2. • Forget passwords ...
• Forget pin numbers ...
• Forget all your security concerns ...Just stay cool
Why ?????????????????????
Because here comes BIOMETRICS……
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 2
3. Introduction:
The nuisance of forgotten passwords and ID codes is over as
biometrics-based authentication is here. Our fingerprints, iris
pattern, and voice will verify our identity at ATMs, airports, etc.
We can unlock our house or withdraw money from our bank with
just a blink of an eye, a tap of our finger or just showing you face
BIOMETRICS is a means of using parts of the human body as a
kind of permanent password.
Just as your fingerprints are unlike those of any other person, your
eyes, ears, hands, voice, and face are also unique. Technology has
advanced to the point where computer systems can record and
recognize the patterns, hand shapes, ear lobe contours, and a host
of other physical characteristics. Using these biometrics, laptop
and other portable devices can be empowered with the ability to
instantly verify your identity and deny access to everybody else.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 3
4. Biometrics ?
The automated measurement of physiological and behavioral
characteristics to determine or authenticate identity is termed as
biometrics. Automated means no human involvement. Physiological
traits include fingerprint, hand, eyes, face while behavior traits
include actions performed by humans such as ‘user speaks, types on
a keyboard’ etc. These combine to recognize the identity of the user
and also to authenticate the particular user for the particular job.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 4
5. Why Biometrics ?
• Traditional methods involving passwords and PIN numbers
• Biometrics highest level of security
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 5
7. A generic biometric model or system consists of five subsystems
namely data collection, transmission, signal processing, decision
making and data storage. Data collection involves use of sensors
to detect and measure an individual’s physiological or behavioral
characteristics. Data collection stage consists of a number of
sensing elements such as sensors.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 7
9. Explanation:
The basic block diagram of a biometric system is studied in the
following two modes namely verification and identification.
In verification mode the system performs a one-to-one comparison of a
captured biometric with a specific template stored in a biometric
database in order to verify the individual is the person they claim to be.
Three steps involved in person verification. In the first step, reference
models for all the users are generated and stored in the model database.
In the second step, some samples are matched with reference models to
generate the genuine and impostor scores and calculate the threshold.
Third step is the testing step.
In identification mode the system performs a one-to-many comparison
against a biometric database in attempt to establish the identity of an
unknown individual. The system will succeed in identifying the
individual if the comparison of the biometric sample to a template in
the database falls within a previously set threshold.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 9
10. In short
The hardware captures the salient human characteristics and the
software interprets the resulting data and determines acceptability.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 10
11. Characteristics used as input data:
Fingerprints
Voiceprints
Facial features
Writing patterns
Iris patterns
Hand geometry
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 11
12. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 12
Fingerprint recognition system
One of the oldest form of biometrics which is highly reliable and
uses distinctive finger features for the purpose of identification
and verification.
Process: The process is similar to the working of a general
biometrics system. The process is carried out in the following
steps
A fingerprint image is read from a captured device
Features are extracted from the image
A template is created for comparison
14. Detailed process of finger recognition biometrics
Three steps are required for the process. They are
Fingerprint Scanning: It’s the acquisition and recognition of a
person’s fingerprint characteristics for identification purposes
Fingerprint Matching: It involves the matching of the new
enrollment with the pre-captured database
Identification: Finally identifies the person or subject based on
the above steps.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 14
15. Fingerprint scanning or image acquisition: Finger imprint image
is taken by different techniques
• Optical
• Thermal
• Capacitance
• Ultra Sound
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 15
16. Feature Extraction process:
This is followed by image acquisition stage. The different
features are extracted from the acquired image. These features are
called global features.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 16
17. Fingerprint matching (template matching) which is followed
by feature extraction process.
Matching is done between the acquired image and the already
available image in the database.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 17
18. Coding: Computation of coding is done along with the template
matching technique.
Bridge coding Spur Coding
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 18
19. Overall process of fingerprint recognition:
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 19
20. Applications of fingerprint recognition
system:
Logical access control-PC lock system
Physical access control-Door lock system
Lockers
Time and attendance systems at educational institutes and firms
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 20
21. Other biometric systems:
Iris recognition system
Face recognition system
Speech /voice recognition system
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 21
22. Applications of Biometrics in use:
Banks nowadays scan the fingerprints of its customers, instead of using a
personal identification number (PIN), when they wish to withdraw cash.
Basically, the biometrics security technique acts as a front end to a system that
requires precise identification before it can be accessed or used. The system
could be a sliding door with electronic locking mechanisms, an operating
system (OS), or an application where individual users have their own rights and
permissions.
A biometric chip reader incorporated into a PC can facilitate secure Internet-
based online transactions. Applications that are being developed to accept
biometric data include computer networks, cars, cellular phones, and hoards of
other types of embedded systems. Biometrics could authenticate e-mail and
other documents transmitted via computer networks. In hospitals, biometric
techniques could replace ID bracelets to establish patients identities for
instance during blood administration.
With existing voice-transmission technology, voice recognition biometric
techniques can function over long distances using the ordinary telephone. A
well conceived and properly implemented voice-based security system could
provide a greater safety to financial transaction conducted over the telephone.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 22
26. Future projects of biometrics:
Smell recognition system
Ear Shape
Finger nail bed
Facial 3D
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 26
27. Conclusion:
There are always concerns about adapting to new technologies.
This study shows that some people are reluctant to accept
biometrics because it profoundly affects personal privacy and
safety, even though they are well aware of its benefits.
Furthermore, since biometrics involves personal
characteristics, many are concerned that privacy should be
protected, and that both government and business must maintain
the public’s trust.
The future of biometrics looks increasingly bright with the
demand for security rising daily.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 27