Professional Documents
Culture Documents
Information Security
Joy Dutta
Exam Roll : 97/CSM/130033
M.Tech in CSE
2013 -15
Calcutta University
Protecting Your PC, Privacy and
Self
“The minute you dial in to your Internet service provider or
connect to a DSL or cable modem, you are casting your
computer adrift in a sea of millions of other computers –
all of which are sharing the world's largest computer
network, the Internet. Most of those computers are
cooperative and well behaved, but some are downright
nasty. Only you can make sure your computer is ready
for the experience.”
2
Agenda
♦ What information security?
♦ Why Biometrics?
♦ Fingerprint Patterns
♦ Advanced Minutiae Based Algorithm
♦ Identification vs. Authentication
♦ Security
♦ Applications
♦ Versus other Biometric Technologies
♦ Industry
3
What is Information Security?
♦ The practice of defending information from
unauthorized access, use, disclosure,
disruption, modification, perusal,
inspection, recording or destruction
♦ Process by which digital information assets
are protected
4
Understanding the Importance of
Information Security
♦ Prevents data theft
♦ Avoids legal consequences of not securing
information
♦ Maintains productivity
♦ Foils cyber terrorism
♦ Thwarts identity theft
5
Latest Trends - Identity Theft
♦ Crime of the 21st century
♦ Involves using someone’s personal
information, such as social security
numbers, to establish bank or credit card
accounts that are then left unpaid, leaving
the victim with the debts and ruining their
credit rating
6
Why Biometrics?
Why Biometrics?
♦ Biometrics is a security solution based on
something you know, have, and are:
8
Why Biometrics?
♦ Passwords are not reliable.
– Too many
– Can be stolen
– Forgotten
♦ Protect Sensitive Information
– Banking
– Medical
9
Why Biometrics?
♦ Has been used since 14th century in China
– Reliable and trusted
♦ Will never leave at home
♦ Fingerprints are unique
– Everyone is born with one
♦ 80% of public has biometric recorded in
China
♦ 50% of public in India is now Biometric
Recorded.
10
Fingerprint Patterns
Fingerprints
♦ A fingerprint in its narrow sense is an impression left by
the friction ridges of a human finger.
12
Fingerprint Patterns
Arch- The ridges enter from one side of the finger, rise in the
centre forming an arc, and then exit the other side of the finger.
Loop- The ridges enter from one side of a finger, form a curve, and
then exit on that same side.
13
Fingerprint Patterns
14
Fingerprint Patterns
♦ Minutiae
– Crossover: two ridges cross
each other
– Core: center
– Bifurcation: ridge separates
– Ridge ending: end point
– Island: small ridge b/w 2
spaces
– Delta: space between ridges
– Pore: human pore
15
Fingerprint Patterns
♦ Two main technologies used to capture
image of the fingerprint
– Optical – use light refracted through a prism
– Capacitive-based – detect voltage changes in
skin between ridges and valleys
16
Fingerprint matching techniques
17
Advanced Minutiae Based
Algorithm (AMBA)
Advanced Minutiae Based Algo
♦ Advanced Minutiae Based Algorithm
– Developed by Suprema Solutions
– Two processes
• Feature Extractor
• Matcher
19
Advanced Minutiae Based
Algorithm
20
Advanced Minutiae Based Algo
♦ Feature Extractor
– Core of fingerprint technology
– Capture and enhance image
– Remove noise by using noise reduction algorithm
– Extract Minutiae
21
Advanced Minutiae Based Algo
♦ Feature Extractor
– Most frequently used minutiae in
applications
• Points of bifurcation
• Ridge endings
22
Advanced Minutiae Based Algo
♦ Feature Extractor
– Minutiae Coordinate and Angle are calculated
– Core is used as center of reference (0,0)
23
Advanced Minutiae Based Algo
♦ Matcher
– Used to match fingerprint
– Trade-off between speed and performance
– Group minutiae and categorize by type
• Large number of certain type can result in faster searches
24
Identification vs. Authentication
25
Security
♦ Accuracy
– 97% will return correct results
– 100% deny intruders
♦ Image
– Minutiae is retrieved and template created
• Encrypted data
– Image is discarded
• Cannot reconstruct the fingerprint from data
26
Security
♦ Several sensors to detect fake fingerprints
– Cannot steal from previous user
• Latent print residue (will be ignored)
– Cannot use cut off finger
• Temperature
• Pulse
• Heartbeat sensors
• Blood flow
27
Advantage of Fingerprint:
28
Disadvantages of Fingerprint:
29
Applications
30
Applications
31
Versus other Biometric
Technologies
1 (worst) – 5 (best)
Fingerprint 5 5 4 4
Voice 1 5 5 5
Face 2 3 4 3
Hand 3 3 2 2
Iris 5 2 3 3
32
Versus other Biometric
Technologies
33
Industry ♦ Hot market
♦ Lots of $$$
34
Conclusion
♦ Want to protect information
♦ Passwords are not reliable; forget
♦ Fingerprints have been used for centuries
♦ next generation of fingerprint recognition devices which are highly
reliable and accurate
♦ Fingerprints are unique; can verify
♦ Very accurate
♦ a broad acceptance with the general public, law enforcement and the
forensic science community a broad acceptance with the general
public, law enforcement and the forensic science community
♦ Lots of applications being developed
♦ Hot market. Lots of $$$
♦ Hence, they will continue to be used for human recognition, for
Information Security & new systems that require a reliable biometric.
35
References
♦ http://spie.org/x108321.xml
♦ http://www.sans.org/reading-room/whitepapers/authentication/biometric-s
36
Thank You!!!