Your SlideShare is downloading. ×
0
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
A study on biometric authentication techniques
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

A study on biometric authentication techniques

7,516

Published on

This Slide will describe briefly 5 different Biometric Techniques and compare them.

This Slide will describe briefly 5 different Biometric Techniques and compare them.

Published in: Technology
0 Comments
8 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
7,516
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1,037
Comments
0
Likes
8
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • 1.(Something that you have or you know may be stolen, but something that you are can’t be stolen or fraud.)
    As security level decreases and transactional fraud increases now-a-days, it is very essential to have a highly secure identification and verification system. The main reason behind biometric systems are:
  • Depending on application it can operate on two modes.
  • See pdf
  • Transcript

    • 1. BIOMETRIC AUTHENTICATION TECHNIQUES Preparedd By Subhash Basishtha Saptarshi Boruah M.Tech Scholar.
    • 2. Presentation outlines               What is Authentication ? Types of Authentication What is Biometric? Why Biometric? Characteristics of Biometric Mode of Biometric system Working of Biometrics System Different Biometric techniques Comparison Between Different Techniques Performance Metrics Applications of Biometric Authentication Limitations of Biometric System Conclusion References
    • 3. What is Authentication    Authentication is the act of confirming something what it claims to be. It is the process of giving someone identity so that he or she can access that particular application or data. For e.g.: giving identity-card to a student of an institute.
    • 4. Main types of authentication  By using passwords, PIN  By using smart card or swipe card  By using Biometric
    • 5. What Is Biometric ?    Biometric is a combination of two Greek words Bio(Life) and Metric(To Measure). It actually measures and analyzes the biological traits of a human being. Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical characteristics.
    • 6. Contd..  Biometric based authentication systems are able to provide high security against confidential financial transactions and personal data privacy. “something that you are”
    • 7. Why Biometric?      Identity theft is not possible password remembrance problem does not exist Cannot be predicted or hacked Cannot be shared Perceived as more secure
    • 8. Characteristics of Biometric Automated method of recognizing an individual is based on two main characteristics :   Physical characteristics are related to physical shape of the body. For e.g.: fingerprint ,face recognition, hand geometry, iris recognition etc. Behavioral characteristics are related to the behavior of a person. For e.g.: voice pitch, speaking style, typing rhythm, signature etc.
    • 9. Biometric Technique Classification [3]
    • 10. Mode of Biometric System Identification  One-to-many comparison  It search for a sample against a database of templates  It identifies an unknown individual.  For e.g.: who is “x”? Verification  One-to-one comparison  It compares a sample against a single stored template  It verifies that the individual is who he claims to be  For e.g.: is this “x”?
    • 11. Working of biometric system Steps:  Capturing  Pre-processing  Feature extraction  Template matching  Matcher/Comparison  Application Device [3]
    • 12. Working process  Enrollment: In this stage, the information captured from the subject by the sensing device is stored in a database for later comparison. When someone uses biometric for the first time then the stage is called enrollment.
    • 13. Contd…  Authentication: In this stage, the registered biometric sample during the enrollment process are matched against newly capturing biometric sample.
    • 14. Biometric devices consist of    A scanning device A software which converts scanned information into digital forms and compares on some matching points A database that stores biometric features for further comparison
    • 15. Different biometric technique Fingerprint technology:  It is the oldest and most widely used method.  It needs a fingerprint reader.  Registered points are located and compared.  Optical sensors are used for scanning purpose.  It can be used for many applications like pc login security, voting system, attendance system etc. [12]
    • 16. Contd..   Uses the ridge endings and bifurcation's on a persons finger to plot points known as Minutiae The number and locations of the minutiae vary from finger to finger in any particular person, and from person to person for any particular finger Finger Image Finger Image + Minutiae Minutiae
    • 17. Contd.. Face recognition technology:   Face Recognition is a biometric technique for automatic identification or verification of a person from a digital image. These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
    • 18. Contd.. Iris Recognition Technology:  It measures the iris pattern of the eye i.e. the colored part of the eye that surrounds the pupil.  The iris canner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.  Iris pattern is not changed over years or by glasses, contact lens
    • 19. Contd.. Hand Geometry Technology  This method uses hand images for person identification or verification.  Person identification using hand geometry utilizes hand images to extract a number of features such as finger length, width, thickness, finger area etc.  Measures the digits of the hand and compares to those collected at the time of enrollment.
    • 20. Contd..  Places hand on the system, which takes the three dimensional image of the hand. [6]
    • 21. Contd..  Speaker recognition technology: Voice Recognition or Speaker Recognition is a biometric process of validating a user's claimed identity using characteristics extracted from their voices. It uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes. A telephone or microphone can act as a sensor.
    • 22. Contd..    During the enrollment phase, the spoken words are converted from analog to digital format, and the distinctive vocal characteristics such as pitch, frequency, and tone, are extracted, and a speaker model is established. A template is then generated and stored for future comparisons. Speaker recognition is often used where voice is the only available biometric identifier, such as telephone.
    • 23. Comparison Between Different Technique [3]
    • 24. Performance Metrics    FAR(False Acceptance Rate) : It is a measure of the percent of invalid inputs that are incorrectly accepted. FRR(False Reject Rate) : It is a measure of the percent of valid inputs that are incorrectly rejected. CER(Crossover Error Rate) : The rate at which both the accept and reject errors are equal. - a lower value of the CER is more accurate for Biometric System.
    • 25. Performance Metrics Curve [4]
    • 26. Applications of Biometric System        Criminal identification Internet banking Attendance system Airport, Bank security PC login security Prevents unauthorized access to private data Financial transaction management
    • 27. Limitations of Biometric System     Presence of noise in the sensed data Variations in the enrolled data Non-universality It is an expensive security solution
    • 28. Conclusion   The development of e-commerce or egovernment sites can be achieved through the utilization of this strong authentication process. The greatest strength of the biometric system is that they does not change over time so it is much more efficient than other traditional security mechanism.
    • 29. REFERENCES 1. 2. 3. 4. Emanuele Maiorana, Chiara Ercole, Secure Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography. Fernando L. Podio and Jeffrey S. Dunn.Biometric Authentication Technology: From the Movies to Your Desktop. Fahad Al-harby, Rami Qahwaji, and Mumtaz Kamala. Secure Biometrics Authentication: A brief review of the Literature. Dr. NatarajanMeghanathan. Biometrics for Information Security.
    • 30. REFERENCES 5. 6. 7. 8. Anil K. Jain, AjayKumar, Biometrics of Next Generation: An Overview. SPRINGER, 2010. Debnath Bhattacharyya, Rahul Ranjan, Farkhod Alisherov A.,and Minkyu Choi. Biometric Authentication: A Review, International Journal of u- and e- Service, Science and Technology ,Vol. 2, No. 3, September, 2009. Dr. JK Schneider. BIOMETRICS, SMARTPHONES AND THE E-WALLET.2011. Zdenek Ríha, Václav Matyáš. Biometric Authentication Systems. FIMU Report Series.
    • 31. REFERENCES 9. 10. 11. 12. Phalguni Gupta, Ajita Rattani, Hunny Mehrotra, Anil Kumar Kaushik. Multimodal Biometrics System for Efficient Human Recognition. Debnath Bhattacharyya,Rahul Ranjan,Poulami Das,Tai Hoon Kim, Samir Kumar Bandyopadhyay, Biometric Authentication Technique and Its Future probabilities. IEEE Trans Int. conf. On Computer and Electrical Engineering,pp. 652-655, 2009. A. K. Jain, A. Ross and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125 –143, June 2006. http://en.wikipedia.org/wiki/Biometric_authentication

    ×