Date post: | 10-Mar-2016 |
Category: |
Documents |
Upload: | gazal-gupta |
View: | 7 times |
Download: | 0 times |
of 25
A SEMINAR ON
BIOMETRICS SECURITY SYSTEM Presented By:-GAZAL GUPTAVIII-SEM IT
SEMINAR INTRODUCTION Biometrics is a rapidly evolving technologyFacilitates the automatic identification based on physical or behavioral characteristicsEliminates the need to memorize a password or carry some form of token
SEMINAR WHAT IS A BIOMETRIC ?Science and technology of measuring and statistically analyzing biological data that is represented in human by patterns unique to every individual Biometrics is a science of measuring the unique physical characteristics of a person such as voice, a face or a fingerprint. These personal features are analyzed and stored as bioprints in a reference database, on a smart card
Figure describing the process involved in using the biometric system
SEMINAR
SEMINAR SUBSYSTEMS OF BIOMETRIC MODEL
DATA COLLECTION TRANSMISSION(compression, transmission, expansion)
SIGNAL PROCESSING(pattern matching, quality control ,features extraction)
DECISION MAKING
DATA STORAGE(Database, smart card,)
SEMINAR TYPES OF BIOMETRIC SYSTEM
Fingerprint VerificationHand GeometryRetinal ScanningIris ScanningFacial RecognitionSignature VerificationVoice Verification
SEMINAR DETAIL ANALYSIS OF IRIS SCANNING
Iris scan takes about 30sec & 2sec for verificationA camera located at about 3 feet focuses on & scans iris from one sideThis scan is converted into a templateOnly phase information is used for recognizing iris as amplitude information is depends on extraneous factors
SEMINAR
A IRISCODE Sample
SEMINARIris scanning enabled Atm Authenticam used for iris scanning
SEMINAR ADVANTAGES OF IRIS SCANNING
Iris pattern posses high degree of randomness,variability & uniquenessPatterns are apparently stable throughout lifeEncoding & decision making are tractableImage analysis & encoding time : 1secSearch period : 100000 iris codes/sec
SEMINAR DISADVANTAGES OF IRIS SCANNING
Small target (1cm) to acquire from a distance (1m)Located behind a curved, wet, reflecting surfaceObscured by eyelashes,lenses,reflectionsPartially occluded by eyelids, often droppingIllumination should not be visible or bright
Fingerprint Authentication a fingerprint impression is acquired
The next step is to locate these features in the fingerprint image, using an automatic feature extraction algorithm.
How does fingerprint identification work? The first step in fingerprint identification is collecting the fingerprint, named enrollment.
In this step, the applicant acquires the reference fingerprint for later authentication.
The reference fingerprint is called the template of the fingerprint
After the capture of the template, it can be stored in a database, on a token with 2D barcode, or in a smart card
At this point, the applicant is registered and the next stage is to compare the fingerprint with the template to the fingerprint read by the sensor.
After reading the fingerprint, the authentication system extracts the minutiae in the same way as it did during the enrollment process
Since the fingerprint is never captured in the same position, the verification algorithm must perform rotation and translation of the captured fingerprint in order to adjust the fingerprint minutiae with the template minutiae.
Components Of a Fingerprint System
SEMINAR CHARACTERICTICS FOR SELECTING A BIOMETRIC TECHNOLOGYAccuracy Ease of useError incidence CostUser acceptanceRequired security levelLong term stability
SEMINAR
CharacteristicFinger PrintHand GeometryRetinaIrisFaceSignatureVoiceEase of useHighHighLowMediumMediumHighHighError IncidenceDryness,Dirt,AgeHand Injury,AgeGlassesPoor LightingLighting,Age,GlassesChanging SignaturesNoise,Colds,WeatherAccuracyHighHighVery HighVery HighHighHighHighCost*******User AcceptanceMediumMediumMediumMediumMediumMediumHighRequired Security HighMediumHighVery HighMediumMediumHighLTSHighMediumHighHighMediumMediumMedium
SEMINAR METHODS TO RATE BIOMETRICS ACCURACY
FALSE- ACCEPTANCE RATE (FAR) FALSE- REJECTION RATE (FRR)
SEMINAR The plot of FAR Vs FRR representing crossover error rate
SEMINAR COST ANALYSYS FOR BIOMETRICS HardwareBack-end processing power to maintain databaseResearch & testing of the systemUser educationException processingSystem maintenance
SEMINAR BIOMETRICS APPLICATIONSIndian InitiativesBioenable Technology, PuneSiemens Information System Ltd., BangloreAxis Software, PuneJaypeetex ,MumbaiGlobal DevelopmentsInternet Security : Litronix, UsaWindows Biometrics : MicrosoftNet Nanny Software InternationalBiometric Smart Cards : Polarid & Atmel
SEMINAR FUTURE OF BIOMETRICS
ATM Machine UseTravel & TourismPublic Identity Card
SEMINAR CONCLUSION
Your fingerprints, iris pattern, and voice will verify your identity You can unlock your house or withdraw money from your bank with just a blink of eye, a tap of your finger, or by just showing your face
SEMINAR BIBLIOGRAPHY
Biometrics : Journal of International Biometric SocietyThe Biometrics Constrium ..May 2002Electronics For You June 2002www.biometric.comwww.bioventric.comhttp://homepage.ntlworld.com/avantihttp://www.ibia.org
SEMINAR
SEMINAR