Biometrics - CSE 425, Introduction to Computer Security...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 425, Introduction to Computer Security Biometrics © 2008 by Wayne R. Dyksen. All Rights Reserved. B-1 Michigan State University Department of Computer Science and Engineering Biometrics Biometrics for Network Security Paul Reid Professor Wayne Dyksen Department of Computer Science and Engineering Michigan State University Spring 2008 CSE 425, Introduction to Computer Security B-2 Authentication • Based on Something You… • …Know • …Have • …Are…Biometrics B-3 Biometric Trait – Physical – Psychological Can Be – Measured (“metric”) – Quantified Digitized Repeatedly with “Similar” Results – Recorded – Compared Examples – Fingerprint – Iris Scan – Voice – Face – Gait – Etc… B-4 Templates (1 of 2) • Digital Representation of Biometric (Digitization of Something Analog) • Data Structure • Varies Depending On… – Particular Biometric – Particular Algorithm B-5 Templates (2 of 2) • Enrolled Template – Computed In Advance – Stored In a Database • Live Template – Collected During Authentication – Compared with Enrolled Templates • Must Be Protected! (Why?) B-6 Biometric Algorithms (1 of 2) • Compute Templates – Converts “Analog” to Digital • Device Probably Converts Analog to Digital • Algorithm Converts Device Digital to Template – Converts Physical Trait to Digital Representation – Digital Representation Depends on Algorithm • Compare Templates – “Equal” Implies Same Person – “Not Equal” Implies Different Person
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSE 425, Introduction to Computer Security Biometrics © 2008 by Wayne R. Dyksen. All Rights Reserved. B-2 Michigan State University Department of Computer Science and Engineering B-7 Biometric Algorithms (2 of 2) Involve… Image Processing Pattern Matching Data Mining Geometry Mathematics Statistics Etc… See PRIP : Pattern Recognition and Image Processing Lab http://www.cse.msu.edu/rgroups/prip/ B-8 Enrollment • Production of the Enrolled Template – Depends on Biometric Algorithm – Stored in a Database
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 5

Biometrics - CSE 425, Introduction to Computer Security...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online