Your SlideShare is downloading. ×
Slide-show on Biometrics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Slide-show on Biometrics

4,723
views

Published on

Published in: Technology

0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,723
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
360
Comments
0
Likes
5
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The technology of future. Submitted by, Guided by,Joshi Pathik V. Miss A. D. Bhople
  • 2. Contents Introduction History Present Future Procedure of Working Features of different parameters Application Conclusion References
  • 3. Introduction Information security is concerned with the assurance of confidentially, integrity and availability of information in all forms. This is the ancient Greek word: bios = “life” and metron = “measure.” Biometric systems based on single source of information are called unicode system.
  • 4. History European Explorer Joao de Barros recorded the first known example of fingerprinting in China during the 14th century. 1980:- Alphonse Bertillon studied body mechanics and measurements to help in identifying criminals. Karl Pearson, an applied mathematician studied biometric research early in 20th century at University college of London. In the 1960 and 1970, signature biometric, authentication procedures were
  • 5. Present Today, biometric lows and regulations are in process and biometric industry standard are being tested. It divided in two parts, Behavioural Parameters Behavioural Parameters•Fingerprint •Gait•Palmprint •Voice•Hand Veins •Signature•Face •Keystroke•Iris•Retina•DNA
  • 6. Future A biometric system can provide two functions. One of which is verification and the other is Authentication. In the near future, these biometric techniques can be the solution for the current threats in the world of information security. Due to dynamic modification of the proposed metric, the rejection ration for a some person reduces by a lot.
  • 7. Procedure of Working
  • 8. Features of Different Parameters Fingerprint Iris Technology Retina Geometry Technology Face Recognition Technology Hand Geometry Technology Voice Recognition Techniques Signature Verification Technique
  • 9. Fingerprint The size of fingerprint is around 10*10*15. Arch Loop Whorl Ridge ending Bifurcation Short Ridge
  • 10.  In this way the total features and template of Fingerprint is as following. The matcher matches any two templates as following image.
  • 11. Iris Recognition This can be a combination of specific characteristics known as corona, crypts, filaments, freckles, pits, furr ows, striations and rings.
  • 12. Retina Geometry Technology A retinal scan involves the use of a low-intensity coherent light source, which is projected onto the retina to illuminate the blood vessels which are then photographed and analyzed. A retinal scan has an error rate of 1 in 10,000,000, compared to fingerprint identification error being sometimes as high as 1 in 500.
  • 13. Face Recognition Technology Facial metric technology on the manufacture of the specific facial features. Eigen Face
  • 14. Hand Geometry Technology There techniques include the estimation of length, width, thickness and surface area of the hand.
  • 15. Voice Recognition Techniques Voice verification focuses on the vocal characteristics that produce speeches and not on the sound or the pronunciation of speech itself. The vocal characteristics depend on the dimensions of the vocal tract, mouth, nasal cavities and the other speech processing mechanism of the human body.
  • 16. Signature Verification Technique The dynamics is measured as a means of the pressure, direction, acceleration and the length of the strokes, dynamics number of strokes and their duration. These are either traditional tablets or special purpose devices. Tablets capture 2D coordinates and the pressure.
  • 17. Application of Biometrics Security Authentication E-commerce and E-governments Secure Banking and Financial Transaction Digital Rights Management Healthcare Application Crime Investigation Social Services
  • 18. Conclusion While Biometric authentication can offer a high degree of security, they are far from perfect solution. The influences of biometric technology on society and the risks to privacy and threat to identify will require meditation through legislation.
  • 19. References[1] Smart Cart Alliance Identity Council (2007): Identity and Smart Card Technology and Application Glossary, http://www.smartcardalliances.org[2] Langenburg, Glenn (January 24, 2005). "Are ones fingerprints similar to those of his or her parents in any discernable way?". Scientific American. Retrieved 28 August 2010.[3] Thornton, John (May 9, 2000). "Latent Fingerprints, Setting Standards In The Comparison and Identification". 84th Annual Training Conference of the California State Division of IAI. Retrieved 30 August 2010.[4] Wikipedia Image http://en.wikipedia.org/wiki/File:Biometric_system_diagram.png[5] Sanjay R. Ganorkar, Ashok A. Ghatol, “Iris Recognition: An Emerging Biometrics Technology”, In Proc. of The sixth WSEAS International Conference on Single Processing, Robotics and Automation, Greece, Feb. 2007, pp. 91 – 96[6] J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Eds, “Biometrics Systems: Technology, Design and Performance Evolution”, New York: Spinger Verlag, 2005[7] M. A. Dabbah, W. L. Woo, and S. S. Dlay, “Secure Authentication for Face Recognition”, In Proc. of IEEE Symposium on computational Intelligence in Image and Signal Processing, April 2007, USA, pp. 121 – 126[8] A. Kumar, D. C. Wong, H. C. Shen and A. K. Jain , “Personal Verification using Palmprinnt and Hand Geometry Biometrics”, In Proc. of fourth International Conference on Audio and Video based Biometric Person Authentication, Guildford, U.K. January 2003, pp 668-678[9] S. Furui, “Recent Advances in Speaker Recognition”, In Proc. of first International Conference on Audio and video based Biometric person Authentication, UK, March 1997, pp 859 – 872[10] A.K. Jain, A. Ross, and S. Prabhakar, “An Introduction to Biometrics Recognition,” IEEE Trans. Circuit Syst. Video Technology, Special Issue Image and Video based Biometrics, Volume 14, Issue 1st January 2004, pp. 4 – 20
  • 20. Thank You