0% found this document useful (0 votes)
8 views3 pages

Module 10

The document discusses the vulnerabilities of traditional security methods like passwords and PINs, advocating for biometric security as a more reliable alternative. It outlines various biometric methods such as fingerprints, facial recognition, voice recognition, retinal scans, and iris scans, detailing their pros and cons. Additionally, it explains error rates in biometric systems, emphasizing the importance of lower False Acceptance Rate (FAR) and False Rejection Rate (FRR) for enhanced security and usability.

Uploaded by

dikerdiganto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

Module 10

The document discusses the vulnerabilities of traditional security methods like passwords and PINs, advocating for biometric security as a more reliable alternative. It outlines various biometric methods such as fingerprints, facial recognition, voice recognition, retinal scans, and iris scans, detailing their pros and cons. Additionally, it explains error rates in biometric systems, emphasizing the importance of lower False Acceptance Rate (FAR) and False Rejection Rate (FRR) for enhanced security and usability.

Uploaded by

dikerdiganto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

One of the main causes of identity theft is the compromise of passwords and PINs.

Why Biometric Security?


Keys (USB key), ID Card, ATM Card, etc. Usually these objects use tokens– unique
information that identifies the possessor of the object. Tokens can be static (ID
number or pattern that is stored on the object on a permanent basis) or dynamic
(Code to authenticate changes every time it is used).
Problems: Static tokens can be lost/ stolen/ duplicated. Dynamic tokens can be
compromised if the token holder is lost or stolen
Error Rate can be 2 types:
1. FAR- False Acceptance Rate: The probability that the system incorrectly
accepts an unauthorized person.
2. FRR- False Rejection Rate: The probability that the system incorrectly rejects
a legitimate (authorized) user.
Lower FAR Higher system security
Lower FRR  Higher system usability

The error rate where FAR=FRR ,Is called Equal error rate. This metric is used to
compare the overall accuracy of biometric systems. Lower EER indicates better
performance.

1. FingerPrints:
a. Local features called minutiae, differ from person to person.
b. Minutiae are quantified in terms of type, position, frequency, etc.
c. Pros:
i. Multiple samples increase accuracy
d. Cons:
i. Scan quality highly variable
ii. Susceptible to spoofing
iii. 1-3% public don’t have suitable fingerprints
2. Facial Recognition:
a. Multiple pictures are taken at enrollment to improve accuracy.
b. Pros:
i. Easy infrastructure
ii. Public acceptance
c. Cons:
i. Susceptible to aging,lighting and spoofing
ii. Accuracy is not high
3. Voice Recognition:
a. Voice is characterized by the voice tract (the physiological component)
and the voice accent (the behavioral component).
b. During enrolment, a voice print, which is composed of the voice tract,
is produced by making the subject repeat a phrase several times.
c. Pros:
i. Popular, low cost
d. Cons:
i. Poor accuracy
4. Retinal Scan
a. Based on the blood vessel pattern in retina
b. Infrared light is used to illuminate the retina
c. Pros:
i. High accuracy
d. Cons:
i. Susceptible to changes due to disease
ii. intruisive
5. Iris Scan:
a. Colored part of the eye, has 266 unique spots
b. Pros:
i. Very accurate
ii. Non-intruisive
iii. Iris is formed at around 8 months after birth and remains stable
through life.
c. Cons:
i. Specialized cameras required.
ii. Not well tested technology

You might also like