+ All Categories
Home > Documents > Biometrics Security System Presentation

Biometrics Security System Presentation

Date post: 10-Mar-2016
Category:
Upload: gazal-gupta
View: 7 times
Download: 0 times
Share this document with a friend
Description:
Explains the importance of Biometrics Security System into security.Methods of Biometric

of 25

Transcript
  • A SEMINAR ON

    BIOMETRICS SECURITY SYSTEM Presented By:-GAZAL GUPTAVIII-SEM IT

  • SEMINAR INTRODUCTION Biometrics is a rapidly evolving technologyFacilitates the automatic identification based on physical or behavioral characteristicsEliminates the need to memorize a password or carry some form of token

  • SEMINAR WHAT IS A BIOMETRIC ?Science and technology of measuring and statistically analyzing biological data that is represented in human by patterns unique to every individual Biometrics is a science of measuring the unique physical characteristics of a person such as voice, a face or a fingerprint. These personal features are analyzed and stored as bioprints in a reference database, on a smart card

  • Figure describing the process involved in using the biometric system

    SEMINAR

  • SEMINAR SUBSYSTEMS OF BIOMETRIC MODEL

    DATA COLLECTION TRANSMISSION(compression, transmission, expansion)

    SIGNAL PROCESSING(pattern matching, quality control ,features extraction)

    DECISION MAKING

    DATA STORAGE(Database, smart card,)

  • SEMINAR TYPES OF BIOMETRIC SYSTEM

    Fingerprint VerificationHand GeometryRetinal ScanningIris ScanningFacial RecognitionSignature VerificationVoice Verification

  • SEMINAR DETAIL ANALYSIS OF IRIS SCANNING

    Iris scan takes about 30sec & 2sec for verificationA camera located at about 3 feet focuses on & scans iris from one sideThis scan is converted into a templateOnly phase information is used for recognizing iris as amplitude information is depends on extraneous factors

  • SEMINAR

    A IRISCODE Sample

  • SEMINARIris scanning enabled Atm Authenticam used for iris scanning

  • SEMINAR ADVANTAGES OF IRIS SCANNING

    Iris pattern posses high degree of randomness,variability & uniquenessPatterns are apparently stable throughout lifeEncoding & decision making are tractableImage analysis & encoding time : 1secSearch period : 100000 iris codes/sec

  • SEMINAR DISADVANTAGES OF IRIS SCANNING

    Small target (1cm) to acquire from a distance (1m)Located behind a curved, wet, reflecting surfaceObscured by eyelashes,lenses,reflectionsPartially occluded by eyelids, often droppingIllumination should not be visible or bright

  • Fingerprint Authentication a fingerprint impression is acquired

    The next step is to locate these features in the fingerprint image, using an automatic feature extraction algorithm.

  • How does fingerprint identification work? The first step in fingerprint identification is collecting the fingerprint, named enrollment.

    In this step, the applicant acquires the reference fingerprint for later authentication.

    The reference fingerprint is called the template of the fingerprint

    After the capture of the template, it can be stored in a database, on a token with 2D barcode, or in a smart card

    At this point, the applicant is registered and the next stage is to compare the fingerprint with the template to the fingerprint read by the sensor.

    After reading the fingerprint, the authentication system extracts the minutiae in the same way as it did during the enrollment process

    Since the fingerprint is never captured in the same position, the verification algorithm must perform rotation and translation of the captured fingerprint in order to adjust the fingerprint minutiae with the template minutiae.

  • Components Of a Fingerprint System

  • SEMINAR CHARACTERICTICS FOR SELECTING A BIOMETRIC TECHNOLOGYAccuracy Ease of useError incidence CostUser acceptanceRequired security levelLong term stability

  • SEMINAR

    CharacteristicFinger PrintHand GeometryRetinaIrisFaceSignatureVoiceEase of useHighHighLowMediumMediumHighHighError IncidenceDryness,Dirt,AgeHand Injury,AgeGlassesPoor LightingLighting,Age,GlassesChanging SignaturesNoise,Colds,WeatherAccuracyHighHighVery HighVery HighHighHighHighCost*******User AcceptanceMediumMediumMediumMediumMediumMediumHighRequired Security HighMediumHighVery HighMediumMediumHighLTSHighMediumHighHighMediumMediumMedium

  • SEMINAR METHODS TO RATE BIOMETRICS ACCURACY

    FALSE- ACCEPTANCE RATE (FAR) FALSE- REJECTION RATE (FRR)

  • SEMINAR The plot of FAR Vs FRR representing crossover error rate

  • SEMINAR COST ANALYSYS FOR BIOMETRICS HardwareBack-end processing power to maintain databaseResearch & testing of the systemUser educationException processingSystem maintenance

  • SEMINAR BIOMETRICS APPLICATIONSIndian InitiativesBioenable Technology, PuneSiemens Information System Ltd., BangloreAxis Software, PuneJaypeetex ,MumbaiGlobal DevelopmentsInternet Security : Litronix, UsaWindows Biometrics : MicrosoftNet Nanny Software InternationalBiometric Smart Cards : Polarid & Atmel

  • SEMINAR FUTURE OF BIOMETRICS

    ATM Machine UseTravel & TourismPublic Identity Card

  • SEMINAR CONCLUSION

    Your fingerprints, iris pattern, and voice will verify your identity You can unlock your house or withdraw money from your bank with just a blink of eye, a tap of your finger, or by just showing your face

  • SEMINAR BIBLIOGRAPHY

    Biometrics : Journal of International Biometric SocietyThe Biometrics Constrium ..May 2002Electronics For You June 2002www.biometric.comwww.bioventric.comhttp://homepage.ntlworld.com/avantihttp://www.ibia.org

  • SEMINAR

  • SEMINAR


Recommended