Biometrics-Based Authentication: Seminar On
Biometrics-Based Authentication: Seminar On
Biometrics-Based Authentication
What is Authentication?
• It is the process by which someone or something
is given a valid authenticity so that he can access a
particular application or thing.
E.g.
• password and user ID for users.
• Providing PIN to identification card users.
• Giving gate pass to the employees of a company.
Why biometrics?
Biometrics is concerned with identifying a person
based on his or her physiological or behavioral
characteristics.
Biometrics are unique human feature such as
finger prints, hand geometry, face and iris or
retinal patterns, DNA and voice.
Being the intrinsic properties of an individual,
these are difficult to surreptitiously duplicate and
nearly impossible to share.
Where it is needed?
Reliable user authentication is becoming
an increasingly important task in the Web-
enabled world. The value of reliable user
authentication is not limited to just
computer or network access. Many other
applications in everyday life also require
user authentication, such as banking, e-
commerce, and physical access control to
computer resources, and could benefit from
enhanced security.
Consequences of insecure
authentication
• The consequences of an insecure
authentication system in a corporate or
enterprise environment can be catastrophic,
and may include loss of confidential
information, denial of service, and
compromised data integrity.
Advantages
• Biometric readings, which range from several
hundred bytes to over a megabyte, have the
advantage that their information content is usually
higher than that of a password or a pass phrase.
Simply extending the length of passwords to get
equivalent bit strength presents significant usability
problems. It is nearly impossible to remember a 2K
phrase, and it would take an annoyingly long time to
type such a phrase (especially without errors).
Fortunately, automated biometrics can provide the
security advantages of long passwords while
retaining the speed and characteristic simplicity of
short passwords.
Human traits used for authentication
TRAITS METHOD
Fingerprints The patterns of friction ridges and valleys on an individual’s
fingerprints.
Hand and finger Physical characteristics such as the length, width, thickness, and
geometry surface area of the hands are measured using a system.