Biometrics

Post on 19-May-2015

223 views 1 download

Tags:

transcript

BIOMETRICS

PRESENTED BY

VISHWAJEET & ADOTHU RAMBABU

ROLL NO – 467/11 & 537/11

NATIONAL INSTITUTE OF TECHNOLOGYJAMSHEDPUR, INDIA – 831014

INTRODUCTION Biometrics refers to the automatic identification of a

person based on his or her physiological or behavioral characteristics.

Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity.

PHYSIOLOGICAL AND/OR BEHAVIORAL CHARACTERISTICS

Behavioral: Voice Keystroke Signature

Physiological: Fingerprint Hand Eyes (Iris , Retina) DNA Face

BIOMETRICS

BIOMETRICS: WHY?

Eliminate memorization – ◦ Users don’t have to memorize features of their voice, face, eyes, or fingerprints

Eliminate misplaced tokens – ◦ Users won’t forget to bring fingerprints to work

Can’t be delegated – ◦ Users can’t lend fingers or faces to someone else

Often unique – ◦ Save money and maintain database integrity by eliminating duplicate enrollments

WORKING OF BIOMETRICS TECHNOLOGY

ALL BIOMETRIC SYSTEMS WORKS IN A FOUR-STAGE PROCESS THAT CONSISTS OF THE FOLLOWING STEPS:

• CAPTURE : A Biometric system collects the sample of biometric features like fingerprint, voice etc of the person who wants to login to the system.

• EXTRACTION: The data extraction is done uniquely from the sample and a template is created. Unique features are then extracted by the system and converted into a digital biometric code. This sample is then stored as the biometric template for that individual.

• COMPARISON: The template is then compared with a new sample. The biometric data are then stored as the biometric template or template or reference template for that person.

• MATCH/NON-MATCH: The system then decides whether the features extracted from the new sample are a match or a non-match with the template.

SIGNATURE SCAN

Measures speed, pressure, stroke order an image of signature.

Non-repudiation

Mainly used for verification

# PROBLEMS:

Forgers could reproduce

VOICE VERIFICATION

Measures the sound waves of human speech.

pitch, intensity, quality and duration.

user talks to a microphone a passphrase.

voice print is compare to a previous one.

#PROBLEMS:

include background noise

KEYSTROKE SCAN

Measures the time between strokes and duration of key pressed.

Most commonly used in systems where

keyboard is already being used.

FINGER PRINT RECOGNITION

Fingerprint verify the authenticity of the individual.

Among all the biometric techniques, fingerprint-based identification is the oldest

method that has been successfully used in numerous applications.

Everyone is known to have unique, immutable

fingerprints. A fingerprint is made of a series of

ridges and furrows on the surface of the finger.

# Advantage:

Low storage space required compared to other ones.

RETINA RECOGNITION

Scan the retina to authenticate the identity of a person.

Unique to each person.

Unique to each eye.

Highly reliable because no two people have

the same retinal pattern.

# Problems:

1. It has extremely low acceptance rate .

2. Measurement accuracy can be affected by a disease

3. Not very user friendly

FACIAL RECOGNITION

Location and position of facial features.

Distance between the eyes.

Distance between the eyes and nose ridge.

Angle of a cheek.

Slope of the nose.

Facial temperatures.

HAND SCAN

Typical systems measure 90 different features: Overall hand and finger width Distance between joints Bone structure

Primarily for access control: Machine rooms Olympics

Strengths: No negative connotations – non-intrusive Reasonably robust systems

Weaknesses: Accuracy is limited; can only be used for 1-to-1 verification Bulky scanner

TEMPLATE SIZE

Biometric Approx. Template Size

Voice 70k – 80k

Face 84 bytes – 2k

Signature 500 bytes – 1000 bytes

Fingerprint 256 bytes – 1.2k

Hand Geometry 9 bytes

Iris 256 bytes – 512 bytes

Retina 96 bytes

Advantages : Biometric attributes are unique and these can’t be faked or interchanged so,

this uniqueness imparts a high level security to these systems.

There is no need for remembering passwords, pin’s etc.

Disadvantages :

Biometric template data consume more space than the conventional user

id/password combinations.

Advantages & Disadvantages

APPLICATIONS

Commercial

Computer login

Electronic payment

ATMS

Government

Passport control

Forensic

Missing persons

Criminal investigations

BIOMETRIC MARKET SHARE

References Biometrics.gov.

http://www.biometrics.gov/ReferenceRoom/Introduction.aspx Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition."

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1 (2004): 4-20. IEEE Xplore.

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027 Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer.

http://libcat.clemson.edu/record=b2478857 Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction

Evaluating Biometric Systems." Computer 33.2 (2000): 56-63. IEEE Xplore. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=820040

http://bprl.cs.clemson.edu/about.html http://bprl.cs.clemson.edu/projects.html

Thank you