ga10 people and security lecture 3 biometrics
play

GA10 People and Security Lecture 3: Biometrics Applying risk - PDF document

GA10 People and Security Lecture 3: Biometrics Applying risk analysis Goals of this lecture Brief introduction to biometrics Context: ICAO,US Visit and the ID cards programme Issues with current equipment Performance


  1. GA10 People and Security Lecture 3: Biometrics

  2. Applying risk analysis Goals of this lecture • Brief introduction to biometrics • Context: ICAO,US Visit and the ID cards programme • Issues with current equipment – Performance – Usability – User Acceptance • How secure are biometrics?

  3. Applying risk analysis Basics on biometrics • Enrolment and subsequent – verification (through ID + biometric), or – identification (biometric only) • Full images or templates – Passports requires images, templates are more efficient • Size of database affects performance

  4. Applying risk analysis Physical biometrics • Fingerprint • Finger / Palm Vein • Hand geometry • Face recognition • Iris • Retina • Earshape

  5. Applying risk analysis Behavioural biometrics • Voice print • Dynamic Signature Recognition (DSR) • Typing pattern • Gait recognition • Heart rate analysis

  6. Applying risk analysis Fingerprint recognition • Applications – Authentication/Access control • Doors • PCs/laptops • US Visit programme (http://www.dhs.gov/dhspublic/interapp/content_multi_image /content_multi_image_0006.xml)

  7. Applying risk analysis Hand geometry • Applications – Authentication (e.g. INSPASS program) • Usability – Easier to position hand than fingers – Less susceptible to small injuries – Hygiene concerns

  8. Applying risk analysis Voice recognition applications • Applications – Speaker recognition – Telephony-based interactions (home banking and insurance) – Lie detector • Usability issues – Speaker training – Voice changes – colds etc. – Background noise

  9. Applying risk analysis Dynamic Signature Recognition • Applications – Electronic documents with signature: contracts, mortgage agreements – Anything that needs signing • Usability issues – Natural interaction that most users understand, but difficult on handhelds – Declaration of will

  10. Applying risk analysis Biometrics Authentication

  11. Applying risk analysis Enrolment • Crucial for security and subsequent performance – In some context, identity of enrolee needs to be checked – Biometrics enrolled need to be • genuine (see attacks) • good enough quality to work • Enrolment procedure needs to be formalised – Staff need to be trained – Staff need to be trustworthy or closely checked • Time taken to carry out enrolment often under-estimated

  12. Applying risk analysis Failure to Enrol (FTE) & Failure to Acquire (FTA) • FTEs and FTAs threaten Universal Access • Reasons for FTE/FTA – Biometric not present – Biometric not sufficiently prominent or stable • Finger – wearing down of fingerprints, callouses (manual work, chemicals, sports, age), deformation, arthritis • Iris – missing iris, very dark eyes, glasses or contacts (reflection or frame), drooping eyelids • Face – veils, eyepatches, headcoverings, severe disfigurement, inability to keep still

  13. Applying risk analysis Context • International developments – ICAO agreement – US Visit • UK ID legislation – Stand-alone ID card for everyone over 16 – 3 biometrics (face, 10 finger, 2 iris) on card, and in National Identity Register – Access by govt departments, federated ID – Access by commercial organisations

  14. Applying risk analysis Example FTE rates from UKPS enrolment trial Face Iris Finger Quota 0.15% 12.30% 0.69% Disabled 2.73% 39% 3.91%

  15. Applying risk analysis False Acceptance Rate (FAR) & False Rejection Rates (FRR) • FAR – accepting user who is not registered – mistaking one registered user for another – ICAO: FAR of .01% is regarded as acceptable • FRR • – rejecting registered user • High FRRs reduce usability, high FARs reduce security – customer-based applications tend to raise FAR

  16. Applying risk analysis Performance • User performance depends on – frequency of use: • Frequent users complete faster and with fewer errors, infrequent users need step-by-step guidance and detailed feedback – Degree of cooperation – Total usage time (not just for matching)

  17. Applying risk analysis

  18. Applying risk analysis

  19. Applying risk analysis "W e w ere aim ing for it to scan 1 2 pupils a m inute, but it w as only m anaging 5 so has been tem porarily suspended as w e do not w ant pupils' m eals getting cold w hile they w ait in the queue." Careful balancing of business process requirements and security requirements needed

  20. Applying risk analysis Total Usage Process • Time quoted by suppliers often only refer to capture of live image & matching – Walk up to machine – Put down bags, remove hats, etc. – Find token (if used) – Put on token (if used) – Read token – Wait for live image to be captured & matched – Walk away & free machine for next user – Plus average number of rejections & re-tries Average usage time in BioPII 12-20 seconds, longer with infrequent users

  21. Applying risk analysis FRR rates from UKPS enrolment trial Face Iris Finger Quota 30.82% 1.75% 11.70% 39 sec 58 sec 1 min 13 sec Disabled 51.57% 8.22% 16.35% 1 min 3 sec 1 min 18 sec 1 min 20 sec

  22. Applying risk analysis Example: Disney Orlando • Goal: revenue protection • Technology: hand geometry • Users: season ticket holders (4000) • Performance: – High FAR threshold (5% +) – Soft response to rejections – 9-10 secs, ops people grumble: 5 secs needed

  23. Applying risk analysis Example: Smartgate Sydney Airport • Problem: speedy & secure immigration • Technology: Face recognition system • Users: Quantas air crew (2000) • Performance: – FAR “less than 1%” – FRR 2% – “could be faster” (average 12 secs) • Several re-designs necessary, including updating of image templates

  24. Applying risk analysis Usability Issues: Finger • Which finger? • How to position – Where on sensor? – Which part of finger? – Straight or sideways? • Problems: arthritis, long fingernails, handcreme, circulation problems

  25. Applying risk analysis Which finger?

  26. Applying risk analysis Finger position?

  27. Applying risk analysis Usability Issues: Iris • What is it – iris or face? • One or both eyes? • One eye: how to focus? • Distance adjustment • Positioning – “rocking” or “swaying” • Glasses and contact lenses – about half of population wear them – Target area difficult to see when glasses are removed

  28. Applying risk analysis Focussing

  29. Applying risk analysis Height adjustment • Often not sufficient for very short (under 1.55 m) or very tall (over 2.10) people, or wheelchair users • Need to use hand to adjust – If card needs to be held, other things users carry or hold need to be put down

  30. Applying risk analysis Height adjustment

  31. Applying risk analysis … but users may not realise this … or be reluctant to touch equipment, or think it takes too long

  32. Applying risk analysis Usability Issues: Face • What is it? • Where do I stand? • Where do I look/what am I looking at? • Standing straight, keeping still • “Neutral expression” • Hats, changes in (facial) hair, makeup

  33. Applying risk analysis Distance

  34. Applying risk analysis “Neutral expression”

  35. Applying risk analysis UK Passport Service Trial • Best performing: iris with “normal” users – FRR 4% • Worst performing: face recognition with disabled users - FRR 30% • Verification time: 40-80 secs • With a database of 10.000 people

  36. Applying risk analysis User Acceptance • Acceptance requires – perceived need for security – trust in operator – convenience, or at least usability

  37. Applying risk analysis User Acceptance Issues –Finger • Hygiene, Hygiene, Hygiene • Association with forensics/criminals • Finger chopped off

  38. Applying risk analysis

  39. Applying risk analysis

  40. Applying risk analysis Liveness detection • Detects movement, pulse, blood flow • Fitted to several systems, but tends to increase FRR • Users: fine, but do the criminals know about it?

  41. Applying risk analysis User Acceptance Issues - Iris • Iris – Risk to health (e.g. damage to eyes, triggering epilepsy) – Covert medical diagnosis • Illnesses (iridiology) • Pregnancy • Drugs • “Minority Report” attacks

  42. Applying risk analysis User Acceptance Issues - Face • Covert identification • Surveillance/tracking – Direct marketing

  43. Applying risk analysis User Acceptance – General Issues • Data protection – threat to privacy • Abuse by employer, commercial organisations, state, or malicious individuals – Increasing capability of technology – e.g. iris recognition at a distance – Integration with other technologies – e.g. RFID • Doubts about reliability – Sophisticated attackers – Can governement really keep systems secure? – Cheap systems and successful attacks erode confidence

  44. Applying risk analysis

  45. Applying risk analysis

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend