Example: Data Mining for the NBA - The University of Texas at Dallas

Download Report

Transcript Example: Data Mining for the NBA - The University of Texas at Dallas

Introduction to Biometrics
Dr. Bhavani Thuraisingham
The University of Texas at Dallas
Lecture #4
Introduction to Biometrics
August 31, 2005
Outline
 Introduction to Biometrics
- What is Biometrics?
- What is the Process?
- Why Biometrics?
 Biometrics Resources
 What is Secure Biometrics
 Revisiting Topics to be covered
 Some exploratory research areas
 Some useful reference books
What is Biometrics?
 Biometrics are automated methods of recognizing a person
based on a physiological or behavioral characteristic
 Features measured: Face, Fingerprints, Hand geometry,
handwriting, Iris, Retinal, Vein and Voice
 Identification and personal certification solutions for highly
secure applications
 Numerous applications: medical, financial, child care,
computer access etc.
What is the Process?
 Three-steps: Capture-Process-Verification
 Capture: A raw biometric is captured by a sensing device
such as fingerprint scanner or video camera
 Process: The distinguishing characteristics are extracted
from the raw biometrics sample and converted into a
processed biometric identifier record
Called biometric sample or template
 Verification and Identification
- Matching the enrolled biometric sample against a single
record; is the person really what he claims to be?
Matching a biometric sample against a database of
identifiers
-
Why Biometrics?
 Biometrics replaces Traditional Authentication Methods
 Provides better security
 More convenient
 Better accountability
 Applications on Fraud detection and Fraud deterrence
 Dual purpose
- Cyber Security and National Security
Why Biometrics? (Continued)
 Authentication mechanisms often used are User ID and
Passwords
 However password mechanisms have vulnerabilities
- Stealing passwords etc.
 Biometrics systems are less prone to attacks
 Need sophisticated techniques for attacks
- Cannot steal facial features and fingerprints
- Need sophisticated image processing techniques for
modifying facial features
Why Biometrics? (Continued)
 Biometrics systems are more convenient
 Need not have multiple passwords or difficult passwords
- E.g., characters, numbers and special symbols
- Need not remember passwords
 Need not carry any cards or tokens
 Better accountability
- Can determine who accessed the system with less
complexity
Why Biometrics? (Concluded)
 Dual Purpose
- Cyber Security and National Security
 Access to computer systems and networks
 Fraud detection
- Who has intruded the system?
- Who has entered the building
- Surveillance and monitoring
 Fraud Deterrence
- Because of biometrics systems, people are nervous to
-
commit crimes
Stealing from supermarkets and shops, etc.
Biometrics Resources
 Biometrics Consortium is the major resource
- www.biometrics.org
 Another Resource
- http://www.biometricsinfo.org/
 Has Information on
- Who is doing what
 Academia,
-
Industry and Government
White papers on Biometrics technologies
 Fingerprint detection, facial recognition, Iris scanning,
----
Biometrics Resources: What is academia doing?
 Michigan State University
- Developing algorithms for fingerprint detection, etc.
 West Virginia University
- Forensic identification initiative
 San Jose State University
- Mathematical concepts
Biometrics Resources: What is Industry doing?
 Focus is on building faster and cheaper devices
 More accuracy, less false positives and negatives
 Incorporating biometrics into mobile devices, Smartcards
 Biometrics in healthcare: delivering medication to correct
patients
 Biometrics in child care: Children are picked up by those
authorized
 Protecting digital content
- Ensuring that voice and video are not altered
Vendors: http://www.biometricsinfo.org/vendors.htm
Biometrics Resources: What is Government
doing?
 NSA (National Security Agency)
- Research on protecting critical information systems
 DoD (Department of Defense)
- Biometrics Management Office
- Provide Armed forces access to Biometrics systems for
combat operations
 INS/DHS (Department of Homeland Security; Immigration and
Nationalization Service)
- Biometrics technologies at Airports
 NIST (National Institute of Standards and Technologies)
Major player in Biometrics
-
Activities of NIST
 Measurements, Testing and Standards is NIST’s mission
 Focus on Biometrics Standards
 Activities
- Biometrics Consortium
- Common Biometric Exchange File Format
- Biometric Interoperability, Performance and Assurance
-
Working Group
BioAPI Consortium
Various Standards
Activities of NIST (Continued)
 Biometrics Consortium is the Government focal point for
research, development and testing of Biometric products and
technologies
 Common Biometric Exchange File Format is a product of the
consortium to develop common fingerprint template formats
 Biometrics Interoperability working group promotes common
definitions and concepts for exchanging information between
national and international partners
 BioAPI consortium develops common Application
Programming Interfaces for biometrics technologies
Activities of NIST (Concluded)
 NIST is developing standards for the following:
- Finger image format for data Interchange
- Face image format for data interchange
- Iris image format for data interchange
- Signature image format for data interchange
 NIST is working with International standards organizations for
joint standards
- ISO (International Standards Organization)
What is Secure Biometrics?
 Study the attacks of biometrics systems
- Modifying fingerprints
- Modifying facial features
 Develop a security policy and model for the system
- Application independent and Application specific policies
- Enforce Security constraints
 Entire
face is classified but the nose can be displayed
- Develop a formal model
- Formalize the policy
 Design the system and identify security critical components
- Reference monitor for biometrics systems
Security Vulnerabilities
 Type 1 attack: present fake biometric such a synthetic
biometric
 Type 2 attack: Submit a previously intercepted biometric data:
replay
 Type 3 attack: Compromising the feature extractor module to
give results desired by attacker
 Type 4 attack: Replace the genuine feature values produced
by the system by fake values desired by attacker
 Type 5 attack: Produce a high number of matching results
 Type 6 attack: Attack the template database: add templates,
modify templates etc.
Security and Privacy for Biometrics
 Privacy of the Individuals have to be protected
 CNN News Release: August 29, 2005
- Distorting Biometrics Enhances Security and Privacy
- Biometric data converted to numerical strings by
-
mathematical algorithm for later use
If the mathematical templates are stolen could be
dangerous
Researchers have developed method to alter the images
in a defined and repeated way
Hackers steal the distortion not the original face or
fingerprint
Revisiting Topics Covered
 Unit #1: Biometrics and Other Emerging Topics in Information
Security (Lecture 1)
 Part I: Supporting Technologies (not included in Exam)
- Material from book Database and Applications Security,
CRC Press, Thuraisingham, May 2005
- Unit #2: Information Security (Lecture 2)
- Unit #3: Information Management (Lecture 3)
 Included a demo of suspicious event detection by Gal
Lavee; example of behavioral biometrics
Revisiting Topics Covered
 Part II: Introduction to Biometrics
- Unit #4: What is Biometrics? Why Biometrics? (Lecture 4)
 Chapter
-
1 of text book + material from
www.biometrics.org
Unit #5: Designing Biometrics Systems (Lecture 5)
 Chapters 2 and 3 of book + additional reference
material
Outline of the Course (Continued)
 Part III: Biometrics Technologies
- Chapters 4 – 9 + Reference material
- Unit #6: Finger Scan
- Unit #7: Facial Scan
- Unit #8: Iris Scan
- Unit #9: Voice Scan
- Unit #10: Physiological Biometrics
- Unit #11: Behavioral Biometrics
Outline of the Course (Continued)
 Part IV: Biometrics Application
- Chapters 10 – 14 + reference material
- Unit #12: Types of Applications
- Unit #13: Citizen Facing Applications
- Unit #14: Employee Facing Applications
- Unit #15: Customer Facing Applications
- Unit #16: Biometrics Markets
 Part V: Privacy and Standards
- Chapters 15 – 17 + Reference material, NIST activities
- Unit #17: Risks to Privacy
- Unit #18: Privacy Enhanced Biometrics Systems
- Unit #19: Biometrics Standards
Outline of the Course (Continued)
 Part VI: Securing Biometrics Systems
- Reference material
- Unit #20: Attacks to Biometric Systems
- Unit #21: Designing Secure Biometrics Systems
 Part VII: Prototypes and Products
- Reference material
- Unit #22: Overview of Prototypes and Products
- Unit #23: USVISIT and Other Biometrics Systems
Outline of the Course (Concluded)
 Unit #24 Conclusion to the Course
- Summarize what we have learnt and provide directions
 Appendix: Special Topics and Guest Lectures (Not included in
exams)
Data Mining for Biometrics Applications
 Towards end of the course given by me
- Privacy preserving data mining
 September 26, 2005 (tentative)
- Other special topics
 E.g., Image processing, October 24, 2005 (Tentative)
-
Some Exploratory Research Areas not covered
 DNA
 Ear shape
 Odor (human scent)
 Vein-scan (in back of hand or beneath palm)
 Finger geometry (shape and structure of finger or fingers)
 Nailbed identification (ridges in fingernails)
 Gait recognition (manner of walking)
Some Useful Reference Books
 Biometrics by John D. Woodward Jr., Nicholas M. Orlans,
Peter T. Higgins
- Paperback: 416 pages
- Publisher: McGraw-Hill Osborne Media; 1st edition
(December 19, 2002)
- ISBN: 0072222271
 Biometric Systems : Technology, Design and Performance
Evaluation by James Wayman (Editor), Anil Jain (Editor),
David Maltoni (Editor), Dario Maio (Editor)
Hardcover: 370 pages
- Publisher: Springer; 1st edition (December 16, 2004)
- ISBN: 1852335963
-