SLIDE 1
GA10 People and Security Lecture 3: Biometrics
SLIDE 2 Applying risk analysis
Goals of this lecture
- Brief introduction to biometrics
- Context: ICAO,US Visit and the ID cards
programme
- Issues with current equipment
– Performance – Usability – User Acceptance
- How secure are biometrics?
SLIDE 3 Applying risk analysis
Basics on biometrics
subsequent
– verification (through ID + biometric), or – identification (biometric only)
– Passports requires images, templates are more efficient
performance
SLIDE 4 Applying risk analysis
Physical biometrics
- Fingerprint
- Finger / Palm Vein
- Hand geometry
- Face recognition
- Iris
- Retina
- Earshape
SLIDE 5 Applying risk analysis
Behavioural biometrics
- Voice print
- Dynamic Signature Recognition (DSR)
- Typing pattern
- Gait recognition
- Heart rate analysis
SLIDE 6 Applying risk analysis
Fingerprint recognition
– Authentication/Access control
- Doors
- PCs/laptops
- US Visit programme
(http://www.dhs.gov/dhspublic/interapp/content_multi_image /content_multi_image_0006.xml)
SLIDE 7 Applying risk analysis
Hand geometry
– Authentication (e.g. INSPASS program)
– Easier to position hand than fingers – Less susceptible to small injuries – Hygiene concerns
SLIDE 8 Applying risk analysis
Voice recognition applications
– Speaker recognition – Telephony-based interactions (home banking and insurance) – Lie detector
– Speaker training – Voice changes – colds etc. – Background noise
SLIDE 9 Applying risk analysis
Dynamic Signature Recognition
– Electronic documents with signature: contracts, mortgage agreements – Anything that needs signing
– Natural interaction that most users understand, but difficult on handhelds – Declaration of will
SLIDE 10
Applying risk analysis
Biometrics Authentication
SLIDE 11 Applying risk analysis
Enrolment
- Crucial for security and subsequent
performance
– In some context, identity of enrolee needs to be checked – Biometrics enrolled need to be
- genuine (see attacks)
- good enough quality to work
- Enrolment procedure needs to be formalised
– Staff need to be trained – Staff need to be trustworthy or closely checked
- Time taken to carry out enrolment often
under-estimated
SLIDE 12 Applying risk analysis
Failure to Enrol (FTE) & Failure to Acquire (FTA)
- FTEs and FTAs threaten Universal Access
- Reasons for FTE/FTA
– Biometric not present – Biometric not sufficiently prominent or stable
– wearing down of fingerprints, callouses (manual work, chemicals, sports, age), deformation, arthritis
– missing iris, very dark eyes, glasses or contacts (reflection or frame), drooping eyelids
– veils, eyepatches, headcoverings, severe disfigurement, inability to keep still
SLIDE 13 Applying risk analysis
Context
- International developments
– ICAO agreement – US Visit
– Stand-alone ID card for everyone over 16 – 3 biometrics (face, 10 finger, 2 iris) on card, and in National Identity Register – Access by govt departments, federated ID – Access by commercial organisations
SLIDE 14
Applying risk analysis
Example FTE rates from UKPS enrolment trial
3.91% 39% 2.73% Disabled 0.69% 12.30% 0.15% Quota Finger Iris Face
SLIDE 15 Applying risk analysis
False Acceptance Rate (FAR) & False Rejection Rates (FRR)
– accepting user who is not registered – mistaking one registered user for another – ICAO: FAR of .01% is regarded as acceptable
- FRR
- – rejecting registered user
- High FRRs reduce usability, high FARs reduce
security – customer-based applications tend to raise FAR
SLIDE 16 Applying risk analysis
Performance
- User performance depends on
– frequency of use:
- Frequent users complete faster and with fewer errors,
infrequent users need step-by-step guidance and detailed feedback
– Degree of cooperation – Total usage time (not just for matching)
SLIDE 17
Applying risk analysis
SLIDE 18
Applying risk analysis
SLIDE 19
Applying risk analysis
"W e w ere aim ing for it to scan 1 2 pupils a m inute, but it w as only m anaging 5 so has been tem porarily suspended as w e do not w ant pupils' m eals getting cold w hile they w ait in the queue."
Careful balancing of business process requirements and security requirements needed
SLIDE 20 Applying risk analysis
Total Usage Process
- Time quoted by suppliers often only refer to capture
- f live image & matching
– Walk up to machine – Put down bags, remove hats, etc. – Find token (if used) – Put on token (if used) – Read token – Wait for live image to be captured & matched – Walk away & free machine for next user – Plus average number of rejections & re-tries
Average usage time in BioPII 12-20 seconds, longer with infrequent users
SLIDE 21
Applying risk analysis
FRR rates from UKPS enrolment trial
16.35%
1 min 20 sec
8.22%
1 min 18 sec
51.57%
1 min 3 sec
Disabled 11.70%
1 min 13 sec
1.75%
58 sec
30.82%
39 sec
Quota Finger Iris Face
SLIDE 22 Applying risk analysis
Example: Disney Orlando
- Goal: revenue protection
- Technology: hand geometry
- Users: season ticket holders (4000)
- Performance:
– High FAR threshold (5% +) – Soft response to rejections – 9-10 secs, ops people grumble: 5 secs needed
SLIDE 23 Applying risk analysis
Example: Smartgate Sydney Airport
- Problem: speedy & secure immigration
- Technology: Face recognition system
- Users: Quantas air crew (2000)
- Performance:
– FAR “less than 1%” – FRR 2% – “could be faster” (average 12 secs)
- Several re-designs necessary, including updating of image
templates
SLIDE 24 Applying risk analysis
Usability Issues: Finger
- Which finger?
- How to position
– Where on sensor? – Which part of finger? – Straight or sideways?
- Problems: arthritis, long fingernails, handcreme,
circulation problems
SLIDE 25
Applying risk analysis
Which finger?
SLIDE 26
Applying risk analysis
Finger position?
SLIDE 27 Applying risk analysis
Usability Issues: Iris
- What is it – iris or face?
- One or both eyes?
- One eye: how to focus?
- Distance adjustment
- Positioning
– “rocking” or “swaying”
- Glasses and contact lenses
– about half of population wear them – Target area difficult to see when glasses are removed
SLIDE 28
Applying risk analysis
Focussing
SLIDE 29 Applying risk analysis
Height adjustment
- Often not sufficient for very short (under 1.55 m)
- r very tall (over 2.10) people, or wheelchair users
- Need to use hand to adjust
– If card needs to be held, other things users carry or hold need to be put down
SLIDE 30
Applying risk analysis
Height adjustment
SLIDE 31 Applying risk analysis
… but users may not realise this
… or be reluctant to touch equipment,
- r think it takes too long
SLIDE 32 Applying risk analysis
Usability Issues: Face
- What is it?
- Where do I stand?
- Where do I look/what am I looking at?
- Standing straight, keeping still
- “Neutral expression”
- Hats, changes in (facial) hair, makeup
SLIDE 33
Applying risk analysis
Distance
SLIDE 34
Applying risk analysis
“Neutral expression”
SLIDE 35 Applying risk analysis
UK Passport Service Trial
- Best performing: iris with “normal” users – FRR
4%
- Worst performing: face recognition with disabled
users - FRR 30%
- Verification time: 40-80 secs
- With a database of 10.000 people
SLIDE 36 Applying risk analysis
User Acceptance
– perceived need for security – trust in operator – convenience, or at least usability
SLIDE 37 Applying risk analysis
User Acceptance Issues –Finger
Hygiene
forensics/criminals
SLIDE 38
Applying risk analysis
SLIDE 39
Applying risk analysis
SLIDE 40 Applying risk analysis
Liveness detection
- Detects movement, pulse, blood flow
- Fitted to several systems, but tends to increase
FRR
- Users: fine, but do the criminals know about it?
SLIDE 41 Applying risk analysis
User Acceptance Issues - Iris
– Risk to health (e.g. damage to eyes, triggering epilepsy) – Covert medical diagnosis
- Illnesses (iridiology)
- Pregnancy
- Drugs
- “Minority Report” attacks
SLIDE 42 Applying risk analysis
User Acceptance Issues - Face
- Covert identification
- Surveillance/tracking
– Direct marketing
SLIDE 43 Applying risk analysis
User Acceptance – General Issues
- Data protection – threat to privacy
- Abuse by employer, commercial organisations,
state, or malicious individuals
– Increasing capability of technology – e.g. iris recognition at a distance – Integration with other technologies – e.g. RFID
– Sophisticated attackers – Can governement really keep systems secure? – Cheap systems and successful attacks erode confidence
SLIDE 44
Applying risk analysis
SLIDE 45
Applying risk analysis
SLIDE 46 Applying risk analysis
– Activate latent prints: breathing, bag with warm water
– Lift print with tape or photograph
(gummy bear attack) – lasts 1x
Attacks - Finger
SLIDE 47 Applying risk analysis
Attacks - Iris
– Picture of eye stuck on glasses
– Coloured contact lense
enrol and give you lenses & passport
coloured contact lense
SLIDE 48 Applying risk analysis
Attacks - Face
– Photo or video of person – Glasses
– Mask (Mission Impossible attack) http://www.heise.de/ct/english/02/11/114/bild7.jpg
SLIDE 49
Applying risk analysis
SLIDE 50 Applying risk analysis
Maintaing performance in continuing use
- Maintenance required to maintain performance,
e.g. cleaning of sensors
- Keeping systems secure from attacks (including
vandalism and insider attacks)
- Secure and efficient processes for dealing with
FRRs and FTE/FTA users
- Secure & efficient processes for new enrolments,
and secure re-enrolment in cases with high FRR
SLIDE 51 Applying risk analysis
Summary
- Biometrics have potential to reduce
users’ workload and improve business process, IF
- 1. systems are reliable, robust, easy to install,
maintain and use
- 2. Security of overall system can be assured
- 3. performance meets required level and can be
sustained in everyday use
- 4. Systems are accessible and acceptable to
users.
SLIDE 52 Applying risk analysis
Challenges
- Large public applications face additional issues
- Universal access
– System with best FTE performance (face) has worst FRR – Systems with better FRR have unacceptable FTE (for some applications) – Accommodating all users to provide universal access