Unit 6 Flashcards

1
Q

Biometric

A

It relates to a measurement or set of measurements of human beings that can be used to identify them in the context of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Biometrics can be divided into two types:

A

1)Physiological biometric
2)Behavioral biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physiological biometrics

A
  • They do not normally change throughout a person’s life, at least not after that person has reached adulthood
    -Examples: fingerprint, iris pattern
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Behavioral biometrics

A
  • Do not normally change, but can change if the person put a sustained effort to change them
  • Gait or way of signing one’s name
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biometric security system main advantage

A

1) People automatically have their identity token with them
2) A biometric cannot be forgotten or left behind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Biometric security system main drawback

A

Many biometrics are not secret and so can be imitated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Gait

A
  • It is the way someone walks
  • It is a behavioral biometric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advantages of gait

A

1) Can be captured at a distance
2) Can be captured without the subject’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disadvantages of gait

A

1) It is relatively difficult to capture, normally involving working on a video sequence
2) It is also computationally intensive and so not suitable for real-time authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fingerprint

A
  • It has to do with the ridges and furrows on a fingertip
    -It is a physiological biometric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advantages of fingerprint

A

1) The ridge pattern on a fingertip stays the same throughout a person’s life (though it can become less pronounced), unless the fingertip is damaged
2) It is also highly distinctive - even identical twins have somewhat different fingerprints
3) A fingerprint is easy to capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disadvantages of fingerprint

A

1) An estimated 5% of people are not able to provide a fingerprint that is usable for security purposes due to an injury or worn-down ridges on the fingertip
2) It is also possible to lift a fingerprint off a surface and use it to produce a fake finger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Iris pattern

A
  • It is the pattern of the iris in the eye
  • It is a physiological biometric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advantages of iris pattern

A

It is unique for each eye and for each person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disadvantages of iris pattern

A

1) The capture does require the person’s cooperation so that the iris is at the correct distance from the camera (iris images can be captured at a short distance)
2) For some subjects, the light that is necessarily shone on the eye can cause irritation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name signature

A
  • The way someone signs their name, considering the way they hold the pen and the pressure exerted
  • It is a behavioral biometric
    (The signature itself is different from the way the hand moves the pen. The way the way the hand moves the pen has been studied recently with a view to capture it and using it in biometric security systems)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Advantages of name signature

A

It could well prove as acceptable as signatures themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disadvantages of name signature

A

How people sign their names and the signature produced do tend to change with time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Typing pattern

A
  • The way someone logs into their computer
  • This is the way the keys are pressed:
    • The pressure in which each key is tapped
    • The intervals between key taps
  • A behavioral biometric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Advantages of typing pattern

A
  • It has the potential to replace signatures for computer-based activities
  • Its capture does not require the subject’s cooperation, as the computer can be set up to capture it automatically at login
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Disadvantages of typing pattern

A

Underdevelopment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Personal odor

A
  • A physiological biometric
  • Devices to capture and analyze odor are very expensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Face

A
  • It is a set of measurements relating to various facial features
  • It is a physiological biometric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Disadvantages of face biometric systems

A
  • Electronic equipment still has difficulty with facial recognition
  • Facial characteristics tend to change with the effects of aging, facial expressions, disguises, different angles of the face to the camera and different lighting conditions
  • Close relatives may have similar facial biometrics
  • Currently, the use of this biometric requires the subject’s cooperation as they must stand a certain distance from the camera
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Voice

A
  • Can be considered as both behavioral and physiological biometrics
  • Behavioral because it relates to how people speak
  • Physiological, if it’s the frequency components of the voice that are being measured, as these relate to the vocal tract
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Advantages of voice biometrics

A

Voice recognition is useable at a significant distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Disadvantages of voice biometrics

A
  • Humans recognize voices much more readily than electronic equipment can
  • a sore throat can render a voice hard for a human to recognize, hence, it can make it impossible for electronic equipment to recognize
  • close relatives may have voices that are so similar that identification is difficult for electronic equipment.
  • Background noise is a problem for these systems.
  • A subject’s voice can be pre-recorded without their knowledge and used to fool the recognition system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Characteristics of biometrics

A

1) Distinctiveness
2) Permanence
3) Universality
4) Collectability
5) Acceptability
6) Performance
7) Circumvention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

1) Distinctiveness

A

Indicates how well the biometric separates one individual from another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

2) Permanence

A

Indicates how well the biometric remains the same over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

3) Universality

A

Indicates how commonly the biometric is found in humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

4) Collectability

A

Indicates how easy it is to measure the biometric and translate it into electronic format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

5) Acceptability

A

Indicates the degree of acceptance of the biometric by users

34
Q

6) Performance

A

Indicates the accuracy, speed, and robustness of the system using the biometric

35
Q

7) Circumvention

A

Indicates how easy it is to fool the system that uses the biometric

36
Q

Biometric security systems

A

are security systems that are able to recognize the identities of individuals based on one or more of their biometrics.
Such systems are often linked to or are part of an authorization system, which decides whether to allow or deny access to protected areas based on one or more tests to authenticate an identity

37
Q

The architecture of biometric security systems consist of:

A

1) Sensors
2)feature extractor
3) Storage
4) Matcher
5) Decision maker

38
Q

Block diagram of biometric security systems

A

see pg1

39
Q

Sensors

A

1) Devices that capture the raw biometric data of users
2) They can require contact with the biometric input, or they could be contactless
3) They influence the system’s convenience of use, acceptability, and reliability
4) They influence how secure the system is

40
Q

Feature extractor

A

1) Takes the raw data from the sensors as input, extracts from it the key features and converts them into a digital representation called a template
2) It can be seen as a form of non-reversible compression
3) Some systems encrypt the templates so that the data is better protected

41
Q

Aims of a feature extractor

A

1) To reduce the complexity of the original biometric sample
2) To decrease the resources required to store and process the biometric
3) To prevent the original biometric data from being reconstructed from the template

42
Q

The storage

A

~ It is a place to hold templates
~ The templates enrolled in the storage need to be protected and backed up
~ If a remote server is used, a secure communication link between the security system and the server is needed

43
Q

Examples of storage devices

A

1) Local storage medium such as a smart card
2) The storage facilities of a computer (a hard disk)
3) A remote server
The benefit of storing a database of templates is that multiple security systems can share the data

44
Q

The matcher

A

~ Compares the template created from an input biometric sample (the template outputted from the feature extractor) with a stored template
~ It measures the similarity (or differences) between the two templates and produces a quantitative reference such as similarity value

45
Q

The decision maker

A

~ Decides whether the input template and the stored template match, based on the similarity value from the matcher
~ The decision maker must be able to tolerate both Intra-class and Inter-class differences.
~ The sensitivity of the decision maker is controlled by one or more thresholds
~ The threshold is usually set by the system administrator based on the level of security required and operational statistics

46
Q

Intra-class differences

A

The differences between the templates of the same individual as each template from the same individual is likely to be slightly different due to many non-repeatable variations

47
Q

Inter-class differences

A

The differences between the templates of different individuals

48
Q

Biometric security systems operation modes

A

1) Enrollment mode
2)Recognition mode

49
Q

Enrollment mode

A

1) A user’s biometric data is captured by the sensors and then passed to the feature extractor to generate a template
2) The template will subsequently be sent to the storage medium for safe keeping
~To combat the inter-class differences and enhance the system’s reliability, the system usually enrolls multiple templates for the same individual
~Biometric templates are correctly associated with the user’s identity

50
Q

Recognition mode

A

1) A user’s biometric data is captured by the sensors and then passed to the feature extractor to generate a template
2) The matcher compares the newly created biometric template with one or more stored templates
3) The decision maker then takes into account the similarity measures produced by the matcher
4) The decision maker decides whether the input template matches the stored templates for that individual

51
Q

Identification

A

Refers to a process of identifying one individual from a population of individuals. It is therefore a one-to-many comparison process.

52
Q

During an identification process:

A

1) A biometric sample is taken from the individual and converted to a template
2) This template is compared in turn with each template in a database
~If only one exact match is found, the subject is identified
~When no exact match is found, the system usually offers the best matches instead, along with similarity values
The identification process can take considerable time

53
Q

Authentication

A

Refers to a process of confirming whether an individual is who he or she claims to be. It is therefore a one-to-one comparison process.

54
Q

During an authentication process:

A

1) A ‘live’ biometric sample is taken from the individual and converted to a template
2) This template is compared with stored templates of the same individual

55
Q

More on authentication:

A

~ Before the authentication, the user has to let the system know who they are, either by presenting something they have or something they know
~ An authentication process takes much less time to conduct and is suitable for real-time authentication applications

56
Q

Explain how does a simple facial recognition system works

A

~ The shapes and geometries of human faces are all different.
~ By establishing sufficient reference points on the face and
measuring the lengths between the reference points, it is possible to create a template that uniquely represents an individual.

57
Q

A facial recognition system is prone to errors, since sometimes a computer cannot accurately detect all reference points. What is an example of a solution for this issue?

A

Increase the number of measurements
~ If the number of measurements is increased, the differences between two templates from different individuals are likely to increase (Inter-class differences increase)
~ These extra measurements should help to distinguish one individual from another
~ However,
~ These extra measurements increase the time and effort involved in creating the template
~ If the number of measurements is increased, the differences between templates from the same individual are likely to increase as well (Intra-class differences increase)

58
Q

In a fingerprint, the most important features are

A

The ridge configurations

59
Q

Ridge configurations

A

are the way the ridge lines and the valleys between them are arranged

60
Q

The configuration of the ridge lines can be analyzed at three different levels

A

1) Global level
2) Local level
3) Micro levels

61
Q

At the global level, attention is paid to

A

singularities

62
Q

Singularities

A

are regions where ridge lines form high-curvature shapes

63
Q

Singularities are classified into three main types:

A

1) Loop (can be further broken down into left and right loops)
2) Delta (can be further broken down into normal arches and tented arches)
3) Whorl
Therefore, five major classes of singularities can be found from fingerprints
(Slide 34 for figure)

64
Q

General notes on singularities

A

~ The patterns on the ten fingertips should all be different, but they might also have some similar features
~ Some fingertips have only one singularity, but some have two types of singularity on one fingertip

65
Q

At the local level, attention is paid to

A

the ridge lines individually to identify the point where a ridge line is discontinuous

66
Q

The discontinuity points are called

A

Minutiae (minutiae is the plural of minutia)

67
Q

The most common types of minutiae are:

A

1) Termination
2) Bifurcation
3) Lake
4) Independent ridge
5) Island or point
6) Spur and crossover
(Figure on slide 35)

68
Q

At the micro level, attention is paid to

A

the fine intra-ridge details
~ Inside each ridge there are tiny sweat pores whose size ranges from 60 to 250 μm (micrometers)
~ These pores line the ridge along its entire length
~ Pore information such as density, position, and shape is highly distinctive
However, this information is not widely used by current automatic recognition systems because the reliable detection and analysis of this microscopic information requires very high-definition scanners

69
Q

Fingerprint sensors:

A

~ are specifically designed to capture details of the fingertip. The output of a fingerprint sensor is a raw image of the fingerprint.
~ are usually arranged in a two-dimensional array and protected by a transparent layer of glass or plastic.

70
Q

The two main fingerprint sensor types are:

A

1) Optical sensors
2) Solid state sensors

71
Q

How do optical sensors work

A

~ They capture images of fingerprints by using light-sensitive sensors to convert optical patterns into electrical signals

72
Q

The principal types of sensing element used in optical sensors are:

A

~ Charge-coupled devices (CCDs)
~ CMOS-based image sensors (complementary metal oxide silicon)

73
Q

Optical sensors work by:

A

1) Shining light on the fingertip, which is placed on the transparent sensing surface of the sensor
2) Detecting the light reflected back on to the light-sensitive sensors
~Ridges: are in contact with the sensing surface, so they either scatter or absorb the light, so they appear dark
~Valleys: are at a distance from the surface, so they allow the light to be reflected to the light-sensitive sensors, so they appear lighter

74
Q

Pros and cons of optical sensors:

A

~ Optical sensors are generally able to capture high-quality fingerprint images
~ Optical sensors physical size is much bigger than solid-state sensors
~ Optical sensors cannot be used in devices such as notebook computers or flash drives

75
Q

How do solid-state sensors work?

A

Solid state sensors consists in an all-in-one silicon chip with a two-dimensional sensory array placed directly on the chip.
When providing a fingerprint image, users touch the sensing surface of the chip directly.
Solid-state sensors convert thermal, capacitive piezoelectric or electric field information to electrical signals

76
Q

What is the most common type of solid-state sensors used?

A

Capacitive sensors are the most common type employed, because of their simplicity and low cost

77
Q

Compare between optical and solid-state sensor:

A

~ Solid-state sensors have a reduced physical size and cost compared to optical sensors
~ Both optical and solid-state fingerprint sensors can be designed to acquire images through users either touching them or sweeping their finger over them

78
Q

Touch sensors:

A

~ Have a large enough sensing area to cover the whole fingertip
~ Can capture the fingerprint in one go
~ Are more expensive and difficult to fit into small portable devices because of their size
~ Are simpler to produce and easier to use

79
Q

Sweep sensors:

A

~ Sweep sensors are usually only a fraction of the size of a touch sensor
~ A sweep sensor can only capture a ‘slice’ of the fingerprint at a time (users are required to sweep their finger over the sensing area)
~ Sweep sensors are cheaper and smaller in size
~ The sweep is required to be at a steady speed and pressure
~ Users require a degree of training and/or practice before they can master a smooth sweep action
~The sweep action ‘clean up’ the sensor on each sweep so that no latent fingerprint is left on the sensor (a problem suffered by touch sensors), which makes it more difficult for fraudsters to lift a latent fingerprint off a sensor in order to make a duplicate of it

80
Q
A