Published on

A brief description on biometrics

Published in: Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Computer Access Securing computer and network access is one of the most common uses of biometric devices. As financial data, medical records and other personal information becomes the target of attack, biometric systems can remove the risk of passwords being shared, stolen or guessed.   Physical Access As security and privacy becomes more important for employers, government, parents and others, biometrics is increasingly being seen as an acceptable solution. Around the world hospitals, military facilities, government buildings and offices are employing biometric access solutions to minimize security threats.   Time and Attendance Biometric systems are being used as a replacement for the traditional punch-card system of clocking-in and clocking-out. Replacing the manual process with biometrics prevents abuse of the system. Time management software provides attendance reports. This solution can be combined with a physical access system to restrict access certain areas without the risk of keys, proximity cards or door access codes being lost or shared.   Handheld devices As handheld device usage increase amongst executives, sales people and health-care professionals, organizations are focusing on how to protect the confidential data on them from falling into the wrong hands. Dynamic signature verification is proving itself as an important tool for securing access to pen-based devices and PDAs.   National Security Governments around the world are beginning to use biometrics to identify citizens and prevent fraud during elections. These systems often involve storing a biometric template, typically a fingerprint scan, on a card that acts as a national identity card.   Telecommunications With the rapid growth of call centers, telephone banking and telephone ordering systems, users are struggling to remember the number of user IDs and PINs required to access these systems. To combat this, voice-recognition systems are being used to provide access control without the need to remember personal access codes.
  • biometrics

    1. 1.  Outline  Introduction  Biometrics techniques  Strengths, and weaknesses  FAR/FRR  Major Players  Summary
    2. 2. What Is Biometrics ? Biometrics is the reading of a unique human physical attribute as data, which is then applied to authenticate a system.Passwords -“something we know”Tokens and Cards –”something we possess”(e.g., ID cards, smart cards, digital certificates)Biometrics –”something that is part of us”(e.g., retina scan, fingerprints, facial recognition )
    4. 4. Biometrics Techniques Retina scanning Iris scanning Fingerprint scanning Hand scanning Face recognition Voice recognition & DSV Signature recognition Keystroke recognition
    5. 5. RetinalScanning  User Looks Into a Viewer and Focuses on a Point; Infrared Light Scans RetinaIris Scanning User looks at a camera (distance from camera increasing rapidly to 2-3 feet)
    6. 6. User Places Finger onScanning Device
    7. 7. User Places Hand onDevice
    8. 8. User Looks at Camera , it is based on theface geometry
    9. 9. SIGNATURE RECOGNITIONThis is done by analyzing the shape,speed, stroke, pen pressure and timinginformation during the act of signing.
    10. 10. Other TechniquesVoice Recognition & DSVUser speaks into a microphone or otherdevice, such as a telephone handsetKeystroke Recognition User types standard sample on keyboard
    11. 11. Strengths, and Weakness Retina Iris Fingerprint Hand/Finger Geometry Face Recognition Voice Recognition Signature Recognition Keystroke Recognition
    12. 12. Technique StrengthsRetina Highly accurateIris Highly accurate; works with eyeglasses; more acceptable to users than retina scanFingerprint Mature technology; highly accurate; low cost; small size, becoming widely acceptableHand/Finger Geometry accurate and flexible; widely acceptable to usersFace Recognition Widely acceptable to users; low cost; no direct contact; passive monitoring possibleVoice Recognition Usable over existing telephone system; good for remote access and monitoring;Signature Recognition Widely acceptable to usersKeystroke Recognition Widely acceptable to users; low cost; uses existing hardware
    13. 13. Technique WeaknessesRetina Inconvenient for persons with eyeglasses; dislike contact with device and light beamIris New technology, cost, although this is rapidly changingFingerprint Users can create high FRR; some persons dislike contact with deviceHand/Finger Geometry User interface is bulky; dislike contact with deviceFace Recognition Face recognition is less accurate than other methodsVoice Recognition Less accuracy; subject to background noiseSignature Recognition Less accuracy; not widely used yet, but has potential with PDAsKeystroke Recognition Less accuracy;
    14. 14. FAR & FRR FAR(False Acceptance rate) – refers to how often the system accepts someone it should reject AND FRR(False Rejection Rate) is how often the system rejects someone it shouldn’t.
    15. 15. Major Players  Computer access  Physical access  Handheld devices  Military/Govt. Agencies/DOD  Financial services  Hospitals  Telecommunication
    16. 16. Summary  As biometric technology advances, the cost of systems will decrease.  At the same time, biometrics systems will become increasingly sophisticated and accurate.  Scientist will physical and behavioral traits will increase the usefulness of biometrics.  The general public will gradually come to accept biometric system.