Biometric Inaccuracies Project Team 9: Tanner Ellenberger and Grant - - PowerPoint PPT Presentation

biometric inaccuracies
SMART_READER_LITE
LIVE PREVIEW

Biometric Inaccuracies Project Team 9: Tanner Ellenberger and Grant - - PowerPoint PPT Presentation

Biometric Inaccuracies Project Team 9: Tanner Ellenberger and Grant Miller Overview History Types of biometrics, how they work Overall effectiveness Risks/Downsides (problem) Known alternatives Our solution


slide-1
SLIDE 1

Biometric Inaccuracies

Project Team 9: Tanner Ellenberger and Grant Miller

slide-2
SLIDE 2

Overview

  • History
  • Types of biometrics, how they work
  • Overall effectiveness
  • Risks/Downsides (problem)
  • Known alternatives
  • Our solution
slide-3
SLIDE 3

History

  • Biometrics used since 500 B.C by Babylonian merchants

for transactions

  • Bertillon System was used in mid 1800s to measure

various body dimensions

  • Henry System implemented in late 1800s to include

fingerprints of inmates

  • Biometrics we see today were not implemented until late

90s, early 2000’s

slide-4
SLIDE 4

How Biometrics Work

1. Proper recording/scanning device records initial appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares new input to original stored input 5. If new input matches original stored input, access granted

slide-5
SLIDE 5

Popular Types of Biometrics

  • Fingerprint
  • Retina
  • Iris
  • Facial
  • Voice
  • Signature
slide-6
SLIDE 6

Effectiveness

  • Convenient, easy to use
  • Very unique
  • Always with you
  • Easy to implement
slide-7
SLIDE 7

Risks/Downsides

  • Cannot change your DNA if compromised
  • Lack of privacy
  • Users can be forced to use their biometric with physical force
  • Can be manipulated
slide-8
SLIDE 8

Alternatives

  • Password/Passphrase
  • Personal Device Check
  • Two-Factor
  • Two-Step
  • Randomly Generated Codes
slide-9
SLIDE 9

Solution

  • AI.Lock
  • User takes picture of unique object or scene (reference image)
  • Must take picture of same object/scene for authorization (candidate image)
  • Only stores a hash of the image
slide-10
SLIDE 10

Conclusion

  • Biometric History
  • How biometrics work
  • Types of biometrics
  • Effectiveness of biometrics
  • Risks of Biometrics
  • Biometric Alternatives
  • Our Solution
slide-11
SLIDE 11

Works Cited

Azimpourkivi, et al. “A Secure Mobile Authentication Alternative to Biometrics.” [1402.1128] Long Short-Term Memory Based Recurrent Neural Network Architectures for Large Vocabulary Speech Recognition, 7 Dec. 2017, arxiv.org/abs/1712.02483. Yang, Kai, et al. “Consent Biometrics.” Neurocomputing, vol. 100, 2013, pp. 153–162., doi:10.1016/j.neucom.2011.12.044. Indrayani E (2014) The Effectiveness and the Efficiency of the Use of Biometric Systems in Supporting National Database Based on Single ID Card Number (The Implementation of Electronik ID Card in Bandung). J Inform Tech Softw Eng 4:129. doi:10.4172/2165-7866.1000129 Shahnewaz, Shaon. “The Top Seven Advantages of a Biometric Identification Management System”. M2SYS. Apr 4, 2016. Web. Jun 24, 2018. Mayhew, S. (2018, March 21). History of Biometrics. Retrieved from https://www.biometricupdate.com/201802/history-of-biometrics-2 Penny, Wayne. “Biometrics: A Double Edged Sword - Security and Privacy”. SANS Institute. 2002. Web. Jun 24, 2018.

slide-12
SLIDE 12

Questions ?