PPT On Biometrics Technology for Engineering student. It contains all the basic of Biometrics. Contents are taken from different sources. I Presented it in 5th semester of B.tech. It is a nice project for engineering students. from Fingerprint to the vein scanning process and voice recognization pattern are explained in a short way.
2. CONTENT :-
What is Biometric?
History of Biometric
Biometrics Characteristics
Fingerprint Recognition
Iris Recognition
Face Recognition
Signature Recognition
Voice Recognition
Applications of Biometrics
Future prospects
Pros and Cons
Conclusion
3. What is Biometrics ?
Biometrics refers to metrics related to human
characteristics. Biometrics authentication is used in
computer science as a form of identification and access
control. It is also used to identify individuals in groups
that are under surveillance..
Biometrics refers to the automatic identification of a
person based on his or her physiological or behavioral
characteristics .
4. History…
The term "biometrics" is derived from the Greek words
bio which means (life) and metric means (to
measure).
The first known example of biometrics in practice was
a form of finger printing being used in China in the
14th century.
In the 1890,Bertillonage created a method of bodily
measurement with the criminals who repeated the
crimes with different names and looks.
After this, finger printing, which was developed by
Richard Edward Henry of Scotland Yard.
7. Fingerprint recognition (cont.)
Fingerprint Recognition is the identification by using
patterns of friction ridges and valleys on an
individual's fingertips which are unique to that
individual.
8. Fingerprint recognition steps …
Finger Capturing
Feature
extraction
Comparison
Finger information database
Referring
RecordingPresenting
Enrollment
Verification/Identification
R
e
s
u
l
t
9. Iris recognition :-
The iris is the colored ring of textured tissue that
surrounds the pupil of the eye.
The colored pattern of our irises is determined
genetically when we're in the womb but not fully
formed until we're aged about two.
Although we talk about people having "blue eyes,"
"green eyes," "brown eyes," or whatever, in reality the
color and pattern of people's eyes is extremely complex
and completely unique: the patterns of one person's
two eyes are quite different from each other and even
genetically identical twins have different iris patterns.
10. Iris recognition (cont.)
How does iris scanning work in practice?
There are two distinct stages involved in iris-scanning:-
1. Enrollment
Each person stands in front of a camera and has their eyes digitally photographed with
both ordinary light and invisible infrared. In iris recognition, infrared helps to show
up the unique features of darkly colored eyes that do not stand out clearly in ordinary
light. These two digital photographs are then analyzed by a computer that removes
unnecessary details (such as eyelashes) and identifies around 240 unique features.
These features, unique to every eye, are turned into a simple, 512-digit number
called an IrisCode® that is stored, alongside your name and other details, in a
computer database. The enrollment process is completely automatic and usually takes
no more than a couple of minutes.
2. Verification/recognition
You simply stand in front of another iris scanner and have your eye photographed
again. The system quickly processes the image and extracts your IrisCode®, before
comparing it against the hundreds, thousands, or millions stored in its database. If
your code matches one of the stored ones, you're positively identified; if not, tough
luck! It either means you're not known to the system or you're not whom you claim to
be.
11. Iris recognition steps…
Enrollment
Image acquisition
Image processing
Feature extraction
Iris signature
recorded in db
Verification
Image acquisition
Image processing
Feature extraction
Is the signature
matched with the
templates in
database
Access is granted
Identification
fails
YESNO
12. Face recognition :-
The human face plays an important role in our social interaction,
conveying people's identity. Using human face as a key to
security, the biometrics face recognition technology has received
significant attention in the past several years due to its potential
for a wide variety of applications in both law enforcement and
non-law enforcement.
As compared with other biometrics systems using
fingerprint/palm print and iris, face recognition has distinct
advantages because of its non-contact process. Face images can
be captured from a distance without touching the person being
identified, and the identification does not require interacting
with the person. In addition, face recognition serves the crime
deterrent purpose because face images that have been
recorded and archived can later help identify a person.
13. Face recognition steps :-
input
image
Extraction of
face image
Extraction of
face features
database
Verification
process
Enrolment
process
14. Signature recognition :-
Signature recognition is a behavioral biometric.
It can be operated in two different ways:
Static mode: Users write their signature on paper, digitize it through an optical
scanner or a camera, and the biometric system recognizes the signature analyzing
its shape. This group is also known as “off-line”.
Dynamic mode: Users write their signature in a digitizing tablet, which acquires
the signature in real time. Some systems also operate on smart-phones or tablets
with a capacitive screen, where users can sign using a finger or an appropriate
pen. Dynamic recognition is also known as “on-line”.
15. Signature verification process…
Dynamic information usually consists of the following
information :
The angle at which the pen is held,
The number of times the pen is lifted,
The time it takes to write the entire signature,
The pressure exerted by the person while signing.
The variations in the speed with which different parts
of the signature are written.
Dynamic
mode
16. Voice recognition :-
Speaker recognition is the identification of a person
from characteristics of voices (voice biometrics).It is
also called voice recognition.
Voice recognition is the identification using the
acoustic features of speech that have been found to
differ between individuals.
18. Applications of Biometrics :-
Access control
• Authenticate
Time and attendance management
• Hospitals
• Institutes
Airports
• Iris scan
ATMs
• Face recognition
• Fingerprint
Criminal identification
Fujitsu has developed a mouse that can verify a person’s identity
by recognizing his pattern of blood veins.
20. Advantages & Disadvantages :-
Advantages Disadvantages
Uniqueness
Time
Reduce fraud
No forgotten password
No need to carry Swipe card
No need to remember PIN or
password
Accuracy
Accountability
Costly
Facial imaging can also hinder
accurate identifications
Missing body part problem
False acceptances and rejections
The amount of comfort
The scanning of eye is fearful
The nervousness that people feel
about the scanners
identification
21. Conclusion :-
Not yet perfect.
Successful applications.
Decreasing costs and increasing convenience.
Increasing both privacy and identity security.
Biometrics is an emerging area with many
opportunities for growth.