SlideShare una empresa de Scribd logo
1 de 29
By
Sukanta Bhattacharyya
Registration # 1651210007
• Forget passwords ...
• Forget pin numbers ...
• Forget all your security concerns ...Just stay cool
Why ?????????????????????
Because here comes BIOMETRICS……
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 2
Introduction:
The nuisance of forgotten passwords and ID codes is over as
biometrics-based authentication is here. Our fingerprints, iris
pattern, and voice will verify our identity at ATMs, airports, etc.
We can unlock our house or withdraw money from our bank with
just a blink of an eye, a tap of our finger or just showing you face
BIOMETRICS is a means of using parts of the human body as a
kind of permanent password.
Just as your fingerprints are unlike those of any other person, your
eyes, ears, hands, voice, and face are also unique. Technology has
advanced to the point where computer systems can record and
recognize the patterns, hand shapes, ear lobe contours, and a host
of other physical characteristics. Using these biometrics, laptop
and other portable devices can be empowered with the ability to
instantly verify your identity and deny access to everybody else.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 3
Biometrics ?
The automated measurement of physiological and behavioral
characteristics to determine or authenticate identity is termed as
biometrics. Automated means no human involvement. Physiological
traits include fingerprint, hand, eyes, face while behavior traits
include actions performed by humans such as ‘user speaks, types on
a keyboard’ etc. These combine to recognize the identity of the user
and also to authenticate the particular user for the particular job.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 4
Why Biometrics ?
• Traditional methods involving passwords and PIN numbers
• Biometrics highest level of security
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 5
Biometric System
Data Collection
Transmission
Signal Processing
Data Storage
Decision
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 6
A generic biometric model or system consists of five subsystems
namely data collection, transmission, signal processing, decision
making and data storage. Data collection involves use of sensors
to detect and measure an individual’s physiological or behavioral
characteristics. Data collection stage consists of a number of
sensing elements such as sensors.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 7
Biometric Process:
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 8
Explanation:
The basic block diagram of a biometric system is studied in the
following two modes namely verification and identification.
In verification mode the system performs a one-to-one comparison of a
captured biometric with a specific template stored in a biometric
database in order to verify the individual is the person they claim to be.
Three steps involved in person verification. In the first step, reference
models for all the users are generated and stored in the model database.
In the second step, some samples are matched with reference models to
generate the genuine and impostor scores and calculate the threshold.
Third step is the testing step.
In identification mode the system performs a one-to-many comparison
against a biometric database in attempt to establish the identity of an
unknown individual. The system will succeed in identifying the
individual if the comparison of the biometric sample to a template in
the database falls within a previously set threshold.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 9
In short
The hardware captures the salient human characteristics and the
software interprets the resulting data and determines acceptability.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 10
Characteristics used as input data:
Fingerprints
Voiceprints
Facial features
Writing patterns
Iris patterns
Hand geometry
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 11
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 12
Fingerprint recognition system
One of the oldest form of biometrics which is highly reliable and
uses distinctive finger features for the purpose of identification
and verification.
Process: The process is similar to the working of a general
biometrics system. The process is carried out in the following
steps
 A fingerprint image is read from a captured device
 Features are extracted from the image
 A template is created for comparison
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 13
Detailed process of finger recognition biometrics
Three steps are required for the process. They are
 Fingerprint Scanning: It’s the acquisition and recognition of a
person’s fingerprint characteristics for identification purposes
 Fingerprint Matching: It involves the matching of the new
enrollment with the pre-captured database
 Identification: Finally identifies the person or subject based on
the above steps.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 14
Fingerprint scanning or image acquisition: Finger imprint image
is taken by different techniques
• Optical
• Thermal
• Capacitance
• Ultra Sound
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 15
Feature Extraction process:
This is followed by image acquisition stage. The different
features are extracted from the acquired image. These features are
called global features.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 16
Fingerprint matching (template matching) which is followed
by feature extraction process.
Matching is done between the acquired image and the already
available image in the database.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 17
Coding: Computation of coding is done along with the template
matching technique.
Bridge coding Spur Coding
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 18
Overall process of fingerprint recognition:
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 19
Applications of fingerprint recognition
system:
Logical access control-PC lock system
Physical access control-Door lock system
Lockers
Time and attendance systems at educational institutes and firms
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 20
Other biometric systems:
Iris recognition system
Face recognition system
Speech /voice recognition system
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 21
Applications of Biometrics in use:
 Banks nowadays scan the fingerprints of its customers, instead of using a
personal identification number (PIN), when they wish to withdraw cash.
 Basically, the biometrics security technique acts as a front end to a system that
requires precise identification before it can be accessed or used. The system
could be a sliding door with electronic locking mechanisms, an operating
system (OS), or an application where individual users have their own rights and
permissions.
 A biometric chip reader incorporated into a PC can facilitate secure Internet-
based online transactions. Applications that are being developed to accept
biometric data include computer networks, cars, cellular phones, and hoards of
other types of embedded systems. Biometrics could authenticate e-mail and
other documents transmitted via computer networks. In hospitals, biometric
techniques could replace ID bracelets to establish patients identities for
instance during blood administration.
 With existing voice-transmission technology, voice recognition biometric
techniques can function over long distances using the ordinary telephone. A
well conceived and properly implemented voice-based security system could
provide a greater safety to financial transaction conducted over the telephone.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 22
Other applications:
• Criminal identification
• Prison security
• ATM
• Aviation security
• Border crossing controls
• Database access
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 23
Benefits:
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 24
Limitations:
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 25
Future projects of biometrics:
 Smell recognition system
 Ear Shape
 Finger nail bed
 Facial 3D
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 26
Conclusion:
There are always concerns about adapting to new technologies.
This study shows that some people are reluctant to accept
biometrics because it profoundly affects personal privacy and
safety, even though they are well aware of its benefits.
Furthermore, since biometrics involves personal
characteristics, many are concerned that privacy should be
protected, and that both government and business must maintain
the public’s trust.
The future of biometrics looks increasingly bright with the
demand for security rising daily.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 27
References:
www.google.com
Google images
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 28
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 29

Más contenido relacionado

Destacado

Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharShivnaresh Likhar
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAHEMANTA SAHU
 
Smart door lock
Smart door lockSmart door lock
Smart door lockaswin5432
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking systemVISHAL NAGAR
 
Electronic code lock device
Electronic code lock deviceElectronic code lock device
Electronic code lock deviceAmitoj Kaur
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking systemArjun Singh
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 

Destacado (8)

Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likhar
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
Password based door locksystem
Password  based door locksystemPassword  based door locksystem
Password based door locksystem
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
 
Electronic code lock device
Electronic code lock deviceElectronic code lock device
Electronic code lock device
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 

Similar a Biometrics-Sukanta Bhattacharyya

BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYsumitgupta575
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET Journal
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPIRJET Journal
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)mounika117
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMFinger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMIOSR Journals
 
Biometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureBiometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureMichael James
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTIRJET Journal
 

Similar a Biometrics-Sukanta Bhattacharyya (20)

BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGY
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Io t with biometrics
Io t with biometricsIo t with biometrics
Io t with biometrics
 
D0351022026
D0351022026D0351022026
D0351022026
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Smart ecg
Smart ecgSmart ecg
Smart ecg
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMFinger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSM
 
Biometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureBiometrics - Then, Now and the Future
Biometrics - Then, Now and the Future
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
 

Último

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Último (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Biometrics-Sukanta Bhattacharyya

  • 2. • Forget passwords ... • Forget pin numbers ... • Forget all your security concerns ...Just stay cool Why ????????????????????? Because here comes BIOMETRICS…… Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 2
  • 3. Introduction: The nuisance of forgotten passwords and ID codes is over as biometrics-based authentication is here. Our fingerprints, iris pattern, and voice will verify our identity at ATMs, airports, etc. We can unlock our house or withdraw money from our bank with just a blink of an eye, a tap of our finger or just showing you face BIOMETRICS is a means of using parts of the human body as a kind of permanent password. Just as your fingerprints are unlike those of any other person, your eyes, ears, hands, voice, and face are also unique. Technology has advanced to the point where computer systems can record and recognize the patterns, hand shapes, ear lobe contours, and a host of other physical characteristics. Using these biometrics, laptop and other portable devices can be empowered with the ability to instantly verify your identity and deny access to everybody else. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 3
  • 4. Biometrics ? The automated measurement of physiological and behavioral characteristics to determine or authenticate identity is termed as biometrics. Automated means no human involvement. Physiological traits include fingerprint, hand, eyes, face while behavior traits include actions performed by humans such as ‘user speaks, types on a keyboard’ etc. These combine to recognize the identity of the user and also to authenticate the particular user for the particular job. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 4
  • 5. Why Biometrics ? • Traditional methods involving passwords and PIN numbers • Biometrics highest level of security Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 5
  • 6. Biometric System Data Collection Transmission Signal Processing Data Storage Decision Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 6
  • 7. A generic biometric model or system consists of five subsystems namely data collection, transmission, signal processing, decision making and data storage. Data collection involves use of sensors to detect and measure an individual’s physiological or behavioral characteristics. Data collection stage consists of a number of sensing elements such as sensors. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 7
  • 8. Biometric Process: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 8
  • 9. Explanation: The basic block diagram of a biometric system is studied in the following two modes namely verification and identification. In verification mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps involved in person verification. In the first step, reference models for all the users are generated and stored in the model database. In the second step, some samples are matched with reference models to generate the genuine and impostor scores and calculate the threshold. Third step is the testing step. In identification mode the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 9
  • 10. In short The hardware captures the salient human characteristics and the software interprets the resulting data and determines acceptability. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 10
  • 11. Characteristics used as input data: Fingerprints Voiceprints Facial features Writing patterns Iris patterns Hand geometry Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 11
  • 12. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 12 Fingerprint recognition system One of the oldest form of biometrics which is highly reliable and uses distinctive finger features for the purpose of identification and verification. Process: The process is similar to the working of a general biometrics system. The process is carried out in the following steps  A fingerprint image is read from a captured device  Features are extracted from the image  A template is created for comparison
  • 13. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 13
  • 14. Detailed process of finger recognition biometrics Three steps are required for the process. They are  Fingerprint Scanning: It’s the acquisition and recognition of a person’s fingerprint characteristics for identification purposes  Fingerprint Matching: It involves the matching of the new enrollment with the pre-captured database  Identification: Finally identifies the person or subject based on the above steps. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 14
  • 15. Fingerprint scanning or image acquisition: Finger imprint image is taken by different techniques • Optical • Thermal • Capacitance • Ultra Sound Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 15
  • 16. Feature Extraction process: This is followed by image acquisition stage. The different features are extracted from the acquired image. These features are called global features. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 16
  • 17. Fingerprint matching (template matching) which is followed by feature extraction process. Matching is done between the acquired image and the already available image in the database. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 17
  • 18. Coding: Computation of coding is done along with the template matching technique. Bridge coding Spur Coding Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 18
  • 19. Overall process of fingerprint recognition: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 19
  • 20. Applications of fingerprint recognition system: Logical access control-PC lock system Physical access control-Door lock system Lockers Time and attendance systems at educational institutes and firms Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 20
  • 21. Other biometric systems: Iris recognition system Face recognition system Speech /voice recognition system Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 21
  • 22. Applications of Biometrics in use:  Banks nowadays scan the fingerprints of its customers, instead of using a personal identification number (PIN), when they wish to withdraw cash.  Basically, the biometrics security technique acts as a front end to a system that requires precise identification before it can be accessed or used. The system could be a sliding door with electronic locking mechanisms, an operating system (OS), or an application where individual users have their own rights and permissions.  A biometric chip reader incorporated into a PC can facilitate secure Internet- based online transactions. Applications that are being developed to accept biometric data include computer networks, cars, cellular phones, and hoards of other types of embedded systems. Biometrics could authenticate e-mail and other documents transmitted via computer networks. In hospitals, biometric techniques could replace ID bracelets to establish patients identities for instance during blood administration.  With existing voice-transmission technology, voice recognition biometric techniques can function over long distances using the ordinary telephone. A well conceived and properly implemented voice-based security system could provide a greater safety to financial transaction conducted over the telephone. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 22
  • 23. Other applications: • Criminal identification • Prison security • ATM • Aviation security • Border crossing controls • Database access Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 23
  • 24. Benefits: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 24
  • 25. Limitations: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 25
  • 26. Future projects of biometrics:  Smell recognition system  Ear Shape  Finger nail bed  Facial 3D Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 26
  • 27. Conclusion: There are always concerns about adapting to new technologies. This study shows that some people are reluctant to accept biometrics because it profoundly affects personal privacy and safety, even though they are well aware of its benefits. Furthermore, since biometrics involves personal characteristics, many are concerned that privacy should be protected, and that both government and business must maintain the public’s trust. The future of biometrics looks increasingly bright with the demand for security rising daily. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 27
  • 28. References: www.google.com Google images Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 28
  • 29. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 29