Unit 1 Slo2
Unit 1 Slo2
2
Identification and Authentication
Identification Authentication
3
Why Biometric?
• User authentication methods can be broadly classified into
three categories as shown in Figure, know, have, and are.
• Because a biometric property is an intrinsic property of an
individual, it is difficult to surreptitiously duplicate and nearly
impossible to share
Know
Be Have
4
Why Biometric
• Passwords are not reliable.
• Too many
• Can be stolen
• Forgotten
• Shared
• Many passwords easy to guess
• PIN Can be duplicated
• PIN can be Lost or stolen
• PIN a weak link(Writing the PIN on the card)
5
Why Biometric?(Cont..)
Frauds in industry happens in the following situations:
6
Biometric System (Cont..)
• A biometric system may operate either in
verification mode or identification mode.
A. Verification mode:
“Does this biometric data belong to Bob? ”
B. Identification mode:
“Whose biometric data is this? ”
7
Biometric System (Cont..)
Template
Enrollment
8
Biometric System (Cont..)
Claimed identity
Login Feature
Matcher System
Interface Extractor
Database
One template
Get Name & Snapshot Extract Features One match
True / False
Verification
9
Biometric System (Cont..)
Login Feature
Matcher System
Interface Extractor
Database
N templates
Get Name & Snapshot Extract Features N match
User’s identity or
Identification “user unidentified”
10
Biometrics
by Alvaro E. Escobar 11
Biometrics
by Alvaro E. Escobar 12
Biometrics
◼ Identification and verification:
• Finger scan
• Iris scan
• Retina scan
• Facial scan (optical and infrared)
◼ Verification only:
• Hand Geometry
• Voice Print
• Keystroke Behavior
• Signature
◼ Other Biometric Technologies in the making.
by Alvaro E. Escobar 13