{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Biometrics - CSE 425 Introduction to Computer Security...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
CSE 425, Introduction to Computer Security Biometrics © 2008 by Wayne R. Dyksen. All Rights Reserved. B-1 Michigan State University Department of Computer Science and Engineering Biometrics Biometrics for Network Security Paul Reid Professor Wayne Dyksen Department of Computer Science and Engineering Michigan State University Spring 2008 CSE 425, Introduction to Computer Security B-2 Authentication Based on Something You… • …Know • …Have • …Are…Biometrics B-3 Biometric Trait Physical Psychological Can Be Measured (“metric”) Quantified Digitized Repeatedly with “Similar” Results Recorded Compared Examples Fingerprint Iris Scan Voice Face Gait – Etc… B-4 Templates (1 of 2) Digital Representation of Biometric (Digitization of Something Analog) Data Structure Varies Depending On… Particular Biometric Particular Algorithm B-5 Templates (2 of 2) Enrolled Template Computed In Advance Stored In a Database Live Template Collected During Authentication Compared with Enrolled Templates Must Be Protected! (Why?) B-6 Biometric Algorithms (1 of 2) Compute Templates Converts “Analog” to Digital Device Probably Converts Analog to Digital Algorithm Converts Device Digital to Template Converts Physical Trait to Digital Representation Digital Representation Depends on Algorithm Compare Templates “Equal” Implies Same Person “Not Equal” Implies Different Person
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon