8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 1/21
PRESENTED BY:SHINE AUGUSTINE
FINAL YEAR(VIII SEM)07EAEBM020
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 2/21
A branch of biology that studiesbiological phenomena andobservations by means of
statistical analysis
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 3/21
History of biometric techniques originatedin China in 14th century.
It was a form of finger printing asreported by the Portuguese historian Joao de Barros.
The Chinese merchants were stamping
children's palm and footprints onpaper with ink to distinguish the babiesfrom one another.
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 4/21
Physiological Traits: Related to theshape of the body.
Examples are-
Fingerprint,face recognition,DNA,
Palm print,hand geometry iris recognition
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 5/21
Behavioral Traits:related to the behaviorof a person.
Examples
typing rhythmgaitvoice.
Also termed as behaviometrics
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 6/21
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 7/21
The prevailing techniques like passwordsand user IDs, or identification cards andPINs, suffer from limitations.
A biometric property is an intrinsicproperty of an individual, it is difficult toduplicate and nearly impossible to share.Additionally, a biometric property of anindividual can be lost only in case of serious accident.
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 8/21
Method Examples
Properties
What you know? User ID
Password
PIN
Shared
Passwords can be guessed
Forgotten
What you have? Cards
Badges
Keys
Shared
Can be duplicated
Lost or stolen
What you know?
ATM Cards+PINs
Shared
PIN a weak link, Misplaced(Writing the PIN on the
card)
Something unique about
user
Fingerprint
Face
Iris
Voice print
Not possible to share
Repudiation unlikely
Forging difficult
Cannot be lost or stolen
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 9/21
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 10/21
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 11/21
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 12/21
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 13/21
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 14/21
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 15/21
The area of human eye where the pigmented or
colored circles (brown or blue) rings the dark pupil
of the eye is called the Iris.
No two irises are alike, even among identical twins,
not even the left & the right irises are same.
Iris recognition technology converts visible
characteristics into a 512 byte IrisCode a template
stored for future verification attempts.
Probability that 2 irises will produce same code is
1 in 10 to the 78th power
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 16/21
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 17/21
Punjab National Bank (PNB) installed its first
biometric ATM at a village in Gautama Budh Nagar
(UP) to spread financial inclusion. "The move would
help illiterate and semi-literate customers to do banking transaction any time.
Union Bank of India biometric smart cards
launched.Hawkers and small traders could avail loanfrom the bank using the card.
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 18/21
MasterCard International Inc. and Visa USA Inc.,
the world's two largest credit card companies, have
begun to study the feasibility of using finger-scanning
devices at the point of sale to verify that the card user is really the card holder.
In Coca-Cola Co., hand-scanning machines are used
to replace the time card monitoring for the workers.
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 19/21
http://www.weexcel.com D. Gabor, ”Theory of communication,” J. Inst. Elect. Eng., 93, pp.
429–459, 1946.
National Science and Technology Council, (2006). The National
Biometrics Challenge. IEEE Computer, Special issue on Content Based Image Retrieval,
28,1995.
O.D. Trier, A.K. Jain and T. Taxt, ”Feature extraction methods for
character recognition - a survey,” Pattern Recognition, 29(4), pp.641–662, 1996
04/08/12
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 20/21
04/08/12
Query
?????
8/4/2019 Shine Augustine
http://slidepdf.com/reader/full/shine-augustine 21/21
04/08/12
D o n ’ t
C r y b ’ c
o z i t s
O v e r ! ! ! !
B u t
L a u g h B ’ c o z
I t
h a p p
e n e d ! ! ! ! ! ! ! ! ! ! ! !
! ! ! ! ! ! ! !