0% found this document useful (0 votes)
340 views20 pages

CSE Biometric Security Systems

This document discusses biometric security systems. It provides an overview of biometrics, which uses physical and behavioral traits to recognize humans. It then classifies and describes various types of biometric systems including odor/scent, facial recognition, handwriting analysis, finger/hand geometry, voiceprints, iris scanning, and vein patterns. The document discusses factors for determining the effectiveness of biometric traits and functions of biometric systems such as verification and identification. It concludes by discussing future applications and providing examples of biometric system usage in countries like Australia, Brazil, Germany, India, and Japan.

Uploaded by

mohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
340 views20 pages

CSE Biometric Security Systems

This document discusses biometric security systems. It provides an overview of biometrics, which uses physical and behavioral traits to recognize humans. It then classifies and describes various types of biometric systems including odor/scent, facial recognition, handwriting analysis, finger/hand geometry, voiceprints, iris scanning, and vein patterns. The document discusses factors for determining the effectiveness of biometric traits and functions of biometric systems such as verification and identification. It concludes by discussing future applications and providing examples of biometric system usage in countries like Australia, Brazil, Germany, India, and Japan.

Uploaded by

mohit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Seminar

On
Biometric Security Systems

Submitted To: Submitted By:


Prof. Indu Chhabra Mohit Saini
Content
Introduction
Overview
 Classification of BIOMETRICS
 Odor and Scent cognitive systems
 Facial cognitive systems
 Handwriting recognition
 Factors for determining characteristics
 Functions of biometric systems
The Future
INTRODUCTION

•Biometrics = bios + metron. Bios means life and metron


means measure.

•Recognizing humans based on physical and behavioral


traits.

•Also called BEHAVIOMETRICS.


OVERVIEW
Biometrics are used to identify the input sample when compared to a
template, used in cases to identify specific people by certain characteristics.

1)possession-based
using one specific "token" such as a security tag or a card

2)knowledge-based
the use of a code or password.

Layered systems combine a biometric method with a keycard or PIN.


Multimodal systems combine multiple biometric methods, like an iris
scanner and a voiceprint system.
Classification of BIOMETRICS
Physiological are related to the
shape of the body.

Behavioral are related to the


behavior of a person.

Cognitive biometrics is based


upon brain responses to stimuli. Classification of some biometric traits
Odor and Scent cognitive systems
• The use of blood hounds and other scent following dogs to
identify individual people or their scent trails in the
environment on the basis of a previous offered reference scent
article such as handkerchief, hat, and other items of clothing.
• Canine scent identification evidence is usually accepted in
court to suggest the unique identification of an accused
individual in the same way that finger prints are used.
• It is based on "individual odor theory," which hold that each
person has a unique scent that can be identified by the dog and
related back to a specific individual.
Facial cognitive systems
• Conventional biometric methods introduced to improve security
are mainly based on cross matching the face of the person with that
recorded in their identification materials.

• However, it is possible to train persons that could be referred to as


"face-minders", to memorize faces of suspects on a watch-list.
Trainees could acquire skills of cross-matching key features of faces
of persons seen at the ports as compared to that in the forensic facial
database.
Handwriting recognition
• Biometric systems don't just look at how
you shape each letter. They analyze the
act of writing. They examine the pressure
you use and the speed and rhythm with
which you write. They also record the
sequence in which you form letters.

• A handwriting recognition system's


sensors can include a touch-sensitive
writing surface or a pen that contains This Tablet PC has a signature verification system.

sensors that detect angle, pressure and


direction.
Hand and Finger geometry recognition
• Systems that measure hand and finger geometry use a
digital camera and light. To use one, we simply place
your hand on a flat surface, aligning your fingers
against several pegs to ensure an accurate reading.

• Then, a camera takes one or more pictures of your


hand and the shadow it casts. It uses this information
to determine the length, width, thickness and
curvature of your hand or fingers. It translates that
information into a numerical template.

• Fingers are less distinctive than fingerprints or irises


A hand geometry scanner
and people’s hands change over time due to many
reasons.
Voiceprint recognition
• Voice is unique for an individual because of
the shape of his/her vocal cavities and the
way they move their mouth when they
speak.

• Voiceprint is a sound spectrogram, not a


Speaker recognition systems use spectrograms
wave form. to represent human voices.

• Some companies use voiceprint recognition


so that people can gain access to
information or give authorization without
being physically present.
Iris Scanning
• It consists of a simple CCD digital camera.
It uses both visible and near-infrared light to
take a clear, high-contrast picture of a
person's iris.

• Usually, our eye is 3 to 10 inches from the


camera. When the camera takes a picture,
the computer locates:
i. The center of the pupil
ii. The edge of the pupil
iii. The edge of the iris Eye anatomy
iv. The eyelids and eyelashes
It then analyzes the patterns in the iris and
translates them into a code.
Vein geometry Recognition
• To use a vein recognition system, you simply
place your finger, wrist, palm or the back of
your hand on or near the scanner. A camera
takes a digital picture using near-infrared
light.

• The hemoglobin in your blood absorbs the


light, so veins appear black in the picture. As
with all the other biometric types, the
software creates a reference template based
on the shape and location of the vein
structure.

• Vein scans for medical purposes usually use


radioactive particles. Biometric security Vein scanners use near-infrared light
scans, however, just use light that is similar to to reveal the patterns in a person’s veins.

the light that comes from a remote control


Factors for determining characteristics

Universality
each person should have the characteristic

Uniqueness
is how well the biometric separates individually from
another.

Permanence
measures how well a biometric resists aging.
Factors for determining characteristics
Collectability
ease of acquisition for measurement.

Performance
accuracy, speed, and robustness of technology used.

Acceptability
degree of approval of a technology.

Circumvention
ease of use of a substitute.
Functions of biometric systems

 Verification
Authenticates its users in conjunction with a smart card, username or ID
number. The biometric template captured is compared with that stored against
the registered user either on a smart card or database for verification.

 
 Identification
Authenticates its users from the biometric characteristic alone without the
use of smart cards, usernames or ID numbers. The biometric template is
compared to all records within the database and a closest match score is
returned. The closest match within the allowed threshold is deemed the
individual and authenticated.
Uses and Initiatives
• Australia
Visitors intending to visit Australia may soon have to submit to
biometric authentication as part of the Smart gate system, linking individuals to
their visas and passports. Biometric data are already collected from some visa
applicants by Immigration. Australia is the first country to introduce a
Biometrics Privacy Code, which is established and administered by the
Biometrics Institute.

• Brazil
Since the beginning of the 20th century, Brazilian citizens have
had user ID cards. The decision by the Brazilian government to adopt
fingerprint-based biometrics. Each state in Brazil is allowed to print its own ID
card, but the layout and data are the same for all of them. The ID cards printed
in Rio de Janeiro are fully digitized using a 2D bar code with information which
can be matched against its owner off-line.
• Germany
Germany is also one of the first countries to implement biometric
technology at the Olympic Games to protect German athletes. “The Olympic
Games is always a diplomatically tense affair and previous events have been
rocked by terrorist attacks - most notably when Germany last held the Games in
Munich in 1972 and 11 Israeli athletes were killed”.
• India
When the program launched in 2009, India set out to achieve a world-
first: giving every citizen a unique, biometrically-verifiable identification number.
Those biometrics (iris scans and fingerprint records) would be linked to a person’s
Aadhaar number, which would in turn be used in all interactions with the state—
weeding out fraud, making taxation more efficient, and ultimately saving money,
the government said.
• Japan
Several banks in Japan have adopted either palm vein authentication
or finger vein authentication technology on their ATMs.
The Future
•Some hospitals use biometric systems to make sure mothers
take home the right newborns

•New methods that use DNA, nail bed structure, teeth, ear
shapes, body odor, skin patterns and blood pulses

•More accurate home-use systems

•Opt-in club memberships, frequent buyer programs and rapid


checkout systems with biometric security
Ques?
Q1: How to measure the performance of Biometric system?
Ans:-
The performance measurements of a biometric system are closely tied to
False Reject Rate (FRR) and False Accept Rate (FAR).

FRR is also known as Type-I error or False Non Match Rate (FNMR) which
states the likelihood of a legitimate user being rejected by the system.

FAR is referred to as Type-II error or False Match Rate (FMR) which states
the likelihood of a false identity claim being accepted by the system.

An ideal biometric system is expected to produce zero value for both FAR
and FRR. Means it should accept all genuine users and reject all fake identity
claims, which is practically not achievable.
Q2: Difference between waveform and spectrogram?
Ans:-
Waveform is (mathematics) the shape of a wave function
represented by a graph showing some dependent variable
as function of an independent variable while spectrogram
is a visual representation of the spectrum of a sound
changing through time.

You might also like