SlideShare a Scribd company logo
1 of 17
Project proposal
TOPIC: BIOMETRICS
NADEEM AHMED FROM DEPALPUR
COMSATS University
Islamabad sahiwal
campus
Introduction:
Biometrics is the technical term for body measurements
and calculations. It refers to metrics related to human
characteristics. Biometrics authentication (or realistic
authentication is used in computer science as a form of
identification and access control. It is also used to identify
individuals in groups that are under surveillance.
Biometric identifiers are the distinctive, measurable
characteristics used to label and describe
individuals. Biometric identifiers are often categorized as
physiological versus behavioral
characteristics. Physiological characteristics are related to
the shape of the body. Examples include, but are not
limited to fingerprint, palm veins, face
recognition, DNA, palm print, hand geometry, iris
recognition, retina and odour/scent. Behavioral
characteristics are related to the pattern of behavior of a
person, including but not limited to typing rhythm, gait,
and voice. Some researchers have coined the term
behaviometrics to describe the latter class of biometrics.
More traditional means of access control include token-
based identification systems, such as a driver's
license or passport, and knowledge-based identification
systems, such as a password or personal identification
number. Since biometric identifiers are unique to
individuals, they are more reliable in verifying identity
than token and knowledge-based methods; however, the
collection of biometric identifiers raises privacy
concerns about the ultimate use of this information.
Biometric terms comes from the Greek words bios (life)
and metric (measure).Biometric systems are automated
methods of recognizing or verifying the living person
identity on the basis of some physiological characteristics,
like face pattern, fingerprint and hand, or some aspects of
behavior, like keystroke patterns, signature and voice. No
system can be secure completely. So, it is very difficult to
compromise the system. The security becomes more
intrusive, if the system is more secure. Bertillon age is the
first type of biometrics came into form in 1890, created
by an anthropologist named AlphonseBertillon. He based
his system on the claim that measurement of adult bones
does not change after the age of 20.Biometric method
consisting of various body measurements of a person like
height, arm length, breadth and circumference of the
head, the length of forearms, the length of different finger,
length of feet etc.
Problem statement:
Unlike the use of other forms of authentication, such as
passwords or tokens, biometric recognition provides a
strong link between an individual and a data record.
One area where biometrics can provide substantial help
is in guarding against attempts to fraudulently establish
multiple identities. By searching through the enrolled
biometric references, individuals who appear to have
previously enrolled using a different identity can be
highlighted for further investigation. It is very difficult to
perform this type of check without the use of biometrics.
Selection of a suitable biometric product for a particular
application is not simple. Without biometrics we can’t do
following things easily.
 Accuracy of discrimination between individuals
 Speed of operation
 The ability to deal with present and future numbers
of individuals
 Environmental robustness
 Ease of use
 Wide accessibility by the intended population of
users, e.g. young and old, short and tall
 Social acceptability, i.e. people are happy to use it
 Secure and robust against potential attackers.
These things were creating problems for society .
biometrics slove this problem.
Types :
Biometrics measures biological characteristics for
identification or verification purposes of an individual.
Since IDs and passports can be forged, more
sophisticated methods needed to be put into place to
help protect companies and individuals. There are two
types of biometric methods. One is called Physiological
biometrics used for identification or verification
purposes. Identification refers to determining who a
person is. This method is commonly used in criminal
investigations. Behavioral biometrics is the other type. It
is used for verification purposes. Verification is
determining if a person is who they say they are. This
method looks at patterns of how certain activities are
performed by an individual.
1.Physiological Type of Biometric:
The physical characteristics of a person like finger prints,
hand geometry, iris, face and DNA are known as
biometrics. Each biometric trait has its strengths and
weaknesses.
 Fingerprints:
A fingerprint is a pattern of ridges and furrows located
on the tip of each finger. Fingerprints were used for
personal identification for many centuries and the
matching accuracy was very high . Patterns have been
extracted by creating an inked impression of the fingertip
on paper. Today, compact sensors provide digital images
of these patterns. Fingerprint recognition for
identification acquires the initial image through live scan
of the finger by direct contact with a reader device that
can also check for validating attributes such as
temperature and pulse. Since the finger actually touches
the scanning device, the surface can become oily and
cloudy after repeated use and reduce the sensitivity and
reliability of optical scanners. This method is traditional
and it gives accuracy for currently available Fingerprint
Recognition Systems for authentication.
 Hand Geometry:
Hand geometry systems produce estimates of certain
measurements of the hand such as the length and the
width of fingers. Various methods are used to measure
the hand. These methods are most commonly based
either on mechanical or optical principle. The latter ones
are much more common today. The hand geometry is
used for identification and recognition of a person.
 Iris:
The iris begins to form in the third month of gestation
and the structures creating its pattern are largely
complete by the eight month. Its complex pattern can
contain many distinctive features such as arching
ligaments, furrows, ridges, crypts, rings, corona, freckles
and a zigzag collarets . Iris scanning is less intrusive than
retinal because the iris is easily visible from several
meters away. Responses of the iris to changes in light can
provide an important secondary verification that the iris
presented belongs to a live subject. Irises of identical
twins are different, which is another advantage.
 Face Facial recognition:
it is the most natural means of biometric identification.
The approaches to face recognition are based on shape
of facial attributes, such as eyes, eyebrows, nose, lips,
chin and the relationships of these attributes. As this
technique involves many facial elements; these systems
have difficulty in matching face images
 DNA:
DNA(Deoxyribonucleic Acid) sampling is rather intrusive
at present and requires a form of tissue, blood or other
bodily sample. This method of capture still has to be
refined. So far the DNA analysis has not been sufficiently
automatic to rank the DNA analysis as a biometric
technology. The analysis of human DNA is now possible
within 10 minutes. As soon as the technology advances
so that DNA can be matched automatically in real time, it
may become more significant. At present DNA is very
entrenched in crime detection and so will remain in the
law enforcement area for the time being.
2.Behavioral type of Biometric :
Behavior methods of identification pay attention to the
actions of a person, giving the user an opportunity to
control his actions. Biometrics based on these methods
takes into consideration high level of inner variants
(mood, health condition, etc), that is why such methods
are useful only in constant use. It includes keystroke,
signature and voice.
 Keystroke Keyboard:
is the part that helps us to communicate with computer.
People use keyboard in different ways. Some people type
fast, some slow. The speed of the typing also depends on
the mood of a person and a time of a day. Biometric
keystroke recognition – is a technology of recognizing
people from the way they are typing. It is rather
important to understand that this technology does not
deal with “what” is written but “how” it is written.
 Signature:
The way a person signs his or her name is known to be
characteristic of that individual.Signature is a simple,
concrete expression of the unique variations in human
hand geometry. Collecting samples for this biometric
includes subject cooperation and requires the writing
instrument. Signatures are a behavioral biometric that
change over a period of time and are influenced by
physical and emotional conditions of a subject. In
addition to the general shape of the signed name, a
signature recognition system can also measure pressure
and velocity of the point of the stylus across the sensor
pad.
 Voice:
The features of an individual's voice are based on physical
characteristics such as vocal tracts, mouth, nasal cavities
and lips that are used in creating a sound. These
characteristics of human speech are invariant for an
individual, but the behavioral part changes over time due
to age, medical conditions and emotional state. Voice
recognition techniques are generally categorized
according to two approaches: 1) Automatic Speaker
Verification (ASV) and 2) Automatic Speaker
Identification (ASI). Speaker verification uses voice as
the authenticating attribute in a two-factor scenario.
Methodology:
It is a multi-volume publication highlighting critical topics
related to access control, user identification, and
surveillance technologies. Featuring emergent research
on the issues and challenges in security and privacy,
various forms of user authentication, biometric
applications to image processing and computer vision,
and security applications within the field, this publication
is an ideal reference source for researchers, engineers,
technology developers, students, and security specialists.
Recently, biometrics is used in many security systems
and these systems can be located in different
environments. As many experts claim and previous works
have demonstrated, environmental conditions influence
biometric performance. Nevertheless, there is not a
specific methodology for testing this influence at the
moment. Due to it is essential to carry out this kind of
evaluations, a new ISO standard was proposed for
regularizing them. Such standard was accepted and it has
to be specified now. In this work, authors have analyzed
the first proposal of this project and other standards
about environmental testing. According to this new ISO
proposal and current ISO standards and considering
aspects of these related standards focused in biometric
evaluations, a detailed methodology has been defined.
This methodology consists of two parts: on the one hand,
the definition of the environmental factors to analyse,
including how to generate, control and measure them,
and on the other hand, the specification about how to
perform the biometric evaluation.
Application:
Airport Security:
Making the journey through airport terminals more
seamless for passengers is a goal shared by airports
around the world. Biometric technology to verify
passenger identities has been used in several large
international airports for a number of years and the
technology is quickly spreading to other locations across
the globe.
In many airports, the top biometric modality choice for
immigration control is iris recognition. In order to use iris
recognition, travelers are first enrolled by having a photo
of their iris and face captured by a camera. Then, their
unique details are stored in an international database for
fast, accurate identification at ports of entry and exit that
use iris recognition for traveler identity verification.
When travelling, instead of waiting in long queues to be
processed, passengers simply walk into a booth and look
into an iris camera. The camera then photographs the iris
and a software program then matches the details with
the information stored on the database.
Biometrics simplifies the airport experience for millions
of passengers travelling every day. Use of the technology
also ensures the highest level of security and safety.
Time and Attendance:
Workforce management is another field where the use of
biometrics is on the rise. Fraudulent employee time and
attendance activities are a common phenomenon in
organizations throughout the world. According to
an American Payroll Association study, the average
employee reportedly steals approximately 4 and a half
hours per week, which is equivalent to 6 weeks’ vacation
if extrapolated over a year. To solve this issue, companies
are implementing biometric time clocks on their work
sites.
A biometric time and attendance system is the
automated method of recognizing an employee based on
a physiological or behavioral characteristic. The most
common biometric features used for employee
identification are faces, fingerprints, finger veins, palm
veins, irises, and voice patterns. When an employee
attempts identification by their biological traits, a
biometric hardware device compares the new scan to all
available templates in order to find an exact match.
Even government organizations now rely on biometrics
for ensuring timely attendance of staff and accurate
payroll calculations.
Law Enforcement:
Organizations like the Federal Bureau of Investigations
(FBI) and Interpol have been using biometrics in criminal
investigations for years. Today, biometrics is widely used
by law enforcement agencies across the world for the
identification of criminals. In 2008, the Chinese Police
adopted an ABIS solution to allow forensic fingerprint
examiners the ability to cross check inmate identities for
possible matches within the database.
Biometrics is also widely used for jail and prison
management. Biometrics provides a modern solution by
which the Jail Authority, Public Safety Departments, and
Governments can safely and securely manage prisoner
identities.
Access Control & Single Sign On (SSO):
The primary reason behind more and more organizations
and personnel across the globe adopting biometric
technology for access control and Single Sign On (SSO) is
because traditional authentication tactics like passwords
are insufficient for personal identification. Passwords
only provide evidence or proof of knowledge whereas
biometrics provides unique advantages because it relies
on identifying someone by “who they are” compared to
“what you know “or “what you have.”
Today, biometrics is widely used around the world
for home access control, mobile phone access, vehicle
access authentication and Single Sign On (SSO).
Banking – Transaction Authentication:
Biometrics in banking has increased a great deal in the
last few years and is being implemented by banks
throughout the world. As global financial entities become
more digitally-based, banks are implementing biometric
technology to improve customer and employee identity
management in an effort to combat fraud, increase
transaction security, and enhance customer
convenience. Customers are also fed-up with identity
theft and the inconveniences associated with constantly
having to prove their identities. As a result, more and
more customers are looking for banks that have
biometric authentication in place prompting banks to
more closely research the technology for
implementation.
Conclusion:
Biometric identification management systems offer
higher security, convenience, accountability, and
accurate audit trails – all attributes that motivate
businesses to research and implement the technology for
their own use. We believe that as time moves forward,
we will see implementation of biometric technology
continue to grow and be used in even more areas that
touch our lives.

More Related Content

What's hot

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & consGagan Gowda
 

What's hot (20)

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 

Similar to Biometrics (20)

seminar_report
seminar_reportseminar_report
seminar_report
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometric technologies and applications
Biometric technologies and applicationsBiometric technologies and applications
Biometric technologies and applications
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
E0364024030
E0364024030E0364024030
E0364024030
 
Biometric
Biometric Biometric
Biometric
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

More from NA000000

Jumps in Assembly Language.
Jumps in Assembly Language.Jumps in Assembly Language.
Jumps in Assembly Language.NA000000
 
JAVA Naming Conventions By NADEEM AHMED FROM DEPALPUR
JAVA Naming Conventions By NADEEM AHMED FROM DEPALPURJAVA Naming Conventions By NADEEM AHMED FROM DEPALPUR
JAVA Naming Conventions By NADEEM AHMED FROM DEPALPURNA000000
 
Line Of Code(LOC) In Software Engineering By NADEEM AHMED FROM DEPALPUR
Line Of Code(LOC) In Software Engineering By NADEEM AHMED FROM DEPALPURLine Of Code(LOC) In Software Engineering By NADEEM AHMED FROM DEPALPUR
Line Of Code(LOC) In Software Engineering By NADEEM AHMED FROM DEPALPURNA000000
 
Critical Path Method In Software Engineering By NADEEM AHMED
Critical Path Method In Software Engineering By NADEEM AHMED Critical Path Method In Software Engineering By NADEEM AHMED
Critical Path Method In Software Engineering By NADEEM AHMED NA000000
 
COCOMO Modal In Software Engineering By NADEEM AHMED
COCOMO Modal In Software Engineering By NADEEM AHMED COCOMO Modal In Software Engineering By NADEEM AHMED
COCOMO Modal In Software Engineering By NADEEM AHMED NA000000
 
LEGACY SYSTEM In Software Engineering By NADEEM AHMED
LEGACY SYSTEM In Software Engineering By NADEEM AHMED LEGACY SYSTEM In Software Engineering By NADEEM AHMED
LEGACY SYSTEM In Software Engineering By NADEEM AHMED NA000000
 
Modal Driven Architecture In Software Engineering By NADEEM AHMED
Modal Driven Architecture In Software Engineering By NADEEM AHMED Modal Driven Architecture In Software Engineering By NADEEM AHMED
Modal Driven Architecture In Software Engineering By NADEEM AHMED NA000000
 
Software Testing By NADEEM AHMED FROM DEPALPUR
Software Testing By NADEEM AHMED FROM DEPALPURSoftware Testing By NADEEM AHMED FROM DEPALPUR
Software Testing By NADEEM AHMED FROM DEPALPURNA000000
 
Software Inspection By NADEEM AHMED FROM DEPALPUR
Software Inspection By NADEEM AHMED FROM DEPALPURSoftware Inspection By NADEEM AHMED FROM DEPALPUR
Software Inspection By NADEEM AHMED FROM DEPALPURNA000000
 
Cleanroom Software Engineering By NADEEM AHMED FROM DEPALPUR
Cleanroom Software Engineering By NADEEM AHMED FROM DEPALPURCleanroom Software Engineering By NADEEM AHMED FROM DEPALPUR
Cleanroom Software Engineering By NADEEM AHMED FROM DEPALPURNA000000
 
UML Diagrams By NADEEM AHMED FROM DEPALPUR
UML Diagrams By NADEEM AHMED FROM DEPALPURUML Diagrams By NADEEM AHMED FROM DEPALPUR
UML Diagrams By NADEEM AHMED FROM DEPALPURNA000000
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED NA000000
 
Cloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDCloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDNA000000
 
Iot proposal by nadeem ahmed
Iot proposal by nadeem ahmedIot proposal by nadeem ahmed
Iot proposal by nadeem ahmedNA000000
 
Assignment#1
Assignment#1Assignment#1
Assignment#1NA000000
 
Project proposal oop
Project proposal oopProject proposal oop
Project proposal oopNA000000
 

More from NA000000 (17)

Jumps in Assembly Language.
Jumps in Assembly Language.Jumps in Assembly Language.
Jumps in Assembly Language.
 
JAVA Naming Conventions By NADEEM AHMED FROM DEPALPUR
JAVA Naming Conventions By NADEEM AHMED FROM DEPALPURJAVA Naming Conventions By NADEEM AHMED FROM DEPALPUR
JAVA Naming Conventions By NADEEM AHMED FROM DEPALPUR
 
Line Of Code(LOC) In Software Engineering By NADEEM AHMED FROM DEPALPUR
Line Of Code(LOC) In Software Engineering By NADEEM AHMED FROM DEPALPURLine Of Code(LOC) In Software Engineering By NADEEM AHMED FROM DEPALPUR
Line Of Code(LOC) In Software Engineering By NADEEM AHMED FROM DEPALPUR
 
Critical Path Method In Software Engineering By NADEEM AHMED
Critical Path Method In Software Engineering By NADEEM AHMED Critical Path Method In Software Engineering By NADEEM AHMED
Critical Path Method In Software Engineering By NADEEM AHMED
 
COCOMO Modal In Software Engineering By NADEEM AHMED
COCOMO Modal In Software Engineering By NADEEM AHMED COCOMO Modal In Software Engineering By NADEEM AHMED
COCOMO Modal In Software Engineering By NADEEM AHMED
 
LEGACY SYSTEM In Software Engineering By NADEEM AHMED
LEGACY SYSTEM In Software Engineering By NADEEM AHMED LEGACY SYSTEM In Software Engineering By NADEEM AHMED
LEGACY SYSTEM In Software Engineering By NADEEM AHMED
 
Modal Driven Architecture In Software Engineering By NADEEM AHMED
Modal Driven Architecture In Software Engineering By NADEEM AHMED Modal Driven Architecture In Software Engineering By NADEEM AHMED
Modal Driven Architecture In Software Engineering By NADEEM AHMED
 
Software Testing By NADEEM AHMED FROM DEPALPUR
Software Testing By NADEEM AHMED FROM DEPALPURSoftware Testing By NADEEM AHMED FROM DEPALPUR
Software Testing By NADEEM AHMED FROM DEPALPUR
 
Software Inspection By NADEEM AHMED FROM DEPALPUR
Software Inspection By NADEEM AHMED FROM DEPALPURSoftware Inspection By NADEEM AHMED FROM DEPALPUR
Software Inspection By NADEEM AHMED FROM DEPALPUR
 
Cleanroom Software Engineering By NADEEM AHMED FROM DEPALPUR
Cleanroom Software Engineering By NADEEM AHMED FROM DEPALPURCleanroom Software Engineering By NADEEM AHMED FROM DEPALPUR
Cleanroom Software Engineering By NADEEM AHMED FROM DEPALPUR
 
UML Diagrams By NADEEM AHMED FROM DEPALPUR
UML Diagrams By NADEEM AHMED FROM DEPALPURUML Diagrams By NADEEM AHMED FROM DEPALPUR
UML Diagrams By NADEEM AHMED FROM DEPALPUR
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
 
Cloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMEDCloud computing by NADEEM AHMED
Cloud computing by NADEEM AHMED
 
Iot proposal by nadeem ahmed
Iot proposal by nadeem ahmedIot proposal by nadeem ahmed
Iot proposal by nadeem ahmed
 
Biomatric
BiomatricBiomatric
Biomatric
 
Assignment#1
Assignment#1Assignment#1
Assignment#1
 
Project proposal oop
Project proposal oopProject proposal oop
Project proposal oop
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Biometrics

  • 1. Project proposal TOPIC: BIOMETRICS NADEEM AHMED FROM DEPALPUR COMSATS University Islamabad sahiwal campus Introduction: Biometrics is the technical term for body measurements and calculations. It refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
  • 2. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics. More traditional means of access control include token- based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information. Biometric terms comes from the Greek words bios (life) and metric (measure).Biometric systems are automated methods of recognizing or verifying the living person identity on the basis of some physiological characteristics, like face pattern, fingerprint and hand, or some aspects of
  • 3. behavior, like keystroke patterns, signature and voice. No system can be secure completely. So, it is very difficult to compromise the system. The security becomes more intrusive, if the system is more secure. Bertillon age is the first type of biometrics came into form in 1890, created by an anthropologist named AlphonseBertillon. He based his system on the claim that measurement of adult bones does not change after the age of 20.Biometric method consisting of various body measurements of a person like height, arm length, breadth and circumference of the head, the length of forearms, the length of different finger, length of feet etc. Problem statement: Unlike the use of other forms of authentication, such as passwords or tokens, biometric recognition provides a strong link between an individual and a data record. One area where biometrics can provide substantial help is in guarding against attempts to fraudulently establish multiple identities. By searching through the enrolled biometric references, individuals who appear to have previously enrolled using a different identity can be highlighted for further investigation. It is very difficult to perform this type of check without the use of biometrics.
  • 4. Selection of a suitable biometric product for a particular application is not simple. Without biometrics we can’t do following things easily.  Accuracy of discrimination between individuals  Speed of operation  The ability to deal with present and future numbers of individuals  Environmental robustness  Ease of use  Wide accessibility by the intended population of users, e.g. young and old, short and tall  Social acceptability, i.e. people are happy to use it  Secure and robust against potential attackers. These things were creating problems for society . biometrics slove this problem. Types : Biometrics measures biological characteristics for identification or verification purposes of an individual. Since IDs and passports can be forged, more sophisticated methods needed to be put into place to
  • 5. help protect companies and individuals. There are two types of biometric methods. One is called Physiological biometrics used for identification or verification purposes. Identification refers to determining who a person is. This method is commonly used in criminal investigations. Behavioral biometrics is the other type. It is used for verification purposes. Verification is determining if a person is who they say they are. This method looks at patterns of how certain activities are performed by an individual. 1.Physiological Type of Biometric: The physical characteristics of a person like finger prints, hand geometry, iris, face and DNA are known as biometrics. Each biometric trait has its strengths and weaknesses.  Fingerprints: A fingerprint is a pattern of ridges and furrows located on the tip of each finger. Fingerprints were used for personal identification for many centuries and the
  • 6. matching accuracy was very high . Patterns have been extracted by creating an inked impression of the fingertip on paper. Today, compact sensors provide digital images of these patterns. Fingerprint recognition for identification acquires the initial image through live scan of the finger by direct contact with a reader device that can also check for validating attributes such as temperature and pulse. Since the finger actually touches the scanning device, the surface can become oily and cloudy after repeated use and reduce the sensitivity and reliability of optical scanners. This method is traditional and it gives accuracy for currently available Fingerprint Recognition Systems for authentication.  Hand Geometry: Hand geometry systems produce estimates of certain measurements of the hand such as the length and the
  • 7. width of fingers. Various methods are used to measure the hand. These methods are most commonly based either on mechanical or optical principle. The latter ones are much more common today. The hand geometry is used for identification and recognition of a person.  Iris: The iris begins to form in the third month of gestation and the structures creating its pattern are largely complete by the eight month. Its complex pattern can contain many distinctive features such as arching ligaments, furrows, ridges, crypts, rings, corona, freckles and a zigzag collarets . Iris scanning is less intrusive than retinal because the iris is easily visible from several meters away. Responses of the iris to changes in light can provide an important secondary verification that the iris presented belongs to a live subject. Irises of identical twins are different, which is another advantage.  Face Facial recognition: it is the most natural means of biometric identification. The approaches to face recognition are based on shape of facial attributes, such as eyes, eyebrows, nose, lips,
  • 8. chin and the relationships of these attributes. As this technique involves many facial elements; these systems have difficulty in matching face images  DNA: DNA(Deoxyribonucleic Acid) sampling is rather intrusive at present and requires a form of tissue, blood or other bodily sample. This method of capture still has to be refined. So far the DNA analysis has not been sufficiently automatic to rank the DNA analysis as a biometric technology. The analysis of human DNA is now possible within 10 minutes. As soon as the technology advances so that DNA can be matched automatically in real time, it may become more significant. At present DNA is very
  • 9. entrenched in crime detection and so will remain in the law enforcement area for the time being. 2.Behavioral type of Biometric : Behavior methods of identification pay attention to the actions of a person, giving the user an opportunity to control his actions. Biometrics based on these methods takes into consideration high level of inner variants (mood, health condition, etc), that is why such methods are useful only in constant use. It includes keystroke, signature and voice.  Keystroke Keyboard: is the part that helps us to communicate with computer. People use keyboard in different ways. Some people type fast, some slow. The speed of the typing also depends on the mood of a person and a time of a day. Biometric keystroke recognition – is a technology of recognizing people from the way they are typing. It is rather important to understand that this technology does not deal with “what” is written but “how” it is written.  Signature:
  • 10. The way a person signs his or her name is known to be characteristic of that individual.Signature is a simple, concrete expression of the unique variations in human hand geometry. Collecting samples for this biometric includes subject cooperation and requires the writing instrument. Signatures are a behavioral biometric that change over a period of time and are influenced by physical and emotional conditions of a subject. In addition to the general shape of the signed name, a signature recognition system can also measure pressure and velocity of the point of the stylus across the sensor pad.  Voice: The features of an individual's voice are based on physical characteristics such as vocal tracts, mouth, nasal cavities and lips that are used in creating a sound. These characteristics of human speech are invariant for an individual, but the behavioral part changes over time due to age, medical conditions and emotional state. Voice recognition techniques are generally categorized according to two approaches: 1) Automatic Speaker Verification (ASV) and 2) Automatic Speaker
  • 11. Identification (ASI). Speaker verification uses voice as the authenticating attribute in a two-factor scenario. Methodology: It is a multi-volume publication highlighting critical topics related to access control, user identification, and surveillance technologies. Featuring emergent research on the issues and challenges in security and privacy, various forms of user authentication, biometric applications to image processing and computer vision, and security applications within the field, this publication is an ideal reference source for researchers, engineers, technology developers, students, and security specialists. Recently, biometrics is used in many security systems and these systems can be located in different environments. As many experts claim and previous works have demonstrated, environmental conditions influence
  • 12. biometric performance. Nevertheless, there is not a specific methodology for testing this influence at the moment. Due to it is essential to carry out this kind of evaluations, a new ISO standard was proposed for regularizing them. Such standard was accepted and it has to be specified now. In this work, authors have analyzed the first proposal of this project and other standards about environmental testing. According to this new ISO proposal and current ISO standards and considering aspects of these related standards focused in biometric evaluations, a detailed methodology has been defined. This methodology consists of two parts: on the one hand, the definition of the environmental factors to analyse, including how to generate, control and measure them, and on the other hand, the specification about how to perform the biometric evaluation.
  • 13. Application: Airport Security: Making the journey through airport terminals more seamless for passengers is a goal shared by airports around the world. Biometric technology to verify passenger identities has been used in several large international airports for a number of years and the technology is quickly spreading to other locations across the globe. In many airports, the top biometric modality choice for immigration control is iris recognition. In order to use iris recognition, travelers are first enrolled by having a photo of their iris and face captured by a camera. Then, their unique details are stored in an international database for fast, accurate identification at ports of entry and exit that use iris recognition for traveler identity verification. When travelling, instead of waiting in long queues to be processed, passengers simply walk into a booth and look into an iris camera. The camera then photographs the iris and a software program then matches the details with the information stored on the database.
  • 14. Biometrics simplifies the airport experience for millions of passengers travelling every day. Use of the technology also ensures the highest level of security and safety. Time and Attendance: Workforce management is another field where the use of biometrics is on the rise. Fraudulent employee time and attendance activities are a common phenomenon in organizations throughout the world. According to an American Payroll Association study, the average employee reportedly steals approximately 4 and a half hours per week, which is equivalent to 6 weeks’ vacation if extrapolated over a year. To solve this issue, companies are implementing biometric time clocks on their work sites. A biometric time and attendance system is the automated method of recognizing an employee based on a physiological or behavioral characteristic. The most common biometric features used for employee
  • 15. identification are faces, fingerprints, finger veins, palm veins, irises, and voice patterns. When an employee attempts identification by their biological traits, a biometric hardware device compares the new scan to all available templates in order to find an exact match. Even government organizations now rely on biometrics for ensuring timely attendance of staff and accurate payroll calculations. Law Enforcement: Organizations like the Federal Bureau of Investigations (FBI) and Interpol have been using biometrics in criminal investigations for years. Today, biometrics is widely used by law enforcement agencies across the world for the identification of criminals. In 2008, the Chinese Police adopted an ABIS solution to allow forensic fingerprint examiners the ability to cross check inmate identities for possible matches within the database. Biometrics is also widely used for jail and prison management. Biometrics provides a modern solution by which the Jail Authority, Public Safety Departments, and Governments can safely and securely manage prisoner identities. Access Control & Single Sign On (SSO):
  • 16. The primary reason behind more and more organizations and personnel across the globe adopting biometric technology for access control and Single Sign On (SSO) is because traditional authentication tactics like passwords are insufficient for personal identification. Passwords only provide evidence or proof of knowledge whereas biometrics provides unique advantages because it relies on identifying someone by “who they are” compared to “what you know “or “what you have.” Today, biometrics is widely used around the world for home access control, mobile phone access, vehicle access authentication and Single Sign On (SSO). Banking – Transaction Authentication: Biometrics in banking has increased a great deal in the last few years and is being implemented by banks throughout the world. As global financial entities become more digitally-based, banks are implementing biometric technology to improve customer and employee identity management in an effort to combat fraud, increase transaction security, and enhance customer convenience. Customers are also fed-up with identity theft and the inconveniences associated with constantly having to prove their identities. As a result, more and more customers are looking for banks that have
  • 17. biometric authentication in place prompting banks to more closely research the technology for implementation. Conclusion: Biometric identification management systems offer higher security, convenience, accountability, and accurate audit trails – all attributes that motivate businesses to research and implement the technology for their own use. We believe that as time moves forward, we will see implementation of biometric technology continue to grow and be used in even more areas that touch our lives.