A SEMINAR ON BIOMETRICS (FOR FOOL PROOF SECURITY

)

INTRODUCTION
Password based attacks  Advancement in technology  Powerful solution to illegal authenticationBIOMETRICS  Passwords are out , biometrics is in

DEFINITION  Biometrics is a means of using the physiological or behavioral characteristics of a person as a kind of permanent password. “  . “Biometrics is an automated method of recognizing a person based on a physiological or behavioral characteristic.

not the machine  .WHY MOVE TO BIOMETRICS? Cyber crimes and credit card thefts due to leakage of passwords  The person to be identified is required to be physically present at the point-of-identification  Biometric trait cannot be easily stolen or lost  Identifies the person.

THE BIOMETRIC MODEL User interface or the biometric reader  Communication Subsystem  The Controlling software  Data storage  .

BIOMETRIC MODEL Matching Score 95% Data Collection Decision Making Biometric Capture Template Extraction Verification Signal Processing Enrollment Storage .

BIOMETRIC CAPTURE IMAGE PROCESS 1010 0110 1101 IMAGE LIVE UPDATE TEMPLATE EXTRACT 1010 0110 1101 BIOMETRIC MATCHING 98% MATCHING SCORE STORAGE DEVICE STORED TEMPLATE .

BIOMETRIC TECHNIQUES Fingerprint Verification  Iris Recognition  Facial geometry  Hand and Finger geometry  Voice Biometry  Signature Verification  Keystroke dynamics  .

IMAGES OF BIOMETRIC TECHNIQUES .

”  uniqueness can be used as an additional security constraint  manner of typing .KEYSTROKE BIOMETRICS “The keystroke biometrics makes use of the interstroke gap that exists between consecutive characters of the user identification code.

IMPLEMENTATION DETAILS A database entry is created  Training period. consists of 15-20 iterations  Inter stroke allotted per user stroke interval between the keys is measured  The mean and standard deviation of the code are calculated  Mean= (1/n) x (i)  Standard deviation= {[ (X (i)-mean)] 2/n}  Leverage allotted per user  .

PERFORMANCE MEASURES The FAR is the percentage of unauthorized users accepted by the system  The FRR is the percentage of authorized users not accepted by the system  Standard deviation of the user‟s training period entry is used as a threshold  Balance is established by taking two factors into consideration  .

// Add the User to the database User count =1. // User count = User count +1 add (Inter-stroke gap). Password.ALGORITHM Input : User name. // Getting User name. . Output: Registration of a new user (or) Acceptance of a user if registered (or) Rejection of an unregistered user. main () { if (User==New) { read (User). if (Check (User. } else if (User count ==15) { update (User count). Password)) { if (User count<15) { update ( User count). add (Inter-stroke gap). read (Inter-stroke gap). User_id. // Time interval between consecutive characters Add user (database). } else if (User==Training) { read (User). Password read (Inter-stroke gap). User_id.

} } } .Calculate Mean (M).D). deviation)) Login. } } else if (User==Existing) { read (User). else exit(0). Standard deviation (S. read (deviation). Password. if (Check (User.

ANALYSIS OF INTER-KEYSTROKE TIMING OF USER CODE The „X‟ axis indicates the number of interkeystrokes and negative „Y‟ axis indicates the inter-keystrokes timing in milliseconds  Graph I shows the inter-keystroke timing analysis when the user is accepted  Graph II indicates inter-keystroke timing when the user is not legal or not following his rhythmic behavior of typing the access code  .

db=Database +R=+VE Graph I: Inter keystroke timing analysis when the user is accepted -R=-VE Boundary c=Current -R -R c -R c -R db c db db (L2) c (L3) db +R db +R +R +R +R +R c c c c db db db c -R -R c db -R (L1) -R +R +R +R (L4) ACCESS GRANTED .

db=Database Graph II: Inter keystroke timing when the user is not legal or not following his rhythmic behavior -R -R -R -R +R=+VE Boundary -R=-VE Boundary c=Current -R -R -R db db db db (L2) c db c db db -R (L1) c db db +R +R c +R +R +R +R c c (L3) c +R +R (L4) +R c ACCESS DENIED .

A MULTIMODAL BIOMETRIC SYSTEM It overcomes the limitations of individual biometric  This multi biometric system operates with an admissible response time  .

.

APPLICATIONS BIOMETRIC BANKING  INTERNET SECURITY  .

CONSTRAINTS IN KEYSTROKE BIOMETRICS “Does this technology have any constraints?”  What is the solution? The performance measure of Keystroke biometrics purely depends on User psychology  Positively Keystroke Biometrics will replace the entire traditional security systems in the future.  .

CONCLUSION Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy  Key stroke biometrics are used FOR FOOL PROOF SECURITY  .

Sign up to vote on this title
UsefulNot useful