SlideShare una empresa de Scribd logo
1 de 24
Biometrics Sensors


Submitted by:- Sukhdeep Singh Sidhu
         Roll No. :- 115363
         Branch:- CSE N2
   Authentication – the process of verifying that a
    user requesting a network resource is who he,
    she, or it claims to be, and vice versa.

   Conventional authentication methods
    › „something that you have“ – key, magnetic card or
      smartcard
    › „something that you know“ – PIN or password

   Biometric authentication uses personal features
    › „something that you are“
Contents
   Application domains for biometric products

   Biometric products
       Fingerprint recognition
       Face recognition
       Iris recognition
       Retinal recognition
       Hand geometry measurement
       Dynamic signature verification

   How good are biometric products today?

   Conclusions
   Access control
    › to devices
        cellular phones
        logging into a computer, laptop, or PDA
        cars
        guns
    › to local services
        debitting money from a cash dispenser
        logging in to computer
        accessing data on smartcard
    › to remote services
        e-commerce
        e-business
   Physical access control
    › to high security areas
    › to public buildings or areas
 Time & attendance control
 Identification
    › forensic person investigation
    › social services applications, e.g. immigration or
      prevention of welfare fraud
    › personal documents, e.g. electronic drivers
      license or ID card
   Sensors
    › optical sensors
    › ultrasound sensors
    › chip-based sensors
    › thermal sensors
   Integrated products
    › for identification – AFIS systems
    › for verification
Electro-optical sensor
                                   [DELSY® CMOS sensor modul]


   Optical fingerprint sensor
[Fingerprint Identification Unit
     FIU-001/500 by Sony]




                                          Capacitive sensor
                                      [FingerTIP™ by Infineon]
Thermal sensor
                            [FingerChip™ by ATMEL
                              (was: Thomson CSF)]

      E-Field Sensor
[FingerLoc™ by Authentec]
[BioMouse™ Plus by American Biometric Company]




Physical Access Control System
 [BioGate Tower by Bergdata]                  [ID Mouse by Siemens]
Keyboard [G 81-12000
                                             by Cherry]




                                      System including
[TravelMate 740 by Compaq und Acer]   fingerprint sensor,
                                      smartcard reader and
                                      display by DELSY
Face recognition system
[TrueFace Engine by Miros]


                                           Face recognition system
                      [O n e -t o -O n e ™ b y B io m e t r ic Ac c e s s C o r p o r a t io n ]
S y s t e m f o r p a s s iv e ir is r e c o g n it io n b y S e n s a r




S y s t e m f o r a c t iv e ir is
r e c o g n it io n b y Ir is S c a n
Retinal recognition system [Icam 2001 by Eyedentify]
Hand geometry reader by Recognition Systems


        Hand geometry reader for
two finger recognition by BioMet Partners
Electronic pen [LCI-SmartPen]
Digitising tablet by   Digitising tablet [Hesy Signature Pad
Wacom Technologies       by BS Biometric Systems GmbH]
   Combination of biometric technologies
    › Fingerprint and face recognition
    › Face recognition and lip movement
    › Fingerprint recognition and dynamic signature
     verification



 increase the level of security achieved by
  the system
 enlarge the user base
   depends on the application
     reliability
     security
     performance
     cost
     user acceptance
     life detection
     users that are unsuitable
     size of sensor
   How can we find out, how good a biometric
    product is?
    › Empirical tests of the product
   In the past year, there were two
    independent test series of biometric products
    › in Japan
    › in Germany
1.   Regular biometric sensor
     using artificially generated
     biometric data

3.   Replay attack of
     eavesdropped biometric
     data

5.   Manipulation of stored
     biometric reference data
 Tsutomu Matsumoto, a Japanese
  cryptographer working at Yokohama
  National University
 11 state-of-the-art fingerprint sensors
 2 different processes to make gummy fingers
    › from live finger
    › from latent fingerprint

 Gummy       fingers fooled fingerprint sensors 80%
    of the time
 Computer magazine c’t
 11 biometric sensors
    › 9 fingerprint sensors,
    › 1 face recognition system, and
    › 1 iris scanner
   Fingerprint sensors –
    › reactivate latent fingerprints (optical and capacitive
      sensors)
    › apply latex finger (thermal sensor)
   Face recognition system –
    › down- (up-) load biometric reference data from (to) hard
      disk
    › no or only weak life detection
   Iris recognition –
    › picture of iris of enrolled person with cut-out
      pupil, where a real pupil is displayed


 All tested biometric systems could be fooled,
    but the effort differed considerably
   Biometric technology has great potential
   There are many biometric products around,
    regarding the different biometric technologies
   Shortcomings of biometric systems due to
    › manufacturers ignorance of security concerns
    › lack of quality control
    › standardisation problems

   Biometric technology is very promising
   Manufacturers have to take security concerns
    serious

Más contenido relacionado

La actualidad más candente

IoT based Flood detection system
IoT based Flood detection systemIoT based Flood detection system
IoT based Flood detection systemROHIT89352
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
ELECTRONIC THERMOMETER USING MICROCONTROLLER
ELECTRONIC THERMOMETER USING MICROCONTROLLERELECTRONIC THERMOMETER USING MICROCONTROLLER
ELECTRONIC THERMOMETER USING MICROCONTROLLERRajesh Pandiyan
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access systemAkshay Govekar
 

La actualidad más candente (20)

Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
IoT based Flood detection system
IoT based Flood detection systemIoT based Flood detection system
IoT based Flood detection system
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
ELECTRONIC THERMOMETER USING MICROCONTROLLER
ELECTRONIC THERMOMETER USING MICROCONTROLLERELECTRONIC THERMOMETER USING MICROCONTROLLER
ELECTRONIC THERMOMETER USING MICROCONTROLLER
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 

Destacado

Nano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf fileNano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf fileRishu Mishra
 
optical nanosensors
optical nanosensorsoptical nanosensors
optical nanosensorsAhtirma Shan
 
Mobile Trends and Innovations
Mobile Trends and InnovationsMobile Trends and Innovations
Mobile Trends and InnovationsMarta Rauch
 
Smart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta BhattacharyyaSmart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta BhattacharyyaSukanta Bhattacharyya
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Bio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health CareBio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health CareJeffrey Funk
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Nanosensors basics, design and applications
Nanosensors basics, design and applicationsNanosensors basics, design and applications
Nanosensors basics, design and applicationsUniversity of Technology
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde9527604481
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communicationchiranjitgiri
 
Modern irrigation techniques
Modern irrigation techniquesModern irrigation techniques
Modern irrigation techniquesJatin Agarwal
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications Ahmed_hashmi
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 

Destacado (18)

BIO-METRICS
BIO-METRICSBIO-METRICS
BIO-METRICS
 
Nano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf fileNano electronics- role of nanosensors, pdf file
Nano electronics- role of nanosensors, pdf file
 
Retina scan
Retina scanRetina scan
Retina scan
 
10 nanosensors
10 nanosensors10 nanosensors
10 nanosensors
 
optical nanosensors
optical nanosensorsoptical nanosensors
optical nanosensors
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Mobile Trends and Innovations
Mobile Trends and InnovationsMobile Trends and Innovations
Mobile Trends and Innovations
 
Smart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta BhattacharyyaSmart sensors -Sukanta Bhattacharyya
Smart sensors -Sukanta Bhattacharyya
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Bio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health CareBio-Electronics, Bio-Sensors, Smart Phones, and Health Care
Bio-Electronics, Bio-Sensors, Smart Phones, and Health Care
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Nanosensors basics, design and applications
Nanosensors basics, design and applicationsNanosensors basics, design and applications
Nanosensors basics, design and applications
 
underwater wireless communication by shyam shinde
underwater wireless communication by shyam shindeunderwater wireless communication by shyam shinde
underwater wireless communication by shyam shinde
 
7 nanosensors
7 nanosensors7 nanosensors
7 nanosensors
 
Underwater communication
Underwater communicationUnderwater communication
Underwater communication
 
Modern irrigation techniques
Modern irrigation techniquesModern irrigation techniques
Modern irrigation techniques
 
Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 

Similar a Biometric Sensors

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE Roy Awais
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMRoy Awais
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airportCheapticketsSG
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 

Similar a Biometric Sensors (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Bio matrix
Bio matrixBio matrix
Bio matrix
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 

Más de parmsidhu

open source technology
open source technologyopen source technology
open source technologyparmsidhu
 
C++ Introduction
C++ IntroductionC++ Introduction
C++ Introductionparmsidhu
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networkingparmsidhu
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networkingparmsidhu
 

Más de parmsidhu (6)

open source technology
open source technologyopen source technology
open source technology
 
C++ Introduction
C++ IntroductionC++ Introduction
C++ Introduction
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networking
 
Mobile Networking
Mobile NetworkingMobile Networking
Mobile Networking
 
Parm
ParmParm
Parm
 
Parm
ParmParm
Parm
 

Último

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Biometric Sensors

  • 1. Biometrics Sensors Submitted by:- Sukhdeep Singh Sidhu Roll No. :- 115363 Branch:- CSE N2
  • 2. Authentication – the process of verifying that a user requesting a network resource is who he, she, or it claims to be, and vice versa.  Conventional authentication methods › „something that you have“ – key, magnetic card or smartcard › „something that you know“ – PIN or password  Biometric authentication uses personal features › „something that you are“
  • 3. Contents  Application domains for biometric products  Biometric products  Fingerprint recognition  Face recognition  Iris recognition  Retinal recognition  Hand geometry measurement  Dynamic signature verification  How good are biometric products today?  Conclusions
  • 4. Access control › to devices  cellular phones  logging into a computer, laptop, or PDA  cars  guns › to local services  debitting money from a cash dispenser  logging in to computer  accessing data on smartcard › to remote services  e-commerce  e-business
  • 5. Physical access control › to high security areas › to public buildings or areas  Time & attendance control  Identification › forensic person investigation › social services applications, e.g. immigration or prevention of welfare fraud › personal documents, e.g. electronic drivers license or ID card
  • 6. Sensors › optical sensors › ultrasound sensors › chip-based sensors › thermal sensors  Integrated products › for identification – AFIS systems › for verification
  • 7. Electro-optical sensor [DELSY® CMOS sensor modul] Optical fingerprint sensor [Fingerprint Identification Unit FIU-001/500 by Sony] Capacitive sensor [FingerTIP™ by Infineon]
  • 8. Thermal sensor [FingerChip™ by ATMEL (was: Thomson CSF)] E-Field Sensor [FingerLoc™ by Authentec]
  • 9. [BioMouse™ Plus by American Biometric Company] Physical Access Control System [BioGate Tower by Bergdata] [ID Mouse by Siemens]
  • 10. Keyboard [G 81-12000 by Cherry] System including [TravelMate 740 by Compaq und Acer] fingerprint sensor, smartcard reader and display by DELSY
  • 11. Face recognition system [TrueFace Engine by Miros] Face recognition system [O n e -t o -O n e ™ b y B io m e t r ic Ac c e s s C o r p o r a t io n ]
  • 12. S y s t e m f o r p a s s iv e ir is r e c o g n it io n b y S e n s a r S y s t e m f o r a c t iv e ir is r e c o g n it io n b y Ir is S c a n
  • 13. Retinal recognition system [Icam 2001 by Eyedentify]
  • 14. Hand geometry reader by Recognition Systems Hand geometry reader for two finger recognition by BioMet Partners
  • 16. Digitising tablet by Digitising tablet [Hesy Signature Pad Wacom Technologies by BS Biometric Systems GmbH]
  • 17. Combination of biometric technologies › Fingerprint and face recognition › Face recognition and lip movement › Fingerprint recognition and dynamic signature verification  increase the level of security achieved by the system  enlarge the user base
  • 18. depends on the application  reliability  security  performance  cost  user acceptance  life detection  users that are unsuitable  size of sensor
  • 19. How can we find out, how good a biometric product is? › Empirical tests of the product  In the past year, there were two independent test series of biometric products › in Japan › in Germany
  • 20. 1. Regular biometric sensor using artificially generated biometric data 3. Replay attack of eavesdropped biometric data 5. Manipulation of stored biometric reference data
  • 21.  Tsutomu Matsumoto, a Japanese cryptographer working at Yokohama National University  11 state-of-the-art fingerprint sensors  2 different processes to make gummy fingers › from live finger › from latent fingerprint  Gummy fingers fooled fingerprint sensors 80% of the time
  • 22.  Computer magazine c’t  11 biometric sensors › 9 fingerprint sensors, › 1 face recognition system, and › 1 iris scanner  Fingerprint sensors – › reactivate latent fingerprints (optical and capacitive sensors) › apply latex finger (thermal sensor)  Face recognition system – › down- (up-) load biometric reference data from (to) hard disk › no or only weak life detection
  • 23. Iris recognition – › picture of iris of enrolled person with cut-out pupil, where a real pupil is displayed  All tested biometric systems could be fooled, but the effort differed considerably
  • 24. Biometric technology has great potential  There are many biometric products around, regarding the different biometric technologies  Shortcomings of biometric systems due to › manufacturers ignorance of security concerns › lack of quality control › standardisation problems  Biometric technology is very promising  Manufacturers have to take security concerns serious

Notas del editor

  1. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002
  2. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002
  3. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002
  4. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 PDA = Personal Digital Assistant
  5. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 For example, a system for physical access control has been used at the Olympic Games in Atlanta. fingerprint recognition has been used in forensic applications since early 20 th century. ID cards based on fingerprint recognition are used in Brunei.
  6. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 AFIS = Automated Fingerprint Identification System
  7. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The sensors by DELSY and Infineon are chip-based. A picture of an ultrasound fingerprint sensor [by UltraScan] was not available.
  8. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The sensor by Authentec is chip-based.
  9. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 BioMouse ™ Plus: integrated smartcard reader and fingerprint sensor ID Mouse: mouse with fingerprint sensor
  10. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Cherry keyboard: with integrated smartcard reader and fingerprint sensor
  11. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Sensors are standard off-the-shelf cameras. Therefore, the price of a face recognition system is determined solely by the software. This makes face recognition quite cost effective. TrueFace Engine: feedback for focussing the face on PC monitor One-to-One ™: feedback for focussing the face using mirrored camera
  12. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 IrisScan: In an active system, the user has to focus the iris into the corresponding frame (displayed on the computer monitor) him/herself. Sensar: In a passive system, the sensor focusses the biometric feature itself.
  13. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 To our knowledge, there is only one manufacturer of retinal recognition systems.
  14. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Hand geometry reading has been used at the Olympic Games in Atlanta to monitor access to the Olympic village.
  15. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The pen measures pressure and tilt.
  16. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 The sensors are incorporated into the tablet.
  17. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 „ increase the level of security achieved by the system“ by using two or more biometric methods in conjunction. „ enlarge the user base“ by giving the user an alternative.
  18. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Reliability: Some sensors are more vulnerable than others. Security: The error rates of different biometric technologies vary a lot. For example, iris recognition systems have an error rate in the order of 1 in 1 million users, fingerprint recognition systems have an error rate in the order of 1 in 1000 to 1 in 10000 and speaker recognition systems or dynamic signature verification systems have an error rate in the order of 1 in 100. Cost: Some biometric methods do not require specific sensor technology, for example speaker recognition, face recognition and keystroke dynamics, whereas other require sophisticated sensor technology. Hence, the costs vary a lot. User acceptance: For example, retinal recognition systems have a very low user acceptance, whereas others, like dynamic signature verification, face recognition, and speaker recognition are widely accepted. Life detection: Life detection is a very important feature of any biometric system. There are biometric technologies where life detection is not satisfactory (e.g. speaker recognition). Users that are unsuitable: For every biometric technology, there is a small ratio of users for whom the biometric method does not work, e.g. fingerprint recognition cannot be used when a person has lost both arms. Size of sensor: Fingerprint sensors are very small and can be incorporated even into small devices. Hand geometry readers, on the other, would not be suitable for e.g. mobile applications.
  19. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 [ http://www.itu.int/itudoc/itu-t/workshop/security/present/s5p4.pdf ] [Mat02] Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems," Proceedings of SPIE Vol. #4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002.
  20. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Face recognition system (biometric data unprotected on hard disk) – Biometric reference data downloaded onto laptop and displayed on screen. The face recognition system accepts the displayed picture. Attacker creates new biometric reference data and loads it into the face recognition database. The face recognition system accepts the attacker as legitimate user. Fingerprint recognition – Breathe onto sensor or apply water-filled plastic bag or apply graphite powder and a piece of tape to reactivate latent fingerprints (for capacitive sensors) Use graphite powder technique plus bright light to reactivate latent fingerprints (for optical fingerprint sensors) Use latex finger (for thermal sensors)
  21. page „ State of the Art in Biometrics“ S. Schwiderski-Grosche 14/10/2002 Links and documents: Scheuermann, D., Schwiderski-Grosche, S. und Struif, B., Usability of Biometrics in Relation to Electronic Signatures , EU Studie 502533/8, http://www.sit.fraunhofer.de/cgi-bin/sit-frame/sica?link=/SICA/projects/bio_sig.html. Jain, A., Bolle, R. und Pankanti, S., Biometrics: Personal Identification in Networked Society , Kluwer Academic Publishers, 1999. International Biometric Group: http:// www.biometricgroup.com The Biometric Consortium: http://www.biometrics.org/ Association for Biometrics: http://www.afb.org.uk/ BioAPI Consortium: http://www.bioapi.org/ International Biometric Industry Association: http://www.ibia.org/