Professional Documents
Culture Documents
SECURITY
SUBMITTED BY
PRAKASH. N.M
II BTECH ECE
ABSTRACT
Now-a-days we are facing majority of crimes related to security
issues and these arise due to the leakage of passwords or illegal
authentication. At one end, there is a continuous and tremendous
improvement in the lifestyle of Humans while at the other end; the
technological crimes are increasing rapidly. As there is a problem, there
must be a solution. The need for a compromising technology which can be
adopted is highly imperative. Technologies capable of identifying each person
uniquely need to be developed. The only powerful solution for the problem of
illegal authentication is Biometrics.
Nature has made human beings with different characteristics which
may vary from one person to another. This property is made use of by
Biometric technology to distinctly identify each person. Biometrics is a
means of using the physiological or behavioral characteristics of a person as
a kind of permanent password.
This paper provides an overall idea of Biometrics , the typical
Biometric Model, an overview of the Biometric techniques and focuses mainly
on Keystroke Biometrics which is easy to implement and can provide fool
proof security based on the effectiveness of the algorithm.
“It is better to light up a candle rather than to curse the
darkness”
INTRODUCTION
array of highly secure identification and and the other deals with the behavioural
transaction fraud increases, the need for Utilized alone or integrated with
highly secure identification and personal other technologies such as smart cards,
verification technologies is becoming encryption keys and digital
apparent. signatures, biometrics is set to pervade
nearly all aspects of the economy and
Biometric-based solutions
our daily lives.
are able to provide for confidential
WHY MOVE TO BIOMETRICS? identification are enjoying a renewed
Data Collection
Decision
Making Template
Biometric Capture Extraction
Verification
Signal
Processing
Enrollment
Storage
MATCHING SCORE
STORAGE DEVICE STORED
TEMPLATE
BIOMETRIC TECHNIQUES Hand and Finger geometry
algorithm given below gives the details metrics decreases the other and vice
that the database already exists in the by the use of a suitable threshold such
system and one has a system delay that only the required users are selected
(FAR) and the false rejection rate threshold would allow non-authorized
(FRR). entry. Thus a balance would have to be
established taking both the factors into
consideration.
ALGORITHM
Input : User name, User_id, Password.
Main()
{
If (User==New)
{ read (User); // Getting User name, User_id, Password
read (Inter-stroke gap); // Time interval between consecutive characters
Add user (database); // Add the User to the database
User count =1; }
else if (User==Training)
{ read (User);
read (Inter-stroke gap);
if (Check (User, Password))
{ if (User count<15)
{ update ( User count); // User count = User count +1
add (Inter-stroke gap); }
else if (User count ==15)
{ update (User count);
add (Inter-stroke gap);
Calculate Mean (M), Standard deviation (S.D); }
}
}
else if (User==Existing)
{ read (User);
read (deviation);
if (Check (User, Password, deviation))
Login;
else
exit(0); }
}
Analysis of inter-keystroke timing of user code
A graph is plotted between and FRR can be reduced to a treat
keystrokes and keystroke timing. The extent so that only the legal user gets
‘X’ axis indicates the number of access to the system. The +R
inter-keystrokes and negative ‘Y’ boundary and –R boundary give the
axis indicates the inter-keystrokes desired range so that only the legal
timing in milliseconds. user gets access.
+R +R +R (L4)
ACCESS GRANTED
User not accepted: can be easily noticed when the user is
not legal, his typing pattern for the
Graph II indicates inter-
access code is not at all into the
keystroke timing when the user is not
predefined ranges.
legal or not following his rhythmic
behavior of typing the access code. It
-R -R db c db -R (L1)
db db db
db c db
c (L2)
db db +R
c +R c +R +R
+R +R
+R +R (L4)
+R c
c c (L3)
ACCESS DENIED
ENROLLMENT MODULE
IMAGE
ACQUISITION Face Extractor
MODULE
Database
Browser Minutiae Extractor
Ceptral Analysis
FACIAL
SCANNING
Template
Database Eigenspace Projection
and HMM training
FINGERPRINT
Face Eigenspace
Locator Comparison
information. When a user inserts his card based ID allows for the verification
for verification, the biometric sample of of “who you claim to be”
the person can be verified precisely and (information about the card holder
if it is identical the person is stored in the card) based on “who
authenticated. The advantage of this you are” (the biometric information
system is that the user can enjoy the stored in the smart card), instead of,
facilities offered by the Bank along with
or possibly in addition to, checking
utmost security.
“what you know” (such as
password).
INTERNET SECURITY