SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
BIOMETRICS.
     By-
           1. Jeevjyot Singh.
            2. Diksha godse.
What is biometrics?
Generally, the study of measurable biological
characteristics. In computer security OR information
technology, biometrics refers to authentication
techniques that rely on measureable physical
characteristics that can be automatically checked.
There are several types of biometric identification scheme:
      Face: the analysis of facial characteristics.

Fingerprint: the analysis of an individual’s unique fingerprints.

Hand geometry: the analysis of the shape of the hand and the length

of the finger.

Retina: the analysis of the capillary vessels located at the back of the

eye.
Iris: the analysis of the colored ring that surrounds the eye.
Signature: the analysis of the way a persons signs his
name.
Vein: the analysis of pattern of veins in the back of the hand
and the wrist.
Voice: the analysis of the tone,pitch,cadence and frequency
of a person’s voice.
Biometric characteristics –
                        this can be divided in two main
classes-

Physiological are              Behavioral are
    related to the shape of       related to the behavior of
    the body. They include        a person. They include-
                                • Typing rhythm
•   Fingerprint                 • Gait
•   Face recognition            • Voice.
•   DNA
•   Palm print
•   Iris recognition
•   Hand geometry
A biometric system can operate in the
following two modes:
       • VERIFICATION- a one to one
         comparison of a captured
         biometric with a stored template
         to verify that the individual is
         who he claims to be. Can be
         done in conjunction with a
         smartcard, username or id
         number.
          ?
• IDENTIFICATION-A one to
 many comparison of the captured
 biometric against a biometric database in
 attempt to identify an unknown individual.
 The identification only succeeds in
 identifying the individual if the comparison
 of the biometric sample to an template in
 the database falls within a previously set
 threshold.



         ?
HOW DOES BIOMETRIC
SYSTEM WORKS:-

  •The first time an individual uses a
  biometric system is called an enrollment.
  During an enrollment, biometric
  information from an individual is stored.

• In subsequent uses, biometric information
  is detected and compared with the
  information stored at the time of
  enrollment.
• The first block (SENSOR) is the interface
  between the real world and the system; it
  has to acquire all the necessary data.
• Most of the time it is an image acquisition
  system; but it can change according to the
  characteristics desired.
• second block performs all the necessary pre-
processing:it has to remove artifacts from
sensor, to enhance the input, to use some kind of
normalisation.
• In the third block necessary features are extracted. This step is an
   important step as the correct features need to be extracted optimal
   way.

• A vector of numbers of or an image with a particular properties is
   used to create a TEMPLATE.

• A template is synthesis of the relevant characteristics extracted from
   the source.

• If a matching phase is being performed, the obtained template is
   passed to a matcher that compares it with other existing
   templates,estimating the distance between them using any
   algorithm.

• The matching program will analyze the template with the input. This
   will then be the output for any specified use or purpose.
Biometrics In
   Detail.
Finger-scan

• A live acquisition of
  a person’s
  fingerprint.
• Image Acquisition
  Image Processing
     Template
  Creation
  Template Matching
• Acquisition
  Devices:
   – Glass plate
   – Electronic
   – Ultrasound
Fingerprint SWAD

• Strengths:
   – Fingerprints don’t change over
      time
   – Widely believed fingerprints are
      unique
• Weaknesses:
   – Scars
• Attacks:
   – Surgery to alter or remove prints
   – Finger Decapitation
   – “Gummy fingers”
   – Corruption of the database
• Defenses:
   – Measure physical properties of a
      live finger (pulse)
Iris Scan


 • Image Acquisition
   Image Processing
      Template
   Creation
   Template Matching
 • Uses to date:
    – Physical access
      control
    – Computer
      authentication
Iris Scan: SWAD


 • Strengths:
    – 300+ characteristics; 200 required for match
 • Weaknesses:
    – Fear
    – Discomfort
    – Proprietary acquisition device
    – Algorithms may not work on all individuals
    – No large databases
 • Attacks:
    – Surgery (Minority Report )
 • Defenses:
Hand Scan


• Typical systems measure 90
  different features:
   – Overall hand and finger
      width
   – Distance between joints
   – Bone structure
• Strengths:
   – No negative connotations
      – non-intrusive
   – Reasonably robust
      systems
• Weaknesses:
   – Accuracy is limited; can
      only be used for 1-to-1
      verification
   – Bulky scanner
Biometric applications

  I.    Physical Access.

  II.   Pc And Control Network.

  III. Time And Attendance.

  IV. Logical Access

  V. Financial Security.

  VI. Law Enforcement.

  VII. Immigrations And Airports.
CONCLUSION
  Technology is growing rapidly, but at the same time
  security breaches and transaction fraud are also in the
  increase in the world over .All agencies that are in
  need of security have adopted biometrics.

 “THE FUTURE DEPENDS UPON WHAT WE DO IN
  THE PRESENT”
                -MAHATMA GANDHI.

Let us hope for better and safe future.
THANK YOU!

Más contenido relacionado

La actualidad más candente

Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationMayank Sachan
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structureijcsit
 
Biometric authenticatiion technology
Biometric authenticatiion technologyBiometric authenticatiion technology
Biometric authenticatiion technologyNazeerKhan39
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hackingNeel Parikh
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individualsVaibhav Bhalotia
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signatureMazin Alwaaly
 

La actualidad más candente (20)

Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structure
 
Biometric
BiometricBiometric
Biometric
 
Biometric authenticatiion technology
Biometric authenticatiion technologyBiometric authenticatiion technology
Biometric authenticatiion technology
 
Biometrics in Security
Biometrics in SecurityBiometrics in Security
Biometrics in Security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hacking
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individuals
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Biometrics (1)
Biometrics (1)Biometrics (1)
Biometrics (1)
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 

Destacado

Union Budget 2012-13 Budget final
Union Budget 2012-13 Budget  finalUnion Budget 2012-13 Budget  final
Union Budget 2012-13 Budget finalaniket satam
 
Destrucció d'hàbitats
Destrucció d'hàbitatsDestrucció d'hàbitats
Destrucció d'hàbitatsionac
 
Dear compiler please don't be my nanny v2
Dear compiler  please don't be my nanny v2Dear compiler  please don't be my nanny v2
Dear compiler please don't be my nanny v2Dino Dini
 
Simplest ai trick gdc2013 dino v2 (1)
Simplest ai trick gdc2013 dino v2 (1)Simplest ai trick gdc2013 dino v2 (1)
Simplest ai trick gdc2013 dino v2 (1)Dino Dini
 
The polling problem
The polling problemThe polling problem
The polling problemDino Dini
 

Destacado (6)

Présentation allah
Présentation allahPrésentation allah
Présentation allah
 
Union Budget 2012-13 Budget final
Union Budget 2012-13 Budget  finalUnion Budget 2012-13 Budget  final
Union Budget 2012-13 Budget final
 
Destrucció d'hàbitats
Destrucció d'hàbitatsDestrucció d'hàbitats
Destrucció d'hàbitats
 
Dear compiler please don't be my nanny v2
Dear compiler  please don't be my nanny v2Dear compiler  please don't be my nanny v2
Dear compiler please don't be my nanny v2
 
Simplest ai trick gdc2013 dino v2 (1)
Simplest ai trick gdc2013 dino v2 (1)Simplest ai trick gdc2013 dino v2 (1)
Simplest ai trick gdc2013 dino v2 (1)
 
The polling problem
The polling problemThe polling problem
The polling problem
 

Similar a Biometrics

Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 

Similar a Biometrics (20)

Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometric
Biometric Biometric
Biometric
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biomatric
BiomatricBiomatric
Biomatric
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 

Último

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 

Último (20)

COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 

Biometrics

  • 1. BIOMETRICS. By- 1. Jeevjyot Singh. 2. Diksha godse.
  • 2. What is biometrics? Generally, the study of measurable biological characteristics. In computer security OR information technology, biometrics refers to authentication techniques that rely on measureable physical characteristics that can be automatically checked. There are several types of biometric identification scheme:  Face: the analysis of facial characteristics. Fingerprint: the analysis of an individual’s unique fingerprints. Hand geometry: the analysis of the shape of the hand and the length of the finger. Retina: the analysis of the capillary vessels located at the back of the eye.
  • 3. Iris: the analysis of the colored ring that surrounds the eye. Signature: the analysis of the way a persons signs his name. Vein: the analysis of pattern of veins in the back of the hand and the wrist. Voice: the analysis of the tone,pitch,cadence and frequency of a person’s voice.
  • 4. Biometric characteristics – this can be divided in two main classes- Physiological are Behavioral are related to the shape of related to the behavior of the body. They include a person. They include- • Typing rhythm • Fingerprint • Gait • Face recognition • Voice. • DNA • Palm print • Iris recognition • Hand geometry
  • 5. A biometric system can operate in the following two modes: • VERIFICATION- a one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smartcard, username or id number. ?
  • 6. • IDENTIFICATION-A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the biometric sample to an template in the database falls within a previously set threshold. ?
  • 7. HOW DOES BIOMETRIC SYSTEM WORKS:- •The first time an individual uses a biometric system is called an enrollment. During an enrollment, biometric information from an individual is stored. • In subsequent uses, biometric information is detected and compared with the information stored at the time of enrollment.
  • 8. • The first block (SENSOR) is the interface between the real world and the system; it has to acquire all the necessary data. • Most of the time it is an image acquisition system; but it can change according to the characteristics desired. • second block performs all the necessary pre- processing:it has to remove artifacts from sensor, to enhance the input, to use some kind of normalisation.
  • 9. • In the third block necessary features are extracted. This step is an important step as the correct features need to be extracted optimal way. • A vector of numbers of or an image with a particular properties is used to create a TEMPLATE. • A template is synthesis of the relevant characteristics extracted from the source. • If a matching phase is being performed, the obtained template is passed to a matcher that compares it with other existing templates,estimating the distance between them using any algorithm. • The matching program will analyze the template with the input. This will then be the output for any specified use or purpose.
  • 10. Biometrics In Detail.
  • 11. Finger-scan • A live acquisition of a person’s fingerprint. • Image Acquisition Image Processing Template Creation Template Matching • Acquisition Devices: – Glass plate – Electronic – Ultrasound
  • 12. Fingerprint SWAD • Strengths: – Fingerprints don’t change over time – Widely believed fingerprints are unique • Weaknesses: – Scars • Attacks: – Surgery to alter or remove prints – Finger Decapitation – “Gummy fingers” – Corruption of the database • Defenses: – Measure physical properties of a live finger (pulse)
  • 13. Iris Scan • Image Acquisition Image Processing Template Creation Template Matching • Uses to date: – Physical access control – Computer authentication
  • 14. Iris Scan: SWAD • Strengths: – 300+ characteristics; 200 required for match • Weaknesses: – Fear – Discomfort – Proprietary acquisition device – Algorithms may not work on all individuals – No large databases • Attacks: – Surgery (Minority Report ) • Defenses:
  • 15. Hand Scan • Typical systems measure 90 different features: – Overall hand and finger width – Distance between joints – Bone structure • Strengths: – No negative connotations – non-intrusive – Reasonably robust systems • Weaknesses: – Accuracy is limited; can only be used for 1-to-1 verification – Bulky scanner
  • 16. Biometric applications I. Physical Access. II. Pc And Control Network. III. Time And Attendance. IV. Logical Access V. Financial Security. VI. Law Enforcement. VII. Immigrations And Airports.
  • 17. CONCLUSION Technology is growing rapidly, but at the same time security breaches and transaction fraud are also in the increase in the world over .All agencies that are in need of security have adopted biometrics. “THE FUTURE DEPENDS UPON WHAT WE DO IN THE PRESENT” -MAHATMA GANDHI. Let us hope for better and safe future.