Tech Seminar Report
Tech Seminar Report
Tech Seminar Report
ON
A dissertation submitted in partial fulfilment of the requirements for the award of degree of
BACHELOR OF TECHNOLOGY
In
Submitted By
1
SIDDHARTHA INSTITUTE OF TECHNOLOGY AND
SCIENCES
(Approved by AICTE, Affiliated to JNTU Hyderabad, Accredited by NAAC(A+))
CERTIFICATE
Ms.Soujanya Mrs.Vasantha
Internal Examiner
DR. Akella Satyanarayana
2
DECLARATION
Date:
Place: NARAPALLY
2023-2024
3
CONTENTS
1. INTRODUCTION
2. FINGERPRINT RECOGNITION
3. FACE RECOGNITION
4. IRIS RECIGNITION
5. VEIN RECOGNITION
7. APPLICATIONS
8. ADVANTAGES
9. DISADVANTAGES
10.CONCLUSION
10.
4
ABSTRACT
Humans recognize each other according to their various characteristics for ages. We
recognize others by their face when we meet them and by their voice as we speak to them.
Identity verification (authentication) in computer systems has been traditionally based on
something that one has (key, magnetic or chip card) or one knows (PIN, password). Things
like keys or cards, however, tend to get stolen or lost and passwords are often forgotten or
disclosed.
This report actually gives an overview of what is biometric system and a detail overview
of a Biometric Authentication Technology System.
5
1. INTRODUCTION
6
1.1 Characteristics of Biometric
Physical Characteristics
Fingerprint
Face
Retina
Iris
Vein Pattern
Hand and finger geometry
Behavioral Characteristics
Keystroke dynamics
Voice
Gait
Signature dynamics
7
1.3 How Biometric Work
The process involves three steps: Enrollment, Live sample and Comparison.
Enrollment Process
Enrollment is a process of capturing biometrics samples, processing them to create a
biometric template and storing the templates (usually with additional data) onto storage, such
as a database or chip.
Biometric Process
Comparision
To complete authentication, the live sample from step 2 is compared to the reference sample
in the template. If the live sample is verified to be a match with the template, then the smart
card is authenticated and the transaction can proceed.
8
2. FINGERPRINT RECOGNITION
Fingerprint authentication, also called fingerprint biometrics, uses the unique characteristics
of the human fingerprint.
The human fingerprint is composed of ridges and lines that represent a pattern wholly unique
to the person when taken as a whole.
The data comes from a scanner that can read and map the unique aspects of a fingerprint,
including the ridges, valleys, whorls, patterns, and other unique characteristics, and translate
that into digital data. Then that information is used as a way to verify users.
9
3. FACE RECOGNITION
Face Authentication is a technology that enables people to access online services, physical
settings, and other resources using images of their face.
10
4. IRIS RECOGNITION
Iris scanning illuminates irises with invisible infrared light to take a picture of unique patterns
in each eye, not visible to the naked eye. A special camera takes the position of the pupil, iris,
eyelids and eyelashes. Each eye gets its own unique mathematical patterns, which is further
digitized.
11
5. VEIN RECOGNITION
Based on the patterns of veins in one's finger or hand, vascular pattern recognition
(VPR) provides the ease of use of hand geometry with much improved accuracy, smaller
readers and contact less use.
Segmented into different sub-modalities, vascular biometrics solutions use optical scanning
technology to capture vein images in your palm, finger, or eyeball.
12
6. SIGNATURE VERIFICATION PROCESS
Shaky signatures
Name variations
Slight changes in style
Aberrations from electronic signature tools
Odd bumps
13
14
7.APPLICATIONS OF BIOMETRIC AUTHENTICATION
TECHNOLOGY
Biometrics was once something confined to the world of science fiction, but over the
past decade, we have seen the emergence of biometrics in our everyday lives.
Biometrics are becoming increasingly integral to the way we carry out day to day tasks –
whether we realise it or not. As we move forward, the use of biometrics will continue to grow
and will become second nature to many of us to access a range of products and services that
we integrate will daily.
Biometric technology has evolved rapidly in recent years. Now, it’s a rare day when we don’t
interact with some form of biometric technology. From unlocking your phone to finding out
the weather for the day to securely boarding a flight. Biometric technology is all around us.
15
7.3 Mobile Access and Authentication
One of the most common uses of biometric technology is smartphone security. All new
mobile phones are now integrating some form of biometric modality as a way of securing
your device or specific applications such as banking apps and it is expected that biometrics
will be used alongside traditional password and PIN options as a form of two-factor
authentication.
7.4 Banking
As global financial entities become more digitally based, banks are also implementing
biometric technology to improve customer and employee identity management in an effort to
combat fraud, increase transaction security, and enhance customer convenience.
Customers are also worried about identity theft and the inconvenience associated with
constantly having to prove their identities. As a result, more and more customers are looking
for banks that have biometric authentication in place prompting banks to research the
technology for implementation.
Biometrics bring many advantages when it comes to access control. The technology can
provide a frictionless entry experience when utilising facial or iris recognition to control
access secure areas within a building.
16
7.7 Education
Biometric recognition technology such as fingerprint, iris and face recognition technology is
the most widely used biometric modality in the education system.
17
8. ADVANTAGES OF BIOMETRIC AUTHENTICATION
TECHNOLOGY
They are linked to a single individual (unlike a password, which can be used without
authorisation),
18
9. DISADVANTAGES OF BIOMETRIC AUTHENTICATION
TECHNOLOGY
Despite increased security, efficiency, and convenience, biometric authentication and its uses
in modern-day tech and digital applications also has disadvantages:
19
10.CONCLUSION
20
REFERENCES :
https://www.academia.edu/31640996/BIOMETRICS_A_Seminar_Report
https://www.scribd.com/presentation/329704004/Biometric-Authentication-Technology-
PPT-pptplanet-com
https://www.slideshare.net/PavanKumarMT/biometrics-technology-seminar-report
https://www.researchgate.net/publication/371567274_Biometric_Authentication
https://www.m2sys.com/blog/guest-blog-posts/top-8-advantages-and-disadvantages-of-
biometric/
https://ovic.vic.gov.au/privacy/resources-for-organisations/biometrics-and-privacy-issues-
and-challenges/
https://www.logintc.com/types-of-authentication/biometric-authentication/
https://www.studocu.com/in/document/akshara-institute-of-management-and-
technology/introduction-to-microeconomics/biometrics-a-seminar-report/3
21