Biometrics Technology


Published on

what do you know about Biometrics and how it works?

Published in: Technology, Business
  • I hear that biometric products, if used with a backup password, are now called a “below-one factor authentication”, since it makes the users less safe than a password-only single factor authentication. It is exactly like a house with two entrances is less safe against burglars than a house with one entrance. This means that biometric products must be used without a backup password if security is wanted. Can it be done? It should help a lot if you have a quick look at
    Are you sure you want to  Yes  No
    Your message goes here
  • gud...
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Biometrics Technology

  1. 1. Biometrics Technology<br />
  2. 2. three main types of authentication available today are:<br /><ul><li>something you know, like a password, PIN, or code.
  3. 3. something you have, like a swipe card, smart card, token, or key.
  4. 4. something you are, which is biometrics.</li></li></ul><li> What is a biometric?<br />Biometrics<br /><ul><li>Is the term given to the use of </li></ul> biological traits <br /> OR <br /> behavioral characteristics <br /> to identify an individual.  <br />
  5. 5. Characteristics<br />The common Physical characteristics are:<br />Fingerprint <br />Face<br />Retina <br />Iris <br />Vein pattern, and <br />Hand and finger geometry<br />
  6. 6. Characteristics<br />Behavioral characteristics are:<br />Keystroke dynamics <br /> Voice <br /> Gait, and <br /> Signature dynamics<br />
  7. 7. The Biometric importance<br />The security is needed in every place.<br /> Alleviate the existing problems, Like those which can be taken, stolen, borrowed or even forgotten.<br />
  8. 8. The Biometric importance (Cont.)<br />Improves convenience, security, and privacy.<br />The first and most critical link in the security chain. <br />presented to counteract security threats. <br />
  9. 9. Biometrics History<br />The term &quot;biometrics&quot; is derived from the Greek words<br /> (life)<br />and metric means<br />(to measure).<br />bio which means <br />
  10. 10. Biometrics History (Cont.)<br />the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century.<br />
  11. 11. Biometrics History (Cont.)<br />In the 1890s, &apos;Bertillonage&apos;, created a method of bodily measurement with the criminals who repeated the crimes with different names and looks. <br />
  12. 12. Biometrics History (Cont.)<br />After this, finger printing, which was developed by Richard Edward Henry of Scotland Yard.<br />
  13. 13. Biometrics Process<br />new biometric sample is requested.<br />No<br />Quality <br />Sufficient?<br />Signal Processing, <br />Feature Extraction, <br />Representation<br />Biometric<br />Data Collection<br />Transmission<br />Yes<br />Generate Template<br />Database<br />Template Match<br />Decision<br />Confidence?<br />Yes<br />No<br />
  14. 14. Physical Characteristics<br />
  15. 15. Fingerprint Recognition:<br />Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual&apos;s fingertips which are unique to that individual.<br />
  16. 16. Fingerprint Recognition steps:<br />Database<br />
  17. 17. Face Recognition:<br />Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual. <br />
  18. 18. Face recognition process:<br />Extraction of face features<br />Input face image<br />Extraction of face image<br />Positive<br />Database<br />negative<br />
  19. 19. Iris Identification:<br />The iris is the colored ring of textured tissue that surrounds the pupil of the eye. <br />
  20. 20. Iris Identification Steps:<br />Input of face image<br />Recognition of iris pattern<br />Detection of eye regions<br />Put iris in focus<br />accept<br />Database<br />reject<br />
  21. 21. Veins Recognition:<br />Venial Recognition: A system for Identification using a person’s unique vein patterns.<br /><ul><li>Veins as a biometrics tool involve the measurement of the blood vessels on the back of your hand.</li></li></ul><li>Vein Recognition System:<br />The output picture<br />Generate veins structure<br />Input of palm picture<br />Database<br />match<br />Not match<br />
  22. 22. Behavioral Characteristics<br />
  23. 23. Voice Recognition:<br />Voice Recognition: is the Identification using the acoustic features of speech that have been found to differ between individuals.<br />
  24. 24. Voice Identification System<br />Construct voice reference template<br />Database<br />
  25. 25. Signature Identification:<br />Signature identification: is the analyses of the way a user signs his or her name.<br />The process used by a biometric system to verify a signature is called dynamic signature verification (DSV). <br />
  26. 26. Signature Verification Process (Cont.)<br /><ul><li>the angle at which the pen is held,
  27. 27. the number of times the pen is lifted,
  28. 28. the time it takes to write the entire signature,</li></ul>Biometric trait<br /><ul><li>the pressure exerted by the person while signing,
  29. 29. the variations in the speed with which different parts of the signature are written. </li></li></ul><li>Signature Verification Process<br />Profile<br />Database<br />
  30. 30. Movies to Real World<br />
  31. 31. Applications of Biometric<br />
  32. 32. Applications of Biometric <br />Access control :<br /><ul><li>Disney World (fingerprint scanner).
  33. 33. Child day care centers ( hand geometry systems )</li></li></ul><li>Applications of Biometric (Cont.)<br />Time and attendance management:<br /><ul><li> Hospitals (hand geometry systems) </li></li></ul><li>Other Applications <br /><ul><li>Airports:
  34. 34. Heathrow airport (iris recognition)</li></ul>ATMs:<br /><ul><li>(face recognition)</li></li></ul><li>Other Applications (Cont.)<br />Pc access:<br /><ul><li>GM and Hertz (voice identification technology) to protect their computer facilities.
  35. 35. Fujitsu has developed a mouse that can verify a person's identity by recognizing his pattern of blood veins. </li></li></ul><li>Other Applications (Cont.)<br />Prisons: <br />Fujitsu has developed a mouse that can verify a person&apos;s identity by recognizing his pattern of blood veins. <br />
  36. 36. Advantages of biometrics<br />Uniqueness<br />Universality<br />Permanence<br />Measurability<br />User friendliness<br />Accuracy<br />Comfort <br />
  37. 37. Disadvantages of Biometrics<br />costly.<br />Facial imaging can also hinder accurate identifications.<br />Missing body part problem. <br />
  38. 38. Disadvantages of Biometrics (Cont.)<br />False acceptances and rejections.<br />The amount of comfort.<br />The scanning of eye is fearful.<br />The nervousness that people feel about the scanners identification.<br />
  39. 39. Future Prospects<br />Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future.Some of the emerging biometrics technologies in the near future are:<br />Ear shape identification.<br />Body odor identification.<br />Body salinity identification.<br />EEG Fingerprint<br />DNA matching<br />
  40. 40. Conclusion<br />Not perfect yet.<br />Successful applications.<br />Decreasing costs and increasing convenience. <br />Increasing both privacy and identity security. <br />The field of biometrics is evolving. <br />Benefit from this technology .<br />
  41. 41. References:<br /><ul><li>The Biometric Consortium -
  42. 42. National Institute of Standards and Technology -
  43. 43. The Biometric Catalog -
  44. 44. ITPro -
  45. 45. Georgia Institute of Technology -
  46. 46.
  47. 47.
  48. 48.</li></ul><br />