Bio Metrics: by Manikanta. S (C.S.E) Siddhartha. P (C.S.E)
Bio Metrics: by Manikanta. S (C.S.E) Siddhartha. P (C.S.E)
Bio Metrics: by Manikanta. S (C.S.E) Siddhartha. P (C.S.E)
by
Manikanta. S (C.S.E)
Siddhartha. P (C.S.E)
CONTENTS :
Introduction
Principle
How the IDEA took up?
Architecture (working)
Biometrics Classification
Applications of Biometric Systems
Limitations
Future of Biometrics
Conclusion
BIOMETRICS :
Definition:
“Biometrics is the identification or verification
of Human identity through the measurement of
repeatable physiological and behavioral
characteristics”
Verification principle :
In this mode biometric system authenticates a person’s
claimed identity from their previously enrolled pattern.
HOW THE IDEA TOOK UP ?
Match
score
Application Decision
Authentication decision
Categories of Biometrics :
It can be sorted into two classes
1. Physiological :
They are related to the shape of the body.
Examples- Face, Fingerprints, hand geometry and
iris recognition, DNA
Finger Prints
2.Behavoral :
They are related to the behavior of a person.
Examples -signature and voice.
Bio-Signature Pen
Classification :
Biometrics
Physical Behavioral
Iris
Others Hand Geometry
(Ear, Finger Palm Others
Retina, print print (finger)
Dental)
Various Biometrics types:
• DNA Fingerprinting
Face Recognition
Fingerprint
Hand & Finger Geometry
• Iris Scan
Retina Scan
• Signature Verification
• Voice Recognition
Signature Verification
Physical Activity of Signing:
Stroke Order, Pressure applied &
Speed measured
Used in providing access to Documents,
Banking Services, etc
Voice Recognition
Based on Shape & Size of Vocal Tracts, Mouth,
Nasal Cavity and Lips
Used in Phone Based Applications
Demerits: Sensitive to noise, Not appropriate
for large scale application
DNA Fingerprinting
0.1% DNA would be unique for a person
Identical Twins do not have same DNA
Iris Scan
Fingerprint
A fingerprint image is
read from a capture
device, features are
extracted from the image,
and a template is
Which biometric method /
product is best?
Depends on the application
reliability
security
performance
cost
user acceptance
liveness detection
users that are unsuitable
size of sensor
APPLICATION :