+ All Categories
Home > Technology > Biometrics

Biometrics

Date post: 19-May-2015
Category:
Upload: adothu-ram-babu
View: 223 times
Download: 1 times
Share this document with a friend
Popular Tags:
19
BIOMETRICS PRESENTED BY VISHWAJEET & ADOTHU RAMBABU ROLL NO – 467/11 & 537/11 NATIONAL INSTITUTE OF TECHNOLOGY JAMSHEDPUR, INDIA – 831014
Transcript
Page 1: Biometrics

BIOMETRICS

PRESENTED BY

VISHWAJEET & ADOTHU RAMBABU

ROLL NO – 467/11 & 537/11

NATIONAL INSTITUTE OF TECHNOLOGYJAMSHEDPUR, INDIA – 831014

Page 2: Biometrics

INTRODUCTION Biometrics refers to the automatic identification of a

person based on his or her physiological or behavioral characteristics.

Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity.

Page 3: Biometrics

PHYSIOLOGICAL AND/OR BEHAVIORAL CHARACTERISTICS

Behavioral: Voice Keystroke Signature

Physiological: Fingerprint Hand Eyes (Iris , Retina) DNA Face

Page 4: Biometrics

BIOMETRICS

Page 5: Biometrics

BIOMETRICS: WHY?

Eliminate memorization – ◦ Users don’t have to memorize features of their voice, face, eyes, or fingerprints

Eliminate misplaced tokens – ◦ Users won’t forget to bring fingerprints to work

Can’t be delegated – ◦ Users can’t lend fingers or faces to someone else

Often unique – ◦ Save money and maintain database integrity by eliminating duplicate enrollments

Page 6: Biometrics

WORKING OF BIOMETRICS TECHNOLOGY

ALL BIOMETRIC SYSTEMS WORKS IN A FOUR-STAGE PROCESS THAT CONSISTS OF THE FOLLOWING STEPS:

• CAPTURE : A Biometric system collects the sample of biometric features like fingerprint, voice etc of the person who wants to login to the system.

• EXTRACTION: The data extraction is done uniquely from the sample and a template is created. Unique features are then extracted by the system and converted into a digital biometric code. This sample is then stored as the biometric template for that individual.

• COMPARISON: The template is then compared with a new sample. The biometric data are then stored as the biometric template or template or reference template for that person.

• MATCH/NON-MATCH: The system then decides whether the features extracted from the new sample are a match or a non-match with the template.

Page 7: Biometrics

SIGNATURE SCAN

Measures speed, pressure, stroke order an image of signature.

Non-repudiation

Mainly used for verification

# PROBLEMS:

Forgers could reproduce

Page 8: Biometrics

VOICE VERIFICATION

Measures the sound waves of human speech.

pitch, intensity, quality and duration.

user talks to a microphone a passphrase.

voice print is compare to a previous one.

#PROBLEMS:

include background noise

Page 9: Biometrics

KEYSTROKE SCAN

Measures the time between strokes and duration of key pressed.

Most commonly used in systems where

keyboard is already being used.

Page 10: Biometrics

FINGER PRINT RECOGNITION

Fingerprint verify the authenticity of the individual.

Among all the biometric techniques, fingerprint-based identification is the oldest

method that has been successfully used in numerous applications.

Everyone is known to have unique, immutable

fingerprints. A fingerprint is made of a series of

ridges and furrows on the surface of the finger.

# Advantage:

Low storage space required compared to other ones.

Page 11: Biometrics

RETINA RECOGNITION

Scan the retina to authenticate the identity of a person.

Unique to each person.

Unique to each eye.

Highly reliable because no two people have

the same retinal pattern.

# Problems:

1. It has extremely low acceptance rate .

2. Measurement accuracy can be affected by a disease

3. Not very user friendly

Page 12: Biometrics

FACIAL RECOGNITION

Location and position of facial features.

Distance between the eyes.

Distance between the eyes and nose ridge.

Angle of a cheek.

Slope of the nose.

Facial temperatures.

Page 13: Biometrics

HAND SCAN

Typical systems measure 90 different features: Overall hand and finger width Distance between joints Bone structure

Primarily for access control: Machine rooms Olympics

Strengths: No negative connotations – non-intrusive Reasonably robust systems

Weaknesses: Accuracy is limited; can only be used for 1-to-1 verification Bulky scanner

Page 14: Biometrics

TEMPLATE SIZE

Biometric Approx. Template Size

Voice 70k – 80k

Face 84 bytes – 2k

Signature 500 bytes – 1000 bytes

Fingerprint 256 bytes – 1.2k

Hand Geometry 9 bytes

Iris 256 bytes – 512 bytes

Retina 96 bytes

Page 15: Biometrics

Advantages : Biometric attributes are unique and these can’t be faked or interchanged so,

this uniqueness imparts a high level security to these systems.

There is no need for remembering passwords, pin’s etc.

Disadvantages :

Biometric template data consume more space than the conventional user

id/password combinations.

Advantages & Disadvantages

Page 16: Biometrics

APPLICATIONS

Commercial

Computer login

Electronic payment

ATMS

Government

Passport control

Forensic

Missing persons

Criminal investigations

Page 17: Biometrics

BIOMETRIC MARKET SHARE

Page 18: Biometrics

References Biometrics.gov.

http://www.biometrics.gov/ReferenceRoom/Introduction.aspx Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition."

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1 (2004): 4-20. IEEE Xplore.

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027 Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer.

http://libcat.clemson.edu/record=b2478857 Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction

Evaluating Biometric Systems." Computer 33.2 (2000): 56-63. IEEE Xplore. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=820040

http://bprl.cs.clemson.edu/about.html http://bprl.cs.clemson.edu/projects.html

Page 19: Biometrics

Thank you


Recommended