Biometrics Security and Access Control Systems in Nuclear Facilities

Slide Note
Embed
Share

This study by the Egyptian Atomic Energy Authority's Nuclear Research Center explores methods for protecting biometric data privacy and security, focusing on encryption, visual cryptography, and other techniques. It also discusses the importance of physical protection systems, especially access control, in safeguarding nuclear facilities from unauthorized access.


Uploaded on Nov 12, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Egyptian Atomic Energy Authority Nuclear Research Center Department of Nuclear Reactors First Egyptian Research Reactor Biometrics security and privacy protection Prepared by: Nuclear Research Center, Department of Nuclear Reactors, Inshas, P.O. Box 13759, Atomic Energy Authority, Cairo, Egypt AHMED ASAKER Department of Electronics and Electrical Communication Engineering, Faculty of Electronic Engineering Menoufia University, Menoufia, Egypt OSAMA ZAHRAN

  2. The scope The scope of this work is to provide an overview of various methods that used for preserving the privacy and security of the individual s biometrics data including: Encryption techniques Visual cryptography Biometric watermarking Steganography Cancellable biometrics, and Hybridmethods

  3. physical protection system Physical security at nuclear facilities is an important licensing and design consideration. The ultimate objective of the physical protection system (PPS) is to prevent the accomplishment of unauthorized overt or covert actions to nuclear facilities and nuclear materials. Access Control Systems are one of the main pillars of physical protection

  4. What is the Purpose of an Access Control System? To prevent unauthorised persons from gaining access to all or part of a given area. To allow access of authorised people to given area.

  5. Automatic ACS Equipment (minimum requirements) Method of identification. Controllable door lock or release. Controller. Appropriate power supply. Communications between the items. Method of exit .

  6. Identification technology Identifying people methods fall into three main categories of increasing reliability and increasing equipment cost What you have What you know Who you are

  7. Individual Characteristics for Biometrical Identification of a Person Hand outline (HandKey) Fingerprint Retina Voice Iris

  8. biometrics security and privacy concerns Biometrics cannot be revoked or canceled Biometrics is not secret. Cross application invariance and cross-matching So biometrics definitely is sensitive data and therefore should be properly protected.

  9. Biometrics security and privacy protection strategies 1- Encryption techniques

  10. Security Schemes for Biometric securing 2-Visual Cryptography Technique

  11. Security Schemes for Biometric securing 3-Biometric watermarking

  12. Security Schemes for Biometric securing 4- Steganography Techniques Embedding Algorithm Extraction Algorithm

  13. Security Schemes for securing Biometric data 5- Cancelable biometric

  14. Cancelable biometric example applied in the feature domain for fingerprint biometric Feature-domain nonlinear transformation example for fingerprint biometrics. each minutiae (feature) position is transformed using a noninvertible function.

  15. Cancelable biometric example applied in the signal domain for face biometric.

  16. Security Schemes for Biometric securing 6-Hybrid methods Combination of Visual Cryptography and Steganography

  17. Security Schemes for Biometric securing 6-Hybrid methods Combination of watermarking and steganography scheme

  18. Conclusion Nowadays, biometric technologies provide a reliable solution for identity verification problem that allows restriction access to confidential data via unauthorized users. With the widespread deployment of biometric systems in various applications, there is an increasing concern that biometric technologies can be compromised and misused by any attacker. So, biometrics definitely is sensitive data and therefore it should be properly secured. This article presented a review of recent protection schemes developed for preserving the privacy and security of biometrics data which included encryption techniques, visual cryptography technique, watermarking, stegnography, cancellable biometrics and hybrid methods. cancellable biometric scheme has been widely recognized as one of the desirable solutions towards more secure biometrics.

  19. Thank you for your attention

Related


More Related Content