+ All Categories
Home > Documents > Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Date post: 29-Jan-2016
Category:
Upload: ruth-quinn
View: 213 times
Download: 0 times
Share this document with a friend
Popular Tags:
15
Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star
Transcript
Page 1: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Biometric Technologies

Presented By:

Student Id: S083008900274

1

Unique Star

Page 2: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Overview

Definition of biometrics Purpose of biometrics and what it provides over

conventional security Introduction of subgroups of biometrics Current use of biometrics Conclusion and thoughts on future developments

2

Page 3: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Biometrics are automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics.

Biometric scanning is used for two major purposes: identification and authentication.

Identification: “Do I know who you are?” One to ManyAuthentication: “Are you who you claim to be?” One to One

Biometric scans are more accurate, make it difficult to masquerade, and generally require less of the user than standard security measures such as password protection.

Biometric technology falls roughly into eight categories: finger, hand, iris, retina, face, Signature Recognition , Keystroke Recognition, and voice recognition.

3

Definition of Biometrics

Page 4: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Physiological BiometricsFingerprint RecognitionHand Geometry Recognition Iris Recognition Retinal Scanning Facial Recognition

Behavioral Biometrics.Voice Recognition Signature Recognition Keystroke Recognition

4

Types of Biometrics

Page 5: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

The most widely-used biometric technology. Measures the unique, complex swirls on a

person's fingertip. The swirls are characterized and produced as a template requiring from 250-1,000 bytes

5

Fingerprint Scan

Page 6: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Hand scan, also known as hand geometry, is a biometric authentication technology.

The system maps key features of the topography of a person's hand, measuring all the creases on the palm.

This is more expensive and considered less accurate than other biometrics.

Strength: requires only ~9 bytes to store template.

6

Hand Scan

Page 7: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

The technology examines the unique patterns of the iris, the ring around the pupil.

Very complex. Iris scans are non-invasive. The person puts their

face in front of a camera which then analyzes all the features.

Even works with corrective lenses. Highest accuracy of all the biometric technologies.

7

Iris Scan

Page 8: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

The Retinal scans examine the blood vessel patterns of the retina, the nerve tissue lining the inside of the eye that is sensitive to light.

An infrared light source is used to illuminate the retina of the eye. The image of the enhanced blood vessel pattern of the retina is analyzed for characteristic points.

It is also among the most difficult to use, and is perceived as being moderately to highly intrusive

8

Retinal Scan

Page 9: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

One method is called feature analysis which tracks about 80 facial characteristics.

A facial template requires ~1,300 bytes. Essentially, the technology measures the peaks

and valleys of the face. more suitable for wide range. Expensive

9

Facial Scan

Page 10: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Voice is a behavioral biometrics. Voice verification is used with passwords and PIN

numbers. Voice dynamics relies on the production of a

"voice template" that is used to compare with a spoken phrase. A speaker must repeat a set phrase several times as the system builds the template.

10

Voice Scan

Page 11: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Signature scan - analysis of characteristics in an individuals signature. May soon help address the very large demand for document authentication.

Keystroke scan - analysis of an individual’s typing pattern. Can be used along with passwords for a very secure system.

Body odor, skin pores, wrist/hand veins, DNA, Shape of ear, Gait, etc…

11

Others

Page 12: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Network security - Authentication, ATM, Internet banking.

Non-Network based security - Home use, content control.

Sensitive environments, e.g. government buildings, prisons

Schools - Library cards, Computer access, Enrollment.

Businesses - Time and attendance. Law Enforcement - Casino Operations, Super

Bowl. Etc…., The uses are endless.

12

Use of Biometrics

Page 13: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

Imagine a secure world without passwords.

13

Conclusion

Page 14: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

14

Page 15: Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.

15


Recommended