Biometrics-Sukanta Bhattacharyya

  • 435 views
Uploaded on

Describes the innovative means of securing and authenticating …

Describes the innovative means of securing and authenticating
secrets keeping away the hectic of remembering passwords and PIN numbers

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
435
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
28
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. By Sukanta Bhattacharyya Registration # 1651210007
  • 2. • Forget passwords ... • Forget pin numbers ... • Forget all your security concerns ...Just stay cool Why ????????????????????? Because here comes BIOMETRICS…… Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 2
  • 3. Introduction: The nuisance of forgotten passwords and ID codes is over as biometrics-based authentication is here. Our fingerprints, iris pattern, and voice will verify our identity at ATMs, airports, etc. We can unlock our house or withdraw money from our bank with just a blink of an eye, a tap of our finger or just showing you face BIOMETRICS is a means of using parts of the human body as a kind of permanent password. Just as your fingerprints are unlike those of any other person, your eyes, ears, hands, voice, and face are also unique. Technology has advanced to the point where computer systems can record and recognize the patterns, hand shapes, ear lobe contours, and a host of other physical characteristics. Using these biometrics, laptop and other portable devices can be empowered with the ability to instantly verify your identity and deny access to everybody else. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 3
  • 4. Biometrics ? The automated measurement of physiological and behavioral characteristics to determine or authenticate identity is termed as biometrics. Automated means no human involvement. Physiological traits include fingerprint, hand, eyes, face while behavior traits include actions performed by humans such as ‘user speaks, types on a keyboard’ etc. These combine to recognize the identity of the user and also to authenticate the particular user for the particular job. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 4
  • 5. Why Biometrics ? • Traditional methods involving passwords and PIN numbers • Biometrics highest level of security Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 5
  • 6. Biometric System Data Collection Transmission Signal Processing Data Storage Decision Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 6
  • 7. A generic biometric model or system consists of five subsystems namely data collection, transmission, signal processing, decision making and data storage. Data collection involves use of sensors to detect and measure an individual’s physiological or behavioral characteristics. Data collection stage consists of a number of sensing elements such as sensors. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 7
  • 8. Biometric Process: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 8
  • 9. Explanation: The basic block diagram of a biometric system is studied in the following two modes namely verification and identification. In verification mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps involved in person verification. In the first step, reference models for all the users are generated and stored in the model database. In the second step, some samples are matched with reference models to generate the genuine and impostor scores and calculate the threshold. Third step is the testing step. In identification mode the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 9
  • 10. In short The hardware captures the salient human characteristics and the software interprets the resulting data and determines acceptability. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 10
  • 11. Characteristics used as input data: Fingerprints Voiceprints Facial features Writing patterns Iris patterns Hand geometry Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 11
  • 12. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 12 Fingerprint recognition system One of the oldest form of biometrics which is highly reliable and uses distinctive finger features for the purpose of identification and verification. Process: The process is similar to the working of a general biometrics system. The process is carried out in the following steps  A fingerprint image is read from a captured device  Features are extracted from the image  A template is created for comparison
  • 13. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 13
  • 14. Detailed process of finger recognition biometrics Three steps are required for the process. They are  Fingerprint Scanning: It’s the acquisition and recognition of a person’s fingerprint characteristics for identification purposes  Fingerprint Matching: It involves the matching of the new enrollment with the pre-captured database  Identification: Finally identifies the person or subject based on the above steps. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 14
  • 15. Fingerprint scanning or image acquisition: Finger imprint image is taken by different techniques • Optical • Thermal • Capacitance • Ultra Sound Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 15
  • 16. Feature Extraction process: This is followed by image acquisition stage. The different features are extracted from the acquired image. These features are called global features. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 16
  • 17. Fingerprint matching (template matching) which is followed by feature extraction process. Matching is done between the acquired image and the already available image in the database. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 17
  • 18. Coding: Computation of coding is done along with the template matching technique. Bridge coding Spur Coding Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 18
  • 19. Overall process of fingerprint recognition: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 19
  • 20. Applications of fingerprint recognition system: Logical access control-PC lock system Physical access control-Door lock system Lockers Time and attendance systems at educational institutes and firms Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 20
  • 21. Other biometric systems: Iris recognition system Face recognition system Speech /voice recognition system Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 21
  • 22. Applications of Biometrics in use:  Banks nowadays scan the fingerprints of its customers, instead of using a personal identification number (PIN), when they wish to withdraw cash.  Basically, the biometrics security technique acts as a front end to a system that requires precise identification before it can be accessed or used. The system could be a sliding door with electronic locking mechanisms, an operating system (OS), or an application where individual users have their own rights and permissions.  A biometric chip reader incorporated into a PC can facilitate secure Internet- based online transactions. Applications that are being developed to accept biometric data include computer networks, cars, cellular phones, and hoards of other types of embedded systems. Biometrics could authenticate e-mail and other documents transmitted via computer networks. In hospitals, biometric techniques could replace ID bracelets to establish patients identities for instance during blood administration.  With existing voice-transmission technology, voice recognition biometric techniques can function over long distances using the ordinary telephone. A well conceived and properly implemented voice-based security system could provide a greater safety to financial transaction conducted over the telephone. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 22
  • 23. Other applications: • Criminal identification • Prison security • ATM • Aviation security • Border crossing controls • Database access Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 23
  • 24. Benefits: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 24
  • 25. Limitations: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 25
  • 26. Future projects of biometrics:  Smell recognition system  Ear Shape  Finger nail bed  Facial 3D Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 26
  • 27. Conclusion: There are always concerns about adapting to new technologies. This study shows that some people are reluctant to accept biometrics because it profoundly affects personal privacy and safety, even though they are well aware of its benefits. Furthermore, since biometrics involves personal characteristics, many are concerned that privacy should be protected, and that both government and business must maintain the public’s trust. The future of biometrics looks increasingly bright with the demand for security rising daily. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 27
  • 28. References: www.google.com Google images Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 28
  • 29. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 29