0% found this document useful (0 votes)
88 views40 pages

Biometrics Technology: Ravinder Vishnoi

Biometrics uses biological characteristics to identify individuals. There are three main types of authentication: something you know (e.g. password), something you have (e.g. keycard), something you are (biometrics). Common biometric traits include fingerprints, face, iris, retina, hand geometry. Behavioral traits also used are signature, voice. Biometrics provides improved security over traditional methods and a wide range of applications from access control to attendance to banking. However, biometrics also faces challenges including costs, accuracy, and privacy/security concerns.

Uploaded by

vishnoiravinder
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views40 pages

Biometrics Technology: Ravinder Vishnoi

Biometrics uses biological characteristics to identify individuals. There are three main types of authentication: something you know (e.g. password), something you have (e.g. keycard), something you are (biometrics). Common biometric traits include fingerprints, face, iris, retina, hand geometry. Behavioral traits also used are signature, voice. Biometrics provides improved security over traditional methods and a wide range of applications from access control to attendance to banking. However, biometrics also faces challenges including costs, accuracy, and privacy/security concerns.

Uploaded by

vishnoiravinder
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40

Biometrics Technology

Ravinder Vishnoi

three main types of authentication available today are:

something you know, like a password, PIN, or code. something you have, like a swipe card, smart card, token, or key. something you are, which is biometrics.

What is a biometric?
Biometrics

Is the term given to the use of


biological traits OR behavioral characteristics

to identify an individual.

Characteristics
The common Physical characteristics are: Fingerprint Face Retina

Iris Vein pattern, and Hand and finger geometry

Characteristics
Behavioral characteristics are:

Keystroke dynamics Voice Gait, and Signature dynamics

The Biometric importance

The security is needed in every place.

Alleviate the existing problems, Like those which can be taken, stolen, borrowed or even forgotten.

The Biometric importance (Cont.)

Improves convenience, security, and privacy.

The first and most critical link in the security chain. presented to counteract security threats.

Biometrics History

The term "biometrics" is derived from the Greek words bio which means (life) and metric means (to measure).

Biometrics History (Cont.)

the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century.

Biometrics History (Cont.)

In the 1890s, 'Bertillonage', created a method of bodily measurement with the criminals who repeated the crimes with different names and looks.

Biometrics History (Cont.)

After this, finger printing, which was developed by Richard Edward Henry of Scotland Yard.

Biometrics Process
new biometric sample is requested.
No
Signal Processing, Feature Extraction, Representation

Biometric Data Collection

Transmission

Quality Sufficient? Yes


Generate Template

Database
Yes No

Template Match

Decision Confidence?

Physical Characteristics

Fingerprint Recognition:

Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual.

Fingerprint Recognition steps:

Database

Face Recognition:

Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual.

Face recognition process:


Input face image

Extraction of face image

Extraction of face features

Positive Database negative

Iris Identification:

The iris is the colored ring of textured tissue that surrounds the pupil of the eye.

Iris Identification Steps:


Input of face image Detection of eye regions Recognition of iris pattern

Put iris in focus

accept

reject

Database

Veins Recognition:

Venial Recognition: A system for Identification using a persons unique vein patterns. as a biometrics tool involve the measurement of the blood vessels on the back of your hand.

Veins

Vein Recognition System:


Input of palm picture The output picture Generate veins structure

match
Not match Database

Behavioral Characteristics

Voice Recognition:

Voice Recognition: is the Identification using the acoustic features of speech that have been found to differ between individuals.

Voice Identification System

Construct voice reference template Database

Signature Identification:

Signature identification: is the analyses of the way a user signs his or her name. The process used by a biometric system to verify a signature is called dynamic signature verification (DSV).

Signature Verification Process (Cont.)

the angle at which the pen is held,

the number of times the pen is lifted,


the time it takes to write the entire signature, the pressure exerted by the person while signing, Biometric trait

the variations in the speed with which different parts of the signature are written.

Signature Verification Process

Profile

Database

Movies to Real World

Applications of Biometric

Applications of Biometric

Access control : Disney World (fingerprint scanner).

Child day care centers ( hand geometry systems )

Applications of Biometric (Cont.)


Time and attendance management: Hospitals (hand geometry systems)

Other Applications

Airports:

Heathrow airport (iris recognition)

ATMs: (face recognition)

Other Applications (Cont.)


Pc access: GM and Hertz (voice identification technology) to protect their computer facilities.

Fujitsu has developed a mouse that can verify a person's identity by recognizing his pattern of blood veins.

Other Applications (Cont.)


Prisons: Fujitsu has developed a mouse that can verify a person's identity by recognizing his pattern of blood veins.

Advantages of biometrics
1. 2. 3. 4. 5. 6.

Uniqueness

Universality
Permanence Measurability User friendliness Accuracy

7.

Comfort

Disadvantages of Biometrics
1.

costly.

2.

Facial imaging can also hinder accurate identifications.

3.

Missing body part problem.

Disadvantages of Biometrics
(Cont.)
4.

False acceptances and rejections.

5. 6.

The amount of comfort. The scanning of eye is fearful.

7.

The nervousness that people feel about the scanners identification.

Future Prospects
Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are:
1. 2.

Ear shape identification. Body odor identification.

3.
4. 5.

Body salinity identification.


EEG Fingerprint DNA matching

Conclusion
Not

perfect yet.

Successful
Decreasing Increasing The

applications.
costs and increasing convenience.

both privacy and identity security.

field of biometrics is evolving. from this technology .

Benefit

References:
The Biometric Consortium - http://www.biometrics.org/ National Institute of Standards and Technology - http://www.nist.gov/ The Biometric Catalog - http://www.biometricscatalog.org/ ITPro - http://www.computer.org/ Georgia Institute of Technology - http://www.gatech.edu/ http://www.biometricgroup.com/abio1/technology/researchtechnology.htm http://www.conspiracyarchive.com/images/biometrics.jpg http://www.information-security-topics.org/information_security_index/V http://www.bromba.com/faq/fpfaqe.htm

You might also like