Bio-Metric Technology

Post on 14-Apr-2017

331 views 1 download

transcript

BIO-METRICTECHNOLOGY

Represented by :Sanjay Pariyar

Main Types Of Authentication

By using passwords, PIN-Code.

By using smart card or swipe card

By using Biometric

Introduction Bio-Metric Technology History About Biometric Technology. Definition of Bio-Metric TechnologyWhy Bio-Metric Technology? Leading Bio-Metric Technology How its Works? Types Of Bio-Metric Technology. Comparison Of Various Bio-Metric Technology Advantage & Disadvantage Of Bio-Metric Technology Conclusion

History About Biometric TechnologyThe ancient Egyptians and the Chinese played a

large role in biometrics history.Biometrics in practice was a form of finger printing

being used in china in the 14th century.Bertillon developed a technique of multiple body

measurements .A system called “Indentimat” which measured

shape of the hand and length of fingers was introduced in 1970s.

What is Biometrics ? Biometrics the science with technology to measure and

analyze biological data.

Meaning of Biometrics comes from the Greeks. Biometry = bio(life) + metry(to measure).

Biometrics refers to automated methods or technologies that measure and analyze human body characteristics like DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for authentication purposes.

Leading Biometrics Technologies

How Biometrics Works?FeatureExtraction

AcquiredBiometricSample

Matching Decision

Database

Flowchart of Typical Biometrics Systems

Why Bio Metric-Technology• Identity theft is not possible.• password remembrance problem does

not exist.• Cannot be predicted or hacked.• Cannot be shared.• More secure.

Types of Biometrics

Physiological Behavioral

Face

Iris Recognition

Retina Scan

Fingerprint

Signature

Voice

Face Recognition Principle: analysis of the unique

shape, pattern and positioning of facial features.

A automated software for identifying or verifying a person from a digital image or a video frame from a video source. Typically used in security systems.

Uses an image or series of images either from a camera or photograph to recognize a person.

Highly complex technology.

How Face Recognition works?

Iris Recognition The iris of each eye of each

person is absolutely unique.

The false acceptance rate for iris recognition systems is 1 in 1.2 million.

Iris pattern is not changed over years or by glasses, contact lens

Problems to Iris ScanningScanning difficult from a larger distance. It uses INFRARED light which may cause damage to our

eyes.An eye photograph can also be used to gaining the access.

Retina scan It analyzing the layer of blood

vessels situated at the back of the eye.

The machine takes around ten seconds to shine a “low intensity coherent light source” onto the retina to illuminate the blood vessels.

Once the machine has a copy of the scan, it compares the picture to all the different scans of databases, looks for a match, and identifies the individual.

Retina scan machines are fairly expensive.

Fingerprint Recognition A fingerprint in its narrow sense is

an impression left by the friction ridges of a human finger.

Biometrics refers to that measure and analyze human body characteristics such as fingerprints recognition.

Fingerprint recognition is possible using the fingerprint scanner.

A fingerprint scanner has two basic jobs.

It needs to get an image of your finger.

Sensor [Fingerprint

Sensor]

Pre-Processing Matched Profile

BIO-METRIC SYSTEM

FingerprintExtraction

Profile Search

Stored Profiles

ApplicationActivation

How Finger-Print Works?

Problem to Finger Print System

Finger prints can be easily copied.

Wrong result is shown if the finger is not placed properly.

If the software is not sufficiently god negative result is shown.

Advantages of fingerprint Recognition

Oldest form of Biometrics Highly Reliable Uses easily features of fingers High Security access Reduce cost Instance Report

Voice Recognition

It’s a habitual speaking recognition.Voice recognition systems analyze differences

such as in pitch, and tone.This biometric is also sensitive to environmental

conditions such as background noise.Template size can vary significantly according to

the length of the pass phrase.

Signature Recognition

Static Dynamic

In this mode, users write their signature on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the signature by analyzing its shape. It is also known as “off-line”.

In this mode, users write their signature in a digitizing tablet, which acquires the signature in real time. Dynamic recognition is also known as “on-line”.

One of behavioral biometric: Signature recognition

Operated in two different mode:

Signature Recognition Application

Criminal identification Prison security ATM and other Financial Transactions PC/LAN Login Database access Border crossing controls

Advantages of Biometrics

Biometrics are generally used for authentication. It provides higher security .e.g. Iris

recognition . Voice Recognition works well over the

telephone User friendly e.g. Hand geometry recognition, finger print recognition

Disadvantages of BiometricsRetina recognition requires close physical contact

of the scanning device, may not be generally accepted by public

This technology is little Costly.Voice recognition requires large amount of

computer storage, people's voices can change, background noises can interfere.

Biometrics features may change over time.Signature recognition has poor long-term

reliability, accuracy difficult to ensure.

A biometric system can operate in two modes

Identification:• A one to many comparison of the captured biometric against a

biometric database in attempt to identify an unknown individual.

Verification:• A one to one comparison of a captured biometric with a stored

template to verify that the individual is who he claims to be. • Verification is faster and performs better.• In a verification, the user must first enter his or her identity to

the biometric system. User ID's can be forgotten and cards can be lost, making access impossible. 

Application Of Biometric TechnologyCriminal identificationInternet bankingAttendance systemAirport, Bank securityPC login securityPrevents unauthorized access to private dataFinancial transaction management

Conclusion

Not to remember passwords.

User friendliness.

A new way to interact with devices.

THANK YOU