biometric reader Communication Subsystem The Controlling software Data storage

BIOMETRIC MODEL
Matching Score 95% Data Collection Decision Making Biometric Capture Template Extraction

Verification

Signal Processing Enrollment

Storage

BIOMETRIC CAPTURE

IMAGE PROCESS

1010 0110 1101

IMAGE

LIVE UPDATE

TEMPLATE EXTRACT

1010 0110 1101

BIOMETRIC MATCHING

98%

MATCHING SCORE STORAGE DEVICE STORED TEMPLATE

BIOMETRIC TECHNIQUES
Fingerprint Verification Iris Recognition Facial geometry Hand and Finger geometry Voice Biometry Signature Verification Keystroke dynamics

IMAGES OF BIOMETRIC TECHNIQUES

KEYSTROKE BIOMETRICS
The keystroke biometrics makes use of the interstroke gap that exists between consecutive characters of the user identification code. uniqueness can be used as an additional security constraint manner of typing

IMPLEMENTATION DETAILS
A database entry is created Training period, consists of 15-20 iterations Inter stroke allotted per user stroke interval between the keys is measured The mean and standard deviation of the code are calculated Mean= (1/n) x (i) Standard deviation= {[ (X (i)-mean)] 2/n} Leverage allotted per user

PERFORMANCE MEASURES
The FAR is the percentage of unauthorized users accepted by the system The FRR is the percentage of authorized users not accepted by the system Standard deviation of the users training period entry is used as a threshold Balance is established by taking two factors into consideration

ALGORITHM
Input : User name, User_id, Password. Output: Registration of a new user (or) Acceptance of a user if registered (or) Rejection of an unregistered user. main () { if (User==New) { read (User); // Getting User name, User_id, Password read (Inter-stroke gap); // Time interval between consecutive characters Add user (database); // Add the User to the database User count =1; } else if (User==Training) { read (User); read (Inter-stroke gap); if (Check (User, Password)) { if (User count<15) { update ( User count); // User count = User count +1 add (Inter-stroke gap); } else if (User count ==15) { update (User count); add (Inter-stroke gap);

Calculate Mean (M), Standard deviation (S.D); } } else if (User==Existing) { read (User); read (deviation); if (Check (User, Password, deviation)) Login; else exit(0); } }

ANALYSIS OF INTER-KEYSTROKE TIMING OF USER CODE


The X axis indicates the number of interkeystrokes and negative Y axis indicates the inter-keystrokes timing in milliseconds Graph I shows the inter-keystroke timing analysis when the user is accepted Graph II indicates inter-keystroke timing when the user is not legal or not following his rhythmic behavior of typing the access code

db=Database +R=+VE

Graph I: Inter keystroke timing analysis when the user is accepted

-R=-VE Boundary
c=Current
-R -R c -R c -R db c db db (L2) c (L3) db +R db +R +R +R +R +R c c c c db db db c -R -R c db -R (L1) -R

+R

+R

+R (L4)

ACCESS GRANTED

db=Database

Graph II: Inter keystroke timing when the user is not legal or not following his rhythmic behavior
-R -R -R -R

+R=+VE Boundary -R=-VE Boundary


c=Current

-R

-R

-R db db db db (L2) c db

c db

db

-R (L1)

c db db +R +R c +R +R +R +R c c (L3) c +R +R (L4) +R c

ACCESS DENIED

A MULTIMODAL BIOMETRIC SYSTEM

It overcomes the limitations of individual biometric This multi biometric system operates with an admissible response time

APPLICATIONS
BIOMETRIC BANKING INTERNET SECURITY

CONSTRAINTS IN KEYSTROKE BIOMETRICS


Does this technology have any constraints? What is the solution? The performance measure of Keystroke biometrics purely depends on User psychology Positively Keystroke Biometrics will replace the entire traditional security systems in the future.

CONCLUSION
Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy Key stroke biometrics are used FOR FOOL PROOF SECURITY

Anda mungkin juga menyukai