Biometrics
Signatures <ul><li>How secure are handwritten signatures? </li></ul><ul><li>The probability that a forged signature will b...
Verification by observation <ul><li>Problem : High error rates. </li></ul>
Automated verification of signature <ul><li>Use of machine to verify signature in Banks for cheque-processing. </li></ul><...
Why? <ul><li>Something You Know – Password ,Code </li></ul><ul><li>Something You Have – Swipe Card, Token </li></ul><ul><l...
Definition <ul><li>Automatic methods for identifying a person on the basis of some biological or behavioural characteristi...
<ul><li>Biometrics identify people by measuring some aspect of individual anatomy or physiology (such as your hand geometr...
Examples <ul><li>Facial image </li></ul><ul><li>Fingerprints </li></ul><ul><li>Handprints </li></ul><ul><li>Voice pattern ...
Finger Prints
Hand Prints
Voice Pattern
Facial Image
 
Iris / Retina
Signature
 
Advantages <ul><li>Can not be lost or stolen or copied. </li></ul><ul><li>Can not be forgotten or guessed by others. </li>...
<ul><li>Biometrics are like many other protection mechanisms (alarms, seals, tampersensing enclosures, ...) in that enviro...
Every technique has some Limits  <ul><li>Facial image </li></ul><ul><li>Fingerprints </li></ul><ul><li>Handprints </li></u...
 
The Design <ul><li>Identification in the form of verification or recognition. </li></ul><ul><li>Verification – authenticat...
System  Performance <ul><li>True Accept – Genuine individual is accepted. </li></ul><ul><li>True Reject – Imposter is reje...
 
The   Function <ul><li>An ideal biometric characteristic should be  Universal, Unique, Permanent and Collectable </li></ul...
Current   Techniques   Physical   and Behavioural <ul><li>Facial Features </li></ul><ul><li>Fingerprints </li></ul><ul><li...
Distribution
New Techniques   <ul><li>Ear Mapping </li></ul><ul><li>Body Odour Identification </li></ul><ul><li>Body Salinity Identific...
New Dimensions <ul><li>Research in New representations, Matching Algorithms, Database Indexing, Fusion of Biometric Modali...
Issues <ul><li>Application </li></ul><ul><li>Privacy  + & - </li></ul><ul><li>Legal </li></ul><ul><li>Cost </li></ul>
<ul><li>Fingerprint recognition as a requirement for ignition of the engine.  Jaguar </li></ul><ul><li>Fingerprint scanner...
Summary <ul><li>Biometric measures of one kind or another have been used to identify people since ancient times, with hand...
<ul><li>These systems have different strengths and weaknesses. In automatic operation, most have error rates of the order ...
<ul><li>If any biometric becomes very widely used, there is increased risk of forgery in unattended operation: voice synth...
<ul><li>Biometrics are usually more powerful in attended operation, where, with good system design, the relative strengths...
Upcoming SlideShare
Loading in …5
×

Bio metrics

724 views
629 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
724
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
35
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Bio metrics

  1. 1. Biometrics
  2. 2. Signatures <ul><li>How secure are handwritten signatures? </li></ul><ul><li>The probability that a forged signature will be accepted as genuine mainly depends on the amount of care taken when examining it. </li></ul>
  3. 3. Verification by observation <ul><li>Problem : High error rates. </li></ul>
  4. 4. Automated verification of signature <ul><li>Use of machine to verify signature in Banks for cheque-processing. </li></ul><ul><li>e.g. MICR </li></ul><ul><li>Problem : Error Rate </li></ul>
  5. 5. Why? <ul><li>Something You Know – Password ,Code </li></ul><ul><li>Something You Have – Swipe Card, Token </li></ul><ul><li>Something You are – A Biometric </li></ul>
  6. 6. Definition <ul><li>Automatic methods for identifying a person on the basis of some biological or behavioural characteristics of the person. </li></ul><ul><li>To identify, confirmation and security techniques that rely on measurable, individual biological characteristics. </li></ul>
  7. 7. <ul><li>Biometrics identify people by measuring some aspect of individual anatomy or physiology (such as your hand geometry or fingerprint), some deeply ingrained skill, or other behavioral characteristic (such as your handwritten signature), or something That is a combination of the two (such as your voice). </li></ul>
  8. 8. Examples <ul><li>Facial image </li></ul><ul><li>Fingerprints </li></ul><ul><li>Handprints </li></ul><ul><li>Voice pattern </li></ul><ul><li>Iris / Retina </li></ul><ul><li>Signature </li></ul>
  9. 9. Finger Prints
  10. 10. Hand Prints
  11. 11. Voice Pattern
  12. 12. Facial Image
  13. 14. Iris / Retina
  14. 15. Signature
  15. 17. Advantages <ul><li>Can not be lost or stolen or copied. </li></ul><ul><li>Can not be forgotten or guessed by others. </li></ul><ul><li>Very distinctive to each individual </li></ul>
  16. 18. <ul><li>Biometrics are like many other protection mechanisms (alarms, seals, tampersensing enclosures, ...) in that environmental conditions can cause havoc. Noise, dirt, vibration, and unreliable lighting conditions all take their toll. </li></ul><ul><li>Some systems, like speaker recognition, are vulnerable to alcohol intake and stress. Changes in environmental assumptions, such as from closed to open systems, from small systems to large </li></ul><ul><li>ones, from attended to standalone, from cooperative to recalcitrant subjects can all undermine a system’s viability. </li></ul>
  17. 19. Every technique has some Limits <ul><li>Facial image </li></ul><ul><li>Fingerprints </li></ul><ul><li>Handprints </li></ul><ul><li>Voice pattern </li></ul><ul><li>Iris / Retina </li></ul><ul><li>Signature </li></ul>
  18. 21. The Design <ul><li>Identification in the form of verification or recognition. </li></ul><ul><li>Verification – authenticates a person’s claimed identity by comparing. </li></ul><ul><li>Recognition – system determines the identity of a given person from a database of persons known to it. </li></ul>
  19. 22. System Performance <ul><li>True Accept – Genuine individual is accepted. </li></ul><ul><li>True Reject – Imposter is rejected. </li></ul><ul><li>False Accept – Imposter is accepted. </li></ul><ul><li>False Reject - Genuine individual is rejected. </li></ul>
  20. 24. The Function <ul><li>An ideal biometric characteristic should be Universal, Unique, Permanent and Collectable </li></ul><ul><li>Performance - Accuracy, Speed, and Cost. </li></ul><ul><li>Acceptability and Circumvention . </li></ul>
  21. 25. Current Techniques Physical and Behavioural <ul><li>Facial Features </li></ul><ul><li>Fingerprints </li></ul><ul><li>Hand Geometry </li></ul><ul><li>Eye, Retina and Iris Mapping </li></ul><ul><li>Signatures </li></ul><ul><li>Voice Pattern </li></ul><ul><li>Key Stroke Dynamics </li></ul>
  22. 26. Distribution
  23. 27. New Techniques <ul><li>Ear Mapping </li></ul><ul><li>Body Odour Identification </li></ul><ul><li>Body Salinity Identification </li></ul><ul><li>EEG Fingerprint </li></ul><ul><li>Deoxyribonucleic Acid </li></ul><ul><li>Verichip </li></ul>
  24. 28. New Dimensions <ul><li>Research in New representations, Matching Algorithms, Database Indexing, Fusion of Biometric Modalities, Live ness Detection, Template Protection, Error Rate Estimation. </li></ul><ul><li>System Testing and Evaluation of Large Database </li></ul><ul><li>Government regulations </li></ul><ul><li>Making it Foolproof ? </li></ul><ul><li>Cost / Benefit Analysis – Quantifying Deterrence </li></ul>
  25. 29. Issues <ul><li>Application </li></ul><ul><li>Privacy + & - </li></ul><ul><li>Legal </li></ul><ul><li>Cost </li></ul>
  26. 30. <ul><li>Fingerprint recognition as a requirement for ignition of the engine. Jaguar </li></ul><ul><li>Fingerprint scanner to verify season pass holders. Disney </li></ul><ul><li>Hand Geometry for immigration. US Immigration and Naturalization services </li></ul><ul><li>Iris scanner for issue of Rifles to Olympic participants. Winter Olympics Nagano </li></ul><ul><li>Signature verification. For claiming benefits. British Employment Services </li></ul><ul><li>Signature identification for correct distribution of food . Pentonville Prison , England </li></ul><ul><li>Voice Identification to protect computer facilities . </li></ul>
  27. 31. Summary <ul><li>Biometric measures of one kind or another have been used to identify people since ancient times, with handwritten signatures, facial features, and fingerprints being the traditional methods. </li></ul><ul><li>Systems have been built that automate the task of recognition, using these methods and newer ones, such as hand geometry, voiceprints, and iris patterns. </li></ul>
  28. 32. <ul><li>These systems have different strengths and weaknesses. In automatic operation, most have error rates of the order of 1% (though iris recognition is better, hand geometry slightly better, and face recognition worse). </li></ul><ul><li>There is always a trade-off between the false accept rate (the fraud rate) and the false reject rate (the insult rate). The statistics of error rates are deceptively difficult. </li></ul>
  29. 33. <ul><li>If any biometric becomes very widely used, there is increased risk of forgery in unattended operation: voice synthesizers, photographs of irises, fingerprint molds, and even good old-fashioned forged signatures must all be thought of in system design. </li></ul><ul><li>These do not rule out the use of biometrics, as traditional methods such as handwritten signatures are usable in practice despite very high error rates. </li></ul>
  30. 34. <ul><li>Biometrics are usually more powerful in attended operation, where, with good system design, the relative strengths and weaknesses of the human guard and the machine recognition system may complement one another. </li></ul><ul><li>Finally, many biometric systems achieve most or all of their result by deterring criminals rather than being effective at identifying them. </li></ul>

×