0% found this document useful (0 votes)
3 views13 pages

Unit 1 Slo2

The document discusses biometrics, focusing on its role in identity determination and authentication through identification and verification systems. It highlights the advantages of biometric methods over traditional authentication methods like passwords and PINs, emphasizing their reliability and security in protecting sensitive information. The document also outlines the operational modes of biometric systems and various biometric technologies used for identification and verification.

Uploaded by

Deepa S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views13 pages

Unit 1 Slo2

The document discusses biometrics, focusing on its role in identity determination and authentication through identification and verification systems. It highlights the advantages of biometric methods over traditional authentication methods like passwords and PINs, emphasizing their reliability and security in protecting sensitive information. The document also outlines the operational modes of biometric systems and various biometric technologies used for identification and verification.

Uploaded by

Deepa S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

18CSE357T – BIOMETRICS

Unit –1 : Session –1 : SLO -2

SRM Institute of Science and Technology 1


What is Biometric
“Determine or Authenticate Identity”
◼ Identification Systems:
• Who am I?
• Determine Identity
◼ Verification Systems:
• Am I who I claim to be?
• Authenticate Identity
• More accurate.
• Less expensive.
• Faster.
• More limited in function.
• No Requires more effort by user.

2
Identification and Authentication

Identification Authentication

It determines the identity of the It determines whether the person is


person. indeed who he claims to be.

No identity claim Identity claim from the user


Many-to-one mapping. One-to-one mapping.
Cost of computation  number of The cost of computation is
record of users. independent of the number of
records of users.

Captured biometric signatures come Captured biometric signatures may


from a set of known biometric feature be unknown to the system.
stored in the system.

3
Why Biometric?
• User authentication methods can be broadly classified into
three categories as shown in Figure, know, have, and are.
• Because a biometric property is an intrinsic property of an
individual, it is difficult to surreptitiously duplicate and nearly
impossible to share

Know

Be Have

4
Why Biometric
• Passwords are not reliable.
• Too many
• Can be stolen
• Forgotten
• Shared
• Many passwords easy to guess
• PIN Can be duplicated
• PIN can be Lost or stolen
• PIN a weak link(Writing the PIN on the card)

• Protect Sensitive Information


• Banking
• Medical
• Commercial
• Government

5
Why Biometric?(Cont..)
Frauds in industry happens in the following situations:

• Safety deposit boxes and vaults


• Bank transaction like ATM withdrawals
• Access to computers and emails
• Credit Card purchase
• Purchase of house, car, clothes or jewellery
• Getting official documents like birth certificates or passports
• Obtaining court papers
• Drivers licence
• Getting into confidential workplace
• writing Checks

6
Biometric System (Cont..)
• A biometric system may operate either in
verification mode or identification mode.

A. Verification mode:
“Does this biometric data belong to Bob? ”

B. Identification mode:
“Whose biometric data is this? ”

• “Recognition” is the generic term of


verification and identification.

7
Biometric System (Cont..)

Template

Login Quality Feature


System
Interface Checker Extractor
Database
Get Name & Snapshot Check Quality

Enrollment

8
Biometric System (Cont..)

Claimed identity

Login Feature
Matcher System
Interface Extractor
Database
One template
Get Name & Snapshot Extract Features One match

True / False
Verification

9
Biometric System (Cont..)

Login Feature
Matcher System
Interface Extractor
Database
N templates
Get Name & Snapshot Extract Features N match

User’s identity or
Identification “user unidentified”

10
Biometrics

“determine or authenticate identity”


◼ Identification Systems:
• Who am I?
• Determine Identity
◼ Verification Systems:
• Am I who I claim to be?
• Authenticate Identity

by Alvaro E. Escobar 11
Biometrics

“determine or authenticate identity”


◼ Verification Systems (cont):
• More accurate.
• Less expensive.
• Faster.
• More limited in function.
• Requires more effort by user.

by Alvaro E. Escobar 12
Biometrics
◼ Identification and verification:
• Finger scan
• Iris scan
• Retina scan
• Facial scan (optical and infrared)
◼ Verification only:
• Hand Geometry
• Voice Print
• Keystroke Behavior
• Signature
◼ Other Biometric Technologies in the making.
by Alvaro E. Escobar 13

You might also like