Unit3: Biometrics

Moh.enab
Mind Map by , created over 6 years ago

Net SEC Mind Map on Unit3: Biometrics, created by Moh.enab on 05/10/2013.

51
1
0
Tags
Moh.enab
Created by Moh.enab over 6 years ago
Key word flashcards
I M Wilson
10 good study habits every student should have
Micheal Heffernan
PHR and SPHR Practice Questions
Elizabeth Rogers8284
World War One
Micheal Heffernan
CCNA Security 210-260 IINS - Exam 2
Mike M
Misc Concepts in Network Security
Moh.enab
Untitled
Moh.enab
Biometric System Modules
Moh.enab
10 Mind Mapping Strategies for Teachers
Andrea Leyden
Electromagnetism: Magnetic Flux Density & Magnetic Flux 2
tatemae.honne
Unit3: Biometrics
1 Verification System
2 Identification System
3 Properties of a biometric feature
3.1 Universality
3.2 Uniquness
3.3 Stability
3.4 Collectability
3.5 Performance
3.6 Acceptability
3.7 Forgery resistance
4 Static
5 Dynamic
6 biometric sample
7 reference template
8 architecture of a biometric system

Attachments:

8.1 Data acquisition module
8.2 Feature extraction module
8.3 Matching module
8.3.1 Identification System compare that with all users
8.3.2 Verification System checks the user biometric data
8.4 Decision module
8.5 Storage module
9 Tolerance Threshold
9.1 Specifies the level of matching accepted
9.2 Accuracy Metrics
9.2.1 false match rate
9.2.1.1 Probability that an individual template provide a match for a different individual
9.2.1.2 False Acceptance rate: an imposter to authenticate
9.2.2 false non-match rate
9.2.2.1 False Rejection Rate
9.2.3 failure-to-enroll rate
9.2.3.1 Proporition of users from total that failed to have repeatble templates
9.2.4 Equal Error Rate : FMR = FNMER
10 Biometric Systems

Attachments:

11 Properties of a good biometric sensor
11.1 detecting if the biometric presented is living tissue
12 Fingerprint Recognition : Products
12.1 Optical fingerprint sensors
12.2 Ultrasound fingerprint sensors
12.3 Chip-based fingerprint sensors
13 Attacks on biometric systems
13.1 @ Enrollement, user can enter false info
13.2 DOS
13.3 Circumvention attack
13.4 coercion attack
13.5 Collusion attack
13.6 covert acquisition

Media attachments