+ All Categories
Home > Technology > BIOMETRIC (TO PRERVE OUR IDENTY)

BIOMETRIC (TO PRERVE OUR IDENTY)

Date post: 27-Jan-2017
Category:
Upload: mounika117
View: 26 times
Download: 2 times
Share this document with a friend
42
Transcript

BIOMETRICS

BIOMETRICSTO PRESERVE OUR OWN IDENTY

IntroductionTechnology changes from time to time .Humans are adopated to towards it per a long period.

Now it is the time to say good bye to the tradiational method such as passwords & smart cards ; The coming era will be the BIOMETRIC ERA with full secure & safe.No sure system preserve your identy except biometric. No one can hack your personial information.

CONTENTSBiometric deviceHistory ( Non automated /Automated )Types of biometric.Classification of biometricBiometric recognationWorking principle & SignificanceNeed of BiometricApplications

Biometric device

It is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioural characteristic .

HistoryNon Automated biomateric

It have been used since 500BC. it was seen that Babylonian business transactions were recorded on clay tablets that included fingerprints.

Automation in BiometricAutomation in Biometric devices was first seen in the 1960s.The FBI in the 1960s, introduced the Indentimat, which started checking for fingerprints to maintain criminal records. The first systems measured the shape of the hand and the length of the fingers.

TYPES OF BIOMETRICS. ...

Chemical biometric - DNA Visual biometric Iris,Ear,FaceBehavioural biometric - Gait Olfactory biometric OdourSpatial biometric Finger geometry

Classification of Biometric1.Physiological (relatedtoshapeofthebody)FingerprintFacial recognisationHand geometry2. Behavioral (relatedtothebehavior oftheperson)Speaker recognisationSignature recognisationGesture recognisation

Finger RecognisationA fingerprint is made of a series of ridges and furrows on the surface of the finger.Ridge ending , ridge bifurcation and minutiae points.Algorithm is developed to distinguish whorl , archandloop.

Analyze the unique shape, pattern and positioning of the facial features.Face recognition is non-intrusive.There are about 80 peaks and valleys on a human face

Face Recognisation

Hand GeometryBased on a number of measurements taken from the human hand.The technique is very simple , relatively easy to use and in expensive.The physical size of a handgeometry-based system is large.

IRISThe iris of each eye of each person is absolutely unique . This even applies to identical twins.Have over 200 unique spots and highly accurate technology.

Behavioural biometric Speaker Uses individuals voice for recognisation purposes.Based on frequency & pitch of the user.

Gesture recognisationUse of motions to communicate.Walking style.Typing speed , common spelling mistakes.

How they works?

Biometrics systems work by recording and comparing biometric characteristics.

SingnificanceIt has the ability to judge the user. It will preserve your own identity.Hacking of biometric is complicated.Passwords can be forgetten & shared.It is the fast ,convient, secure aunthentication.(as per the survey of google 15.3% of useres forgot their password every month)

Modes of rocognation Verification, an identity is claimed and the comparison process is limited to checking the reference corresponding to this identityIdentification, no claim of identity is necessary and the system searches its reference database to find if a stored reference matches the biometric characteristics recorded.

Need of Biometric

Biometric over the Traditional securityPassword : These are vulnurable , easy to hack for the cyber criminals by the following: 1. Spyware - Hackers can usekeylogging malwarethat secretly installs itself on your computer with your interface. Practicing safe computing techniques which include regularly scanning computers for viruses, never sending login information over email, and ignoring popup windows can go a long way toward protecting your personal information

23

Vanurable nature of passwordCracking.Cracking is the process of repeatedly try guesses for the password. Another common approach is to say that you have "forgotten" the password and then change it.Guessing.. They use special programs armed with dictionaries or known information about you to try combinations such as hobbies, pet names, date of birth, loved ones, birthplace and other associated words .

Vanurability of smart card

Smart Cards Entry: Somehow they are safe , but not secure they can be easily stolen.

AdvantagesEasy accessible technology with high standards of security throughout the globe.Is the most economical biometric PC user authentication technique.Biometrics are well advanced security systems,which is highly accurate & easy to use. Small storage space required for the biometric template, reducing the size of the database memory required Reduce space ,time & efforts.

Disadvantages For some people it is very intrusive, because is still related to criminal identification.It can make mistakes with the dryness or dirty of the fingers skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).It has the stigma of consumer's thinking it is potentially harmful to the eyeIt may be unhygienic due to multiple thumb impressions.

Biometric SpoofingBiometric spoofingis a method of fooling abiometricidentification management system, where an artificial object (like a fingerprint mold made of silicon) is presented to thebiometricscanner that imitates the unique biological properties of a person.

Anti-Spoofing

Biometric UtilizationBiometric Attandance : It helps in automation of attendance of the employees and can help in tracking the in and out time of employees total work duration, lunch breaks. There are several types ofbiometric time and attendance machinesused in industry. Please click on the below type of machines to know the available models and detailed specification of the model. These are low cost and very durable time and attendance machines.

Mobile Banking with Biometric HSBC(Hongkong & Shanghai banking Corportion) starts biometric technology in mobile bankig , in India it is ICIC bank.Made easy transcations, reduces paper work.Need not to go bank. Time saving.No need to carry ATM card.(it can be stolen) Type of identification are: > Thumb print(finger reco) >By saying password(voice-veco) >By taking selfie(face- reco)

In Goverment sector It provides a convenient and secure way to verify our identities while protecting our private information.This process of verifying the identity of a citizen and their authority to receive goods or services from the government such as civil supply & pension . In Argentina, for example, pensioners had to prove they were alive every month by presenting several documents, including their birth certificate, for personal review by a bank employee. Helps in fair election one vote per person. (using in south africa but not in India)

In India gov. biometric application1.ADDHAR Card: (biometric linkage of indivudial data) largest biometric identification programmes in the world with the Unique Identification Authority of India (UIDAI) issuing nearly 82 crore cards.It has been pursued vigorously by the Sri. Narendra Modi prime minister under Digital India program. Face ,eyes , fingers are taken into consideration while enrolling with Addhar.Government is using it extensively in targeting cooking gas subsidies ,education & job sectors

Civil Supplies

The Department of Food, Civil Supplies and Consumer Affairsin India will begin issuing photo-biometric ration cards for current Below the Poverty Line (BPL) and Above the Poverty Line (APL) card holders.85,3000 bogus ration cards issued under the biometric system were discovered.The food and civil supplies department deputy director in collusion with three fair price shop owners as well as the biometric franchisee.It helps in tracking of the stocks that reach the fair price shops to how much quantity a consumer has boughtThe government had saved at leastRs.1,000 crore every year on subsidies as it weeded out the non-existent or duplicate users by linking the ration cards to Aadhaar cards.The e-pos device has stored in it fingerprints of all family members of the ration card.

Up coming BiometricsIn coming days there will be biometric security for every personal document now recently we can observe them only in mobile . It had extended to various devices such as Flash drive , locker & biometric door.

Biometric Flash Drive

Biometric security in car

ConcluisonThese are sample , like that biometric will enter everywhere into the human life for there well fare of safe & security and hence increase the dignity of indivudial in 21st century and further also.

PPT BY CHEKRIOPEAL

GUIDED BY SRI.K.VIRENDAR(PGT CS) J.N.V. PEDAVEGI


Recommended