SlideShare una empresa de Scribd logo
1 de 14
SEMINAR ON
BIOMETRICS-BASED AUTHENTICATION
Submitted by:-
Chandra Bhanu Nayak
Regd.No.:1001205160
WHAT IS AUTHENTICATION?
 It is the process by which someone or
something is given a valid authenticity so that
he can access a particular application or
thing.
E.g.
 password and user ID for users.
 Providing PIN to identification card users.
 Giving gate pass to the employees of a
company.
WHY BIOMETRICS?
Biometrics is concerned with identifying a
person based on his or her physiological
or behavioral characteristics.
Biometrics are unique human feature
such as finger prints, hand geometry, face
and iris or retinal patterns, DNA and
voice.
Being the intrinsic properties of an
individual, these are difficult to
surreptitiously duplicate and nearly
impossible to share.
WHERE IT IS NEEDED?
Reliable user authentication is
becoming an increasingly important task
in the Web-enabled world. The value of
reliable user authentication is not limited
to just computer or network access.
Many other applications in everyday life
also require user authentication, such
as banking, e-commerce, and physical
access control to computer resources,
and could benefit from enhanced
security.
CONSEQUENCES OF INSECURE
AUTHENTICATION
 The consequences of an insecure
authentication system in a corporate or
enterprise environment can be catastrophic,
and may include loss of confidential
information, denial of service, and
compromised data integrity.
ADVANTAGES
 Biometric readings, which range from several
hundred bytes to over a megabyte, have the
advantage that their information content is
usually higher than that of a password or a pass
phrase. Simply extending the length of
passwords to get equivalent bit strength
presents significant usability problems. It is
nearly impossible to remember a 2K phrase,
and it would take an annoyingly long time to
type such a phrase (especially without errors).
Fortunately, automated biometrics can provide
the security advantages of long passwords
while retaining the speed and characteristic
HUMAN TRAITS USED FOR
AUTHENTICATION
TRAITS METHOD
Fingerprints The patterns of friction ridges and valleys on an individual’s
fingerprints.
Face An image of the person’s face is captured in the visible spectrum
using the infrared patterns of the facial heat emission.
Speech An acoustics of speech differ between individual.
Iris pattern Iris of the eye is the colored area surrounding the pupil. it is unique
and are obtained through a video based image acquisition system.
Hand and finger
geometry
Physical characteristics such as the length, width, thickness, and
surface area of the hands are measured using a system.
Signature This involves the dynamic analysis of a signature to authenticate a
person. The measured parameters are speed, pressure, and angle
used by a person when signing a document.
WHAT IT INVOLVES
Biometrics based authentication involves the following
steps
i. Signal acquisition from the user
ii. A invariant template is stored in the database.
iii. A template is derived from the newly acquired signal
iv. The corresponding template is retrieved from the
database and is matched with the present template.
The matcher arrives at a decision based on the
closeness of the two templates by taking into
account geometry and other acquisition variables.
FINGER PRINT AUTHENTICATION
 Fingerprints are a distinctive feature and remain
invariant over the lifetime of a subject, except for cuts
and bruises. A fingerprint impression is acquired,
typically using an inkless scanner. Several such
scanning technologies are available. A typical scanner
digitizes the fingerprint impression at 500 dots per inch
(dpi) with 256 gray levels per pixel. The digital image
of the fingerprint includes several unique features in
terms of ridge bifurcations and ridge endings,
collectively referred to as minutiae.
 The next step is to locate these features in the
fingerprint image, using an automatic feature
extraction algorithm. Each feature is commonly
represented by its location (x, y) and the ridge
direction at that location (). Due to the elasticity of the
human skin, the relationship between minutiae may be
randomly distorted from one impression to the next.
FINGER PRINT AUTHENTICATION
 In the final stage, the matcher subsystem
attempts to arrive at a degree of similarity
between the two sets of features after
compensating for the rotation, translation, and
scale. This imilarity is often expressed as a
score. Based on this score, a final decision of
match or no-match is made. A decision
threshold is first selected. If the score is below
the threshold, the fingerprints are determined
not to match; if the score is above the
threshold, a correct match is declared. Often
the score is simply a count of the number of the
minutiae that are in correspondence.
VULNERABLE TO ATTACK
 Presenting fake biometrics at the sensor
 Resubmitting previously stored digitized
biometrics signals
 Tampering with the biometric feature
representation
 Corrupting the matcher
 Attacking the channel between the stored
templates and the matcher
 Overriding the final decision
OVERRIDE THE ATTACK
 Encrypted communication can eliminate at least
remote attacks
 The matcher and the database reside at a secure
location
 Use data-hiding techniques to embed additional
information directly in compressed fingerprint
images.
 Create on-line fingerprint authentication systems
for commercial transactions that are secure
against replay attacks
 The digital signature of a submitted signal can be
used to check only for its integrity
CONCLUSION
 Biometrics-based authentication has many usability
advantages over traditional systems such as
passwords.
 The greatest strength of biometrics, the fact that the
biometrics does not change over time, is at the
same time its greatest liability. Once a set of
biometric data has been compromised, it is
compromised forever.
biometrics.ppt

Más contenido relacionado

Similar a biometrics.ppt

Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
syamil91
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
anasz
 

Similar a biometrics.ppt (20)

Bio shiv
Bio shivBio shiv
Bio shiv
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Más de SarojKumar864774 (9)

LIFE CYCLE OF FASCIOLA HEPATICA.pptx
LIFE CYCLE OF FASCIOLA HEPATICA.pptxLIFE CYCLE OF FASCIOLA HEPATICA.pptx
LIFE CYCLE OF FASCIOLA HEPATICA.pptx
 
4g.ppt
4g.ppt4g.ppt
4g.ppt
 
light pen.ppt
light pen.pptlight pen.ppt
light pen.ppt
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
blu-ray.ppt
blu-ray.pptblu-ray.ppt
blu-ray.ppt
 
event_handling.ppt
event_handling.pptevent_handling.ppt
event_handling.ppt
 
4G.ppt
4G.ppt4G.ppt
4G.ppt
 
atm.ppt
atm.pptatm.ppt
atm.ppt
 
A T M.ppt
A T M.pptA T M.ppt
A T M.ppt
 

Último

Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
一比一原版伯明翰城市大学毕业证成绩单留信学历认证
一比一原版伯明翰城市大学毕业证成绩单留信学历认证一比一原版伯明翰城市大学毕业证成绩单留信学历认证
一比一原版伯明翰城市大学毕业证成绩单留信学历认证
62qaf0hi
 
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
qh1ao5mm
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
ezgenuh
 
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
Health
 
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
gajnagarg
 
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdfJohn Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
Excavator
 
Top profile Call Girls In Mangalore [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Mangalore [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Mangalore [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Mangalore [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 

Último (20)

Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
 
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
 
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
 
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In DubaiStacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
 
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
 
一比一原版伯明翰城市大学毕业证成绩单留信学历认证
一比一原版伯明翰城市大学毕业证成绩单留信学历认证一比一原版伯明翰城市大学毕业证成绩单留信学历认证
一比一原版伯明翰城市大学毕业证成绩单留信学历认证
 
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
 
❤️Panchkula Enjoy 24/7 Escort Service sdf
❤️Panchkula Enjoy 24/7 Escort Service sdf❤️Panchkula Enjoy 24/7 Escort Service sdf
❤️Panchkula Enjoy 24/7 Escort Service sdf
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
 
What Does It Mean When Mercedes Says 'ESP Inoperative See Owner's Manual'
What Does It Mean When Mercedes Says 'ESP Inoperative See Owner's Manual'What Does It Mean When Mercedes Says 'ESP Inoperative See Owner's Manual'
What Does It Mean When Mercedes Says 'ESP Inoperative See Owner's Manual'
 
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
 
Is Your Mercedes Benz Trunk Refusing To Close Here's What Might Be Wrong
Is Your Mercedes Benz Trunk Refusing To Close Here's What Might Be WrongIs Your Mercedes Benz Trunk Refusing To Close Here's What Might Be Wrong
Is Your Mercedes Benz Trunk Refusing To Close Here's What Might Be Wrong
 
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
 
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
 
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdfJohn Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
 
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best ServiceMarathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
 
Top profile Call Girls In Mangalore [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Mangalore [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Mangalore [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Mangalore [ 7014168258 ] Call Me For Genuine Models...
 
SEM 922 MOTOR GRADER PARTS LIST, ALL WHEEL DRIVE
SEM 922 MOTOR GRADER PARTS LIST, ALL WHEEL DRIVESEM 922 MOTOR GRADER PARTS LIST, ALL WHEEL DRIVE
SEM 922 MOTOR GRADER PARTS LIST, ALL WHEEL DRIVE
 

biometrics.ppt

  • 1. SEMINAR ON BIOMETRICS-BASED AUTHENTICATION Submitted by:- Chandra Bhanu Nayak Regd.No.:1001205160
  • 2. WHAT IS AUTHENTICATION?  It is the process by which someone or something is given a valid authenticity so that he can access a particular application or thing. E.g.  password and user ID for users.  Providing PIN to identification card users.  Giving gate pass to the employees of a company.
  • 3. WHY BIOMETRICS? Biometrics is concerned with identifying a person based on his or her physiological or behavioral characteristics. Biometrics are unique human feature such as finger prints, hand geometry, face and iris or retinal patterns, DNA and voice. Being the intrinsic properties of an individual, these are difficult to surreptitiously duplicate and nearly impossible to share.
  • 4. WHERE IT IS NEEDED? Reliable user authentication is becoming an increasingly important task in the Web-enabled world. The value of reliable user authentication is not limited to just computer or network access. Many other applications in everyday life also require user authentication, such as banking, e-commerce, and physical access control to computer resources, and could benefit from enhanced security.
  • 5. CONSEQUENCES OF INSECURE AUTHENTICATION  The consequences of an insecure authentication system in a corporate or enterprise environment can be catastrophic, and may include loss of confidential information, denial of service, and compromised data integrity.
  • 6. ADVANTAGES  Biometric readings, which range from several hundred bytes to over a megabyte, have the advantage that their information content is usually higher than that of a password or a pass phrase. Simply extending the length of passwords to get equivalent bit strength presents significant usability problems. It is nearly impossible to remember a 2K phrase, and it would take an annoyingly long time to type such a phrase (especially without errors). Fortunately, automated biometrics can provide the security advantages of long passwords while retaining the speed and characteristic
  • 7. HUMAN TRAITS USED FOR AUTHENTICATION TRAITS METHOD Fingerprints The patterns of friction ridges and valleys on an individual’s fingerprints. Face An image of the person’s face is captured in the visible spectrum using the infrared patterns of the facial heat emission. Speech An acoustics of speech differ between individual. Iris pattern Iris of the eye is the colored area surrounding the pupil. it is unique and are obtained through a video based image acquisition system. Hand and finger geometry Physical characteristics such as the length, width, thickness, and surface area of the hands are measured using a system. Signature This involves the dynamic analysis of a signature to authenticate a person. The measured parameters are speed, pressure, and angle used by a person when signing a document.
  • 8. WHAT IT INVOLVES Biometrics based authentication involves the following steps i. Signal acquisition from the user ii. A invariant template is stored in the database. iii. A template is derived from the newly acquired signal iv. The corresponding template is retrieved from the database and is matched with the present template. The matcher arrives at a decision based on the closeness of the two templates by taking into account geometry and other acquisition variables.
  • 9. FINGER PRINT AUTHENTICATION  Fingerprints are a distinctive feature and remain invariant over the lifetime of a subject, except for cuts and bruises. A fingerprint impression is acquired, typically using an inkless scanner. Several such scanning technologies are available. A typical scanner digitizes the fingerprint impression at 500 dots per inch (dpi) with 256 gray levels per pixel. The digital image of the fingerprint includes several unique features in terms of ridge bifurcations and ridge endings, collectively referred to as minutiae.  The next step is to locate these features in the fingerprint image, using an automatic feature extraction algorithm. Each feature is commonly represented by its location (x, y) and the ridge direction at that location (). Due to the elasticity of the human skin, the relationship between minutiae may be randomly distorted from one impression to the next.
  • 10. FINGER PRINT AUTHENTICATION  In the final stage, the matcher subsystem attempts to arrive at a degree of similarity between the two sets of features after compensating for the rotation, translation, and scale. This imilarity is often expressed as a score. Based on this score, a final decision of match or no-match is made. A decision threshold is first selected. If the score is below the threshold, the fingerprints are determined not to match; if the score is above the threshold, a correct match is declared. Often the score is simply a count of the number of the minutiae that are in correspondence.
  • 11. VULNERABLE TO ATTACK  Presenting fake biometrics at the sensor  Resubmitting previously stored digitized biometrics signals  Tampering with the biometric feature representation  Corrupting the matcher  Attacking the channel between the stored templates and the matcher  Overriding the final decision
  • 12. OVERRIDE THE ATTACK  Encrypted communication can eliminate at least remote attacks  The matcher and the database reside at a secure location  Use data-hiding techniques to embed additional information directly in compressed fingerprint images.  Create on-line fingerprint authentication systems for commercial transactions that are secure against replay attacks  The digital signature of a submitted signal can be used to check only for its integrity
  • 13. CONCLUSION  Biometrics-based authentication has many usability advantages over traditional systems such as passwords.  The greatest strength of biometrics, the fact that the biometrics does not change over time, is at the same time its greatest liability. Once a set of biometric data has been compromised, it is compromised forever.