Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com



Similar documents
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

May For other information please contact:

Application of Biometric Technology Solutions to Enhance Security

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

De-duplication The Complexity in the Unique ID context

MORPHO CRIMINAL JUSTICE SUITE

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Accessing the bank account without card and password in ATM using biometric technology

WHITE PAPER. Let s do BI (Biometric Identification)

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Assignment 1 Biometric authentication

solutions Biometrics integration

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

22 nd NISS Conference

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

French Justice Portal. Authentication methods and technologies. Page n 1

IDENTITY SOLUTIONS FOR A BETTER WORLD

Voice Authentication for ATM Security

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Trends in Finger Vein Authentication and Deployment in Europe

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

Multi-Factor Authentication of Online Transactions

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach

MegaMatcher Case Study

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometrics in Physical Access Control Issues, Status and Trends White Paper

BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY 1 BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY INCREASES

Multi-Factor Biometrics: An Overview

Framework for Biometric Enabled Unified Core Banking

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

A Various Biometric application for authentication and identification

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Authentication Solutions Through Keystroke Dynamics

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Opinion and recommendations on challenges raised by biometric developments

BIOMETRICAL IDENTITY MULTI-MODAL SOLUTIONS

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition

Finger Vein digital biometric signature: use cases

Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

W.A.R.N. Passive Biometric ID Card Solution

Two-Factor Authentication Making Sense of all the Options

Development of Academic Attendence Monitoring System Using Fingerprint Identification

ONYX Mobile Touchless Fingerprint Biometrics

The Leading Provider of Identity Solutions and Services in the U.S.

Smart Card in Biometric Authentication

Alternative authentication what does it really provide?

Report to the Council of Australian Governments. A Review of the National Identity Security Strategy

Oracle Identity Governance - Complete Identity Lifecycle Management

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Global Deployment of Finger Vein Authentication

SAMAY - Attendance, Access control and Payroll Software

MarketsandMarkets. Publisher Sample

Mobile Onboarding for Bank Customers, Including KYC, Biometrics and Payments

Department of Homeland Security

An Implementation of Secure Online Voting System

NFC & Biometrics. Christophe Rosenberger

White paper. Biometrics and the mitigation of card-related fraud

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Moving to Multi-factor Authentication. Kevin Unthank

BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION

BIOMETRIC SOLUTIONS 2013 ISSUE

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

DigitalPersona, Inc. Creating the authentication infrastructure for a digital world.

Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Aadhaar. Authentication Framework. Version 1.0. Unique Identification Authority of India (UIDAI)

Security Model in E-government with Biometric based on PKI

The Convergence of IT Security and Physical Access Control

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Hitachi to Expand Finger Vein Authentication System Business on a Global Basis

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

The Convergence of IT Security and Physical Access Control

Business Banking Customer Login Experience for Enhanced Login Security

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Information Security Basic Concepts

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

COMPARISON OF VARIOUS BIOMETRIC METHODS

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

PalmSecureID for the EDUCATION MARKETPLACE

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Transcription:

www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com In this paper we have discuss the s security.the biometrics term is becoming highly important in computer security world. The human physical Characteristics like fingerprints, face, hand geometry, voice and iris are known as biometrics. s is the today s high security application help for the minimized the error system rate and unauthorized access. In this term paper discuss about the future and present use of s security and various type of the s. Introduction: s is the physical security approach in this used the physical characteristics of the human body like face, hand geometry, voice, fingerprints and iris for the security purpose. The main goal of the s is providing the security for prevents unauthorized access to the third party. s used for the Specific to physiological and behavioral characteristics. Mainly s have is two type of categories Physiological and Behavioral. Physiological also known as static biometrics: s based on data derived from the measurement of a part of a person s anatomy. For example, fingerprints and iris patterns, as well as facial features, hand geometry. Behavioral biometrics based on data derived from measurement of an action performed by a person and, distinctively, incorporating time as a metric, that is, the measured action. For example, voice (speaker verification). Enrollment Stored Templates System Test Pre-Processing Feature Extractor Template Generator Matcher Test Sensor How a system works: 1. users. Device Device Enrollment 2. 3. Verification 4 5 Business Application Application Devices Template Storage Template Storage Preeti, IJECS Volume 3 Issue 2 Feb, 2014 Page No.3864-3868 Page 3864

(1)Firstly capture the chosen biometric (2)after choosing the biometric then process the biometric and extract and enroll the biometric template; (3) after enroll the biometrics template store the template in a local repository, a central repository, or a portable token such as a smart card; (4) live-scan the chosen biometric;(5) process the biometric and extract the biometric template; (6) match the scanned biometric template against stored tem-plates; (7) provide a matching score to business applications; (8)record a secure audit trail with respect to system use. s Application: (i)forensic The use of biometric in the law enforcement and forensic is more known and from long date, it is used mainly for identification of criminals. Identification of criminals- The biometrics is also used for identify the criminal through the fingerprints of the criminal which is left by the criminal at the crime scene. Collecting the evidence in the scene of crime (e.g., fingerprints) it is possible to compare with data of suspects or make a search in the database of criminals. Through this process the police caught the criminal easily. Surveillance --using cameras one can monitor the very busy places such as stadiums, airports, meetings Probation and home arrest - biometric can also be used for post-release programs (conditional released) to ensure the fulfillment of the probation, parole and home detention terms. (ii)government There are many application of the biometry in the government sector. An AFIS is the primary system used for locating duplicates enrolls in benefits systems, electronic voting for local or national elections, driver's license emission, etc. in the card and in the database for the later use during the voting. The purpose is to prevent the duplicate registration and voting. Driver's licenses - In many countries the driver license is also used as identification document, therefore it is important to prevent the duplicate emission of the driver license under different name. With the use of biometric this problem can be eliminated. Benefits Distribution (social service) - the use of biometry in benefits distribution prevents fraud and abuse of the government benefits programs. Employee authentication - The government use of biometric for PC, network, and data access is also important for security of building and protection of information. Military programs - the military has long been interested in biometrics and the technology has enjoyed extensive support from the national security community. (iii)commercial Banking and financial services represent enormous growth areas for biometric technology, with many deployments currently functioning and pilot project announced frequently. Some applications in this sector are: National Identification Cards - the idea is to include digital biometric information in the national identification card. Voter ID and Elections - During the registration of voter, the biometric data is captured and stored Account access - The use of biometric for the access to the account in the bank allow to keeping definitive and auditable records of account access by employees and customers. Preeti, IJECS Volume 3 Issue 2 Feb, 2014 Page No.3864-3868 Page 3865

ATMs - the use of biometric in the ATM transaction allows more security, Online banking - Internet based account access is already widely used in many places, the inclusion of biometric will make more secure this type of transactions from home. Telephony transaction - Voice-scan biometric can be used to make more secure the telephonebased transactions. In this type of application, when the costumer calls to make a transaction, a biometric system will authenticate the customer's identity based on his or her voice with no need of any additional device. PC/Network access - The use of biometric log-in to local PCs or remotely through network increase the security of the overall system keeping more protected the valuable information. Physical access - the biometric is widely used for controlling the access to building or restricted areas. E-commerce - biometric e-commerce is the use of biometrics to verify of identity of the individual conduction remote transaction for goods or services Advantage and Disadvantage of the s: The advantage of the s system is the Increase the security level of the system. But the devices and implementation of the biometrics system is the very expensive. The s reduces the password administration costs. identification is accurate. s systems are user friendly. There s the option of employee tracking. s approach is the Faster it means the Speed of s operation in seconds. Another advantage of the s is that the Decentralization relatively inexpensive and requires no trained or skilled operating personnel, Ultra validity not susceptible to forgery or theft and Convenience...no need to carry identity cards or similar items. The some main disadvantages of the Different-Different s System is: In voice recognition, an illness such as a cold can change a person s voice, making absolute identification difficult and impossible. In fingerprint, it can make mistakes with the dryness or dirty of the finger s skin, as well as with the age. A disadvantage related to face recognition is that people s faces change over time. Future of the Physical Security: A Approach: (i) Future Trends in s: Body Odor In the future the body odor can be digitally recorded for identification. A British company,mastiff Electronic System Ltd. Is working on such a system. DNA Matching In the future the DNA is used for the security which is the ultimate biometric technology that can produce proof positive identification of an individual. Keystroke Dynamics Keystroke dynamics, also referred to as typing rhythms, is an innovative biometric technology. (ii)facing the future of the biometrics: The future of the biometrics is so much bright. For more than a century, use biometrics for the investigation of the criminal using the fingerprint to identify the suspects which left at the crime scene. (iii)why the biometrics possible future market After reading the currently published paper and information about the biometrics, one of the main reasons for Appling the biometrics is security. s is not fundamentally wrong. Indeed, if automatic devices for identity recognition were more prevalent in locations such as airports, police stations and other areas that are sensitive or involve high concentrations of public activity, they would surely make the life of criminals and terrorists much more difficult. Preeti, IJECS Volume 3 Issue 2 Feb, 2014 Page No.3864-3868 Page 3866

(iv)the Future of s (2020): Widespread adoption is 5 years away. The biometrics industry is on the verge of Profitability. s will bring a new era of security, Convenience and user friendliness. systems will become faster, cheaper and more accurate as the technology evolves. s will end privacy as we know it. s will not fulfill their promise for Years to come. Comparison of the s: The comparison of the biometrics features like fingerprint, face, hand geometry, voice and iris have the characteristics like universality, Uniqueness, permanence, and performance and Measurability are based on the various Factors. Characteristics are different for each biometric type. They can be measured in high, low and medium. Table 1 compares the biometric features based on different factors. Universality: Everyone should have it Uniqueness: No two individuals should have the same value of characteristics Permanence: It should be invariant over a given period of time Performance: It should give accuracy and speed. Measurability: It must be easy to measure. characteristics Universality TABLE1 The comparison of characteristics Uniqueness Permanence Performance measurability Finger Print M H H H M Hand Geometry M M M M H Face H H M L H Iris H H H H M Voice M L L L M Conclusions: The main conclusion of this term paper is the biometrics system is mainly used for the security. The biometrics system is the self recognition system which uses the physical characteristics of the human body like face, hand geometry, voice, fingerprints and iris. s system is very suitable for the security but it has some limitations. In this term paper discuss the various application of the biometrics system used in the different department like: forensic, government, commercial department. The biometrics term is becoming highly important in computer security world. References: (i) International journal of u- and e- service, Science and Technology vol.2,no.3,september Debnath Bhattacharyya, Rahul Ranjan Authentication: A Review. (ii) International journal of u- and e- service, Science and Technology vol.4,march 2009 A brief Introduction of s and Fingerprint Payment Technology. Preeti, IJECS Volume 3 Issue 2 Feb, 2014 Page No.3864-3868 Page 3867

(iii) Journal of Theoretical and Applied Information Technolog 2005-2010 JATIT. All rights reserved. (iv) Technology-savvy organizations looking to develop a competitive advantage should carefully watch developments in biometrics., Simon Liu and Mark Silverman A Practical Guide to Security Technology (v) http://www. Applications _ Griaule s.htm (vi) http://www.biometrics.org/govern ment.php (vii) http://www.biometrics.gov/referen ceroom/sprivacy.aspx Preeti, IJECS Volume 3 Issue 2 Feb, 2014 Page No.3864-3868 Page 3868