Biometrics Week 2 Flashcards

1
Q

What is authentication?

A

Is the process of verifying or determining the user’s identity.
A natural recognition capability for human being.
Automated authentication assign the task of authentication to machine for greater security, efficiency, and convenience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication can be?

A

Verification: Am I who I claim I am?
Or
Identification: who am I? (for finding a “wolves in a sheep clothes”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication can be Based on Different Concepts:

A

Knowledge
Possession
Biometrics
Any combination of the three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Knowledge Based Authentication

A

Something you know:
a password, pass-phrase, PIN…
Works reliably if they are not easily guesses, disclosed…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Problem with Knowledge based Approach

A

Problem:
difficult to remember,
easily guessed by imposters
Can be stolen or forgotten
Can be shared: a limited degree of accountability with transferability of credentials.
More than 15% of people seem to write their PIN on their ATM card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Possession Based Authentication

A

Something you have:
identity document, a token, a key, a card,..
Solve some of the problems with knowledge-based authentication forms:
No need to remember password
A limited degree of accountability with transferability of credentials.
The owner can tell if the card or token is stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Problem with possession-based approach

A

Possession could be:
lost,
stolen
shared
misplaced
forgotten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Benefits of Biometrics

A

Convenient: nothing to lose or remember
Can’t be guessed, stolen, shared or lost
Non-repudiation: Links an access to a person, not to a password or a card.
Protects against identity theft
Higher perceived degree of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Levels combos:

A

Know Have Are
Have Are
Know Have
Know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Major Factors Influencing the Adoption of Biometrics

A

Security

Higher security through non-repudiation

Can not be stolen/ easily reproduced/guessed

Convenience

Integral and distinctive part of human being

Set it up once and forget about it

Cost/Technology

Higher return on investment through higher protection

Drop in the price of biometric sensors

The underlying technology is becoming more mature

Products have attained higher level of accuracy and throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why Convergence?

A

Streamlined Provisioning/de-Provisioning
Single Point of enrollment
Lowered risk of penetration
Ease of Use

Shared Credentials
Reduced Cost
Lowered risk of credential sharing

Common Security Policies
Improved Accountability
Better Audit capability
Policies commensurate with overall corporate objectives
Compliance with Regulatory Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Biometrics Based Authentication

A

Biometrics = bio (life) + metrics (to measure)
Deals with automated methods of verifying or recognizing living persons based on their:
Biological characteristics (e.g., face, fingerprint, iris, hand geometry, retina)
Behavioral characteristic (e.g., signature, gait)
Combined (e.g., Voice)
No human involved in the authentication process
Should be done in real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Criteria for a Biometric Solution to be Applied for Authentication

A

Universality or Availability
Every person should have the characteristic

Uniqueness or Distinctiveness
Different persons should have different characteristics
Also referred to as having the discriminatory power

Permanence or Robustness
The characteristic should be time invariant
Should not change with varying operating condition

Collectable or Accessibility
The characteristic should be measurable quantitatively within reasonable time frame

Performance
It should be practical to collect and measure, and it should give an acceptable identification rate.

Acceptability
Users should not have an objection to collect/measure

Circumvention
Should not be too easy to fool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Applications of Biometrics Systems

A

Forensics
Government
Commercial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Taxonomy of uses of Biometrics Systems

A

Positive identification
Verifies that the submitted sample is from an individual known to the system
exp. Access to a budlings, access to a mobile device,..

Negative identification
Exp. Verifies that the submitted sample is from an individual not known to the system
Exp. Uses for preventing duplicate in welfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Basic Functions of a Biometric System

A

Capture
The process of measuring the biometric characteristics of a person using a sensing device

Process
The process of converting the biometric feature into a numeric format (template) that can be stored into the database

Enrolment
Registering a biometric template of a person in a database

Identification
Finding the template in a database that matches the live template at hand.

Verification
One-to-one process: matching a live template against a single stored template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Voice

A

Different from speech recognition
Based on the analysis of voice patterns and characteristics such as pitch, tone,..
Voice signal is transformed and digitized
Speaker verification can be:
Text-dependent, text-independent, language independent, language dependent
Can be used for authentication over phone

Weaknesses
Background noise (airplanes)
Voice can be affected by the person’s health, emotion, …
It can be mimicked, recorded and re-played.
Lengthy enrollment
Attacks:
Tape recordings
Identical twins or people with sound-alike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Facial Recognition

A

A very natural process to human being
Analyze the unique shape, pattern, and position of facial features
Can be based on still or video images
Face biometrics can be applied covertly, and without person’s cooperation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

2D Facial Recognition

A

A template can be created from a standard webcam
There is no contact with a sensor
Can be done from a far distance
Highly affected by lighting, position, eyeglasses, facial expressions
Relies heavily on controlled environment resulting in a high failure rate
Technologies for face recognition
Eigen face approach: Face appearance
Feature geometry: feature-based method
Neural network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

3D Facial Recognition

A

Uses real-time capture of three-dimensional images of a subject’s face
The uniqueness of the person’s cranio-structure (skull curvature,..) is extracted and stored as a biometric template
Not affected by lighting, background colors, facial hair or makeup,
Uses structured light in near-infrared range where a projector shoots an invisible structured light pattern onto the face, and a video camera records the pattern distorted by the face’s surface geometry
A 3D mesh of the face is created by means of triangulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Iris Recognition

A

Measures the features associated with the random texture of the colored part of the eye
Based in visible features i.e.
rings, furrows, freckles, and the corona
Requires cooperation from the user
Weakness:
fear and discomfort, proprietary acquisition devices.

Highly accurate
Very stable over-lifetime
It works perfectly even with glasses and contacts
It can be affected though by some diseases such as cataracts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Iriscode

A

Uses near infrared sensors at a distance of 6 inch to 2 ft
You can measure up to 255 unique features. Features and their locations are used to form the iriscode, which is the digital template
Iris picture can be captured using a normal CCD camera with a resolution of 512 dpi or higher
Different Iriscodes care compared using Exclusive OR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Retina Scan

A

Based on the vascular structure at the back of the eye:
The pattern of blood vessels that emanate from the optic nerve and disperse throughout the retina depends on individuals and never change
An infrared light source is shone through the eye’s pupil to luminate the retina
Extremely accurate and secure
No two retinas are the same even for identical twins

It is considered intrusive, it can reveal some medical conditions, such as hypertension
Requires the user to remove eyeglasses
Long capture time, with 5-15 sec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Most Significant Test Measures of Biometrics Systems

A

False Matching Rate (FMR)
False Non-Match Rate (FNMR)
Failure to Enroll (FTE)
Equal-Error-Rate (EER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

False Matching Rate (FMR)

A

Also referred to as False Acceptance Rate (FAR)
The ratio between numbers truly non-matching samples, which are matched by the system and total numbers of test.
It is the probability that a user making a false claim about her identity will be verified as that false identity
It usually tell you the strength of the matching algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

False Non-Match Rate (FNMR)

A

Also referred to as False Rejection Rate (FRR)
The ratio between numbers truly matching samples, which are not matched by the system and total numbers of test.
It is the probability that a user making a true claim about her identity will be rejected as herself.
It usually tell you the accuracy and robustness of the matching algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Failure to Enroll (FTE)

A

It is the probability that a user attempting to biometrically enroll will be unable to.
Vendors usually use the Rule of Three.
It usually tell you the coverage for the population that the biometric system has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Equal-Error-Rate (EER)

A

The point on the error rate diagrams where the false match and false non-match are equal
Can be computed from the crossover point of FRR/FAR or using the Receiver Operating Characteristics (ROC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Convergence?

A

Formal Cooperation between (at least) two separate security functions
Streamlined Provisioning/de-Provisioning
Shared Authentication Credentials
Common Security Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Where is Convergence?

A

Commercial
Proprietary Enterprise Systems
Federal
FIPS 201/PIV
Standards driven
Open interoperable system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Physical Access Control

A

Support multi-factor authentication in many combinations
Fingerprint biometrics
Face biometrics
Proximity cards
Smart cards
Personal Identification Numbers (PIN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Logical Access Control

A

Multi-factor Authentication
Solution that uses a wide range of strong authentication methods.

Enterprise Network Logon
for desktop and network security.

Enterprise-level Single Sign On for
Windows and Web applications.

Managed by a robust and extensible Role- Based Access
Control Policy Engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Common Credentials
/Policies) use?

A

Both physical and logical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Benefits – Converged System

A

Common policies across physical and logical access
Role-based Authorization
Harmonized security privileges

Centralized Enrollment Processes
Similar models for Commercial and Government systems

A range of Authentication Factors can be coordinated
Authentication factors can be “cascaded”
Events can be coordinated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Smart Cards

A

Card with the capability to store and/or process information for a particular application

Can store financial, personal, and specialized information

Types of smart cards
Memory: only memory card;
more storage than the magnetic strip
Microprocessor: Memory, processor, and co-processor to support cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Driving Factors for the Smart Cards

A

Declining cost in the price of smart cards
From $15 in the 1980’s to couple of dollars in 2000, to sub-dollars now
Fears that magnetic strip cards can’t provide the necessary security against fraud and security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Forms of Smart Cards

A

Smart cards come in two forms
Contact
Contact-less.
May contain its own battery,
Most of the times, the power is supplied by an inductive loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Contact Smart cards

A

Identified by its gold connector plate
ISO Standard (7816-2) defined eight contacts,
Though only 6 are actually used:

8 metallic pads on the surface:
Vcc: supply voltage - generally, 5 volts.

GND: ground reference

RST: Reset is the signal line that is used to initiate the state of card- Reset the microprocessor

Clock: used drive the logic of the IC (Clock Signal)

Vpp: used for the high voltage signal that is necessary to program the EPROM memory.

Serial input/output (SIO) connector: used to receive commands and interchanges data with the outside world.
2 RFU: reserved for future use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Smart Card Hardware

A

Microprocessor unit (MPU) 32-bit RISC

I/O Control: manage the flow of data in/out of the card
RAM: for temporary storage

ROM for Chip OS (COS) or Mask

EEPROM: Application memory
(Electrically erasable programmable ROM)
For permanent application data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Chip OS (COS)

A

A Chip OS is required to:
Manage data in/out of the card
Manage of files
Access the data and function
Management of card security
Maintain reliability, interrupt, data consistency, error recovery

A COS can be
General purpose COS for all applications

Dedicated COS for specific applications

No standard COS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Security Features of Smart Card

A

Card level protection by several passwords
Card get reset in case of hardware attack
File level security
Secret password based
A second password based
External authentication
Encrypted

Mutual authentication

42
Q

Mandatory – PIV Card Storage - Interoperability

A

Two Index Fingers
Templates generated from segmented 10-print enrollment images
Stored as ANSI/INCITS 378 templates
PIV Card fingerprint templates
Interoperable PIV Card fingerprint templates can only be read through the contact interface following entry of a PIN

43
Q

PIV Card Interoperability

A

PIV Card used for Logical and Physical Access
Logical Access primarily based on PKI
PIN required for access to private key and other data
Physical Access systems typically not configured for PKI
Physical Access systems typically based on contactless readers for throughput and durability

Questions/Concerns

How to achieve interoperability across both logical and physical access whilst meeting the demands of both environments?

44
Q

PAC Biometric Readers – contactless interface

A

Interoperable PIV Card fingerprint templates can only be read through the contact interface following entry of a PIN
However, the card holder unique ID (CHUID) can be read from the contactless interface and without a PIN
Also, Agency-specific data (biometric template) can be written to PIV Card and accessed via contactless interface
Can appropriate biometric PAC Scenarios for FIPS 201 be established using the CHUID and biometric template?

45
Q

PAC Biometric Readers – Operational biometric templates

A

SP 800-76, Sec. 1.2 states:
“…for both logical and physical access applications, and for applications using biometric data stored either on or off the PIV Card, this document neither requires nor precludes the use of:

The PIV Card fingerprint templates;
Specific authentication paradigms such as match-on-card;
Data from other biometric modalities (e.g., hand geometry, iris, etc.);
Data formatted according to other standards;
Data whose format is proprietary or otherwise undisclosed.”

46
Q

PAC Biometric Readers – PIN

A

Biometric Industry Association Viewpoint:
PIN entry is not necessary for Minutiae templates
Previous privacy issues related to full fingerprint images
Biometric Templates stored on PIV Card are digitally signed
A live version of the biometric sample is required for verification
Mutual Authentication between card and reader can provide template privacy

Consider 2-factor Authentication Use Cases with Contactless Access to PIV Card and Biometrics

47
Q

Summary scenarios

A

Read off slides

48
Q

Authentication can be Based on Different Concepts:

A

Knowledge
Possession
Biometrics
Any combination of the three

49
Q

Biometrics Based Authentication

A

Biometrics = bio (life) + metrics (to measure)
Deals with automated methods of verifying or recognizing living persons based on their:
Biological characteristics (e.g., face, fingerprint, iris, hand geometry, retina)
Behavioral characteristic (e.g., signature, gait)
Combined (e.g., Voice)
No human involved in the authentication process
Should be done in real-time

50
Q

Facial Recognition

A
51
Q

Most Significant Test Measures of Biometrics Systems

A

False Matching Rate (FMR)
False Non-Match Rate (FNMR)
Failure to Enroll (FTE)
Equal-Error-Rate (EER)

52
Q

Fingerprints how it works

A

Based on the ridges of the fingers
Very mature technology especially in forensic applications
Can use live-scan or inked impression

53
Q

Fingerprints consideration

A

Fingerprints don’t change over time

Things to consider:
Small population might not be able to use it because of cuts, scars, occupational requirement.
Requires a contact with a sensor
Highly associated with law enforcement

Attacks on Fingerprints
Finger decapitation
“Gummy” fingers
Defenses
Measure physical properties of a live finger (pulse, oxygen level).

54
Q

Friction Skin Anatomy

A

Minute ridges with furrows between them are present on the inside surface of hands and feet of human beings.

Such a structure, called friction skin, allows for:
Good grip
Good sense of touch
Exudation of perspiration

The structure and function of friction skin is different from other skin that covers our fingertips:
Not covered by hair
Does not contain oil glands
It contains a high concentration of nerve endings and sweat glands
A lack of pigmentation

55
Q

Permanence and Uniqueness of Fingerprints

A

Fingerprints are permanent marks on the skin. They are formed at the fetal stage and stay the same throughout lifetime.
Fingerprints of an individual are “unique” features of the individual; different person, even identical twins, have distinctive fingerprints.
Around 4% of the human population though might be born without fingerprints or their fingerprints might have deteriorated

56
Q

Applications of FP: Government

A

Criminal records
Finger prints for diplomats and military personnel
National identity card
E-voting

57
Q

Applications of FP: Forensic

A

Link a person to the crime place
Link person to previous records (history)

58
Q

Applications of FP: Civil and Commercial Applications

A

Banking
Welfare
Smartcards
Access Control
Time and Attendance

59
Q

Fingerprint Authentication System

A

Sensing
Feature extraction
Matching

60
Q

Fingerprint Sensing

A

Taking an imprint of the fingertip
On-line acquisition or off-line fingerprint acquisition using the ink-technique.
Nowadays, live-scan is the most widely fingerprint acquisition technique used.

61
Q

Off-Line Acquisition

A

Adv: possibility of producing rolled impression

62
Q

Specifications for a Good Fingerprint

A

Considerations
Resolution
Area
Dynamic range
Image quality
Signal to Noise

63
Q

FP Scanning: Scanners

A

Sweep and touch systems

64
Q

Live-Scan

A

3 Main categories:
Optical sensors
Solid-state sensors or silicon sensors
Ultra-sound sensors.

Additional
Multispectral
3-D touchless

65
Q

Feature Extraction

A

A fingerprint is produced when a fingertip is pressed against a smooth surface producing ridges (black in the picture) and valleys (white).

66
Q

Levels of Fingerprint Features

A

Level 1: refers to macroscopic patterns formed by the flow of the ridges
Level 2: refers to major ridge path deviations, also known as minutiae.
Level 3: refers to intrinsic or innate ridge formations: the alignment and shape of each ridge unit, pore shape, and relative pore positions).

67
Q

Level 1 Features–Singularities

A

Singularities are regions where ridges assumes distinctive shapes:
– Loop, delta, whorl, core

68
Q

FP Classification

A

Used as index for searching a large DB of fingerprints.
FP can be broadly classified into:
Left and right loop, whorl, Arch and tented Arch

69
Q

Fingerprint Class Distribution

A

5% of the FP have Arch type

65% of the FP have Loop type

30% of the FP have Whorl type

70
Q

Level 2: Minutiae.

A

Minutia: refers to various ways that a ridge can be discontinued
For each minutia, we keep:
the x,y coordinates
The angle of the tangent line to the ridge with the x-axix

The FBI model considers only termination and bifurcation minutiae

71
Q

Level 3: Sweat Pores

A
72
Q

Steps for Feature Extraction

A

Local Ridge Orientation
Local Ridge Frequency
Singularity Detection
Segmentation
Fingerprint Enhancement
Binarization
Thinning
Feature Extraction

73
Q

Fingerprints: Strength and advantages

A

Fingerprints are unique
Fingerprints are not time-variant
A very mature and proven core technology
It can provide a high level of accuracy
It can be deployed in a range of environments
Uses ergonomic and easy-to-use devices
Numerous sources (ten fingers) available for collection

74
Q

Fingerprints: Disadvantages or weaknesses

A

Associated with crime control/investigation
Require user cooperation
Cuts and scars will affect fingerprints
Sensor interoperability
Hygiene: Important to keep capture surface clean
Most devices are unable to enroll some small percentage of users

75
Q

What can we learn from a Speech?

A

Message,
Language,
Speech disorders/pathologies,
Emotional state, and
Speaker identity

Voice Biometric: Automated use of voice as the biometric trait to recognize speakers

76
Q

‘Speaker Identity’ in the Speech Signal

A

Physiological factors: Vocal tract characteristics, articulatory organs: dimension of vocal cavities, length of vocal tract and folds, etc.

Linguistic Habits: phonological, prosodic (emotional state of the speaker, sarcasm, focus,…), linguistic and semantic habits (influenced by geographic, family, socio-cultural and professional factors)

77
Q

Multiple Level of Speaker Individuality in a Speech

A

Idiolectal: how a speaker use a specific linguistic system
Considered as a linguistic pattern unique among speakers
Determining factors include:
Family, level of education, sociological, region,…

Phonotactics: describes the use by each speaker of the phonemes units and possible realizations available.

Not all languages have same phonemes
Key in foreign language training

78
Q

Advantages of Speaker Verification

A

Automatic and natural (unlike fingerprinting),
Low cost of input device: Can use standard microphone or telephone set
Low cost of processing using DSP technology,
Telemetric - Most suited modality over the telephone
User friendly - non-invasive, lacks the negative perceptions associated with other biometrics such as fingerprint
Can collect samples from uncooperative subjects.
Can be combined with challenge/response techniques

79
Q

Disadvantages of Speaker Verification

A

Affected by pathological changes in physical characteristics (cold)
Less unique than fingerprints, iris,, retina,…DNA.
more susceptible to replay attacks than other biometrics.
Its accuracy is challenged by low-quality capture devices, ambient noise, channel, distortion and so on.
Temporal drift
The large size of the template limits the number of potential applications.

80
Q

EXAMPLE QUESTIONS

A
81
Q

A natural recognition capability for a human being is known as?

A

AUTHENTICATION

82
Q

T or F Verification confirms who am I?

A

FALSE

83
Q

Authentication can be based off the following concepts:

A

Possesion
Biometrics
Knowledge

84
Q

What is not a problem for posssesiop based authetication compared to knowledge based?

A

No need to remember the password

85
Q

A major drawback of knowledge based?

A

Can be guessed by imposters

86
Q

Which of these options is not a biological characteristic: Gait. hand geometry, face, fingerprint

A

Gait

87
Q

T/F: In biometric authenttication no human is involved in the authetication process

A

True

88
Q

What is meant by Non-repudent in biometric system authetication

A

Access is linked to a person

89
Q

What is a predesesor to modern biometric systems/tech?

A

Antropometry

90
Q

Which of the following is not a criterion for biometric features: )Accesibility. Permanence. Circumvention, Universality)

A

Universality

91
Q

List 5 basic functions of biometric systems sequentially:

A

Capture, Process, Enrollment. Identification, Verification

92
Q

Verification is considered 1 to many T/F?

A

False

93
Q

Identification “ Am i who I claim to be?” T/F

A

False

94
Q

What is convergance in relation to biometric tech in support of identification and access control?

A

Formal cooperation between atleast 2 seperate security functions

95
Q

A key selling point of integration of biometric tech in access control/time and attendence measures is?

A

Clear return on investment

96
Q

Convergance allows for?

A

Streamlined provisioning. Shared credentials, common security policies

97
Q

Contact smart card ISO standard (7816-2) defined how many contracts?

A

8

98
Q

Contact smart card ISO standard (7816-2) , how many are actually being used?

A

6

99
Q

Chip OS is required for smart card tech to ensure?

A

Data access and functionality

100
Q

In implementing a biomtric solution when do u consider a smart card?

A

Security and confidentiality of the record is important

101
Q

What is not an advantage of smart card tech?

A

Scalability of the solution

102
Q

Smart cards under development can do all the processing on the card?TF

A

True