Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Bio-metrics Authentication Technique

4,335 views

Published on

Published in: Technology, Business
  • Be the first to comment

Bio-metrics Authentication Technique

  1. 1. Biometric Authentication Technique Presented By Rekha Yadav M.Sc.(Maths with Computer Application)
  2. 2. What is Authentication? Authentication is the act of confirming something what it claims to be. It is the process of giving someone identity so that he or she can access that particular application or data. For e.g.: giving identity-card to a student of an institute.
  3. 3. Three main types of Authentication available today are: • something you know, like a password, PIN, or code. • Can be easily forgotten • something you have, like a swipe card, smart card, token, or key. • Can be easily stolen • something you are, which is biometrics. • Secure, convenient & unique
  4. 4. What is Biometrics? BIO ► Life METRIC ► To Measure Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical characteristics. Biometric based authentication systems are able to provide high security against confidential financial transactions and personal data privacy. “something that you are”
  5. 5. Biometric Characteristics The common Physical characteristics are:  Fingerprint  Face  Iris  Vein pattern, and  Hand and finger geometry Behavioral characteristics are:  Keystroke dynamics  Voice  Gait, and  Signature dynamics
  6. 6. Principle & Standards Of Biometrics “Everyone in the world is unique, and this uniqueness can be used for identity verification.” Uniqueness : Distinction between individuals Permanence : Resistance to ageing Collectability : Ease to obtain a biometric for measurement. Performance : Accuracy, speed, robustness of the biometric system. Acceptability :Degree of approval of a technology. Circumvention : Anomalies in the authentication system.
  7. 7. Working of Biometrics Biometric systems uses three steps:  Enrollment: The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait.  Storage: most of the systems don't store the complete image or recording. They instead analyze your trait and translate it into a code or graph. Some systems also record this data onto a smart card that you carry with you.  Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be.
  8. 8. Enrollment & Verification in Biometric System
  9. 9. Components of Biometric System Systems uses three components:  A sensor that detects the characteristic being used for identification.  A computer that reads and stores the information.  Software that analyzes the characteristic, translates it into a graph or code and performs the actual comparisons. Biometric security systems, like the fingerprint scanner available on the IBM ThinkPad T43, is becoming more common for home use.
  10. 10. Biometric Modalities Biometric Modalities 1) 2) 3) 4) 5) Fingerprint Recognition Face Recognition Iris Recognition Voice Recognition Signature Recognition
  11. 11. 1) Finger Printings 1) Finger Printings  Fingerprint Recognition is one of the most used and familiar biometric methods. Database
  12. 12. 2) Face Recognition 2) Face Recognition Input face image Extraction of face image Extraction of face features Positive Database Negative
  13. 13. 3) Iris Recognition 3) Iris Recognition Input of face image Detection of eye regions Put iris in focus Recognition of iris pattern Accept Database Reject
  14. 14. 4) Voice Recognition 4) Voice Recognition It is the Identification using the acoustic features of speech that have been found to differ between individuals Construct voice reference template Database
  15. 15. 4) Signature Identification 4) Signature Identification   Signature identification: is the analyses of the way a user signs his or her name. The process used by a biometric system to verify a signature is called dynamic signature verification (DSV). Biometric Traits for Signature Verification •The angle at which the pen is held •The number of times the pen is lifted, •The time it takes to write the entire signature, •The pressure exerted by the person while signing, •The variations in the speed with which different parts of the signature are written. Profile Database
  16. 16. Application of Biometrics Application of Biometrics The applications of biometrics can be divided into the following three main groups.  Commercial applications  computer network login ( Fingerprint verification system)  electronic data security  e-commerce  Internet access  ATM (face recognition)  credit card  medical records management, and distance learning ( hand geometry systems)  Government applications  national ID card  driver’s license  social security  border control, and passport control.  Forensic applications  corpse identification  criminal investigation  terrorist identification  parenthood determination, and missing children.
  17. 17. Advantages Of Biometric System Advantages Of Biometric System directly authenticates the person difficult to steal; thereby making biometrics authentication very strong. portable, and is unlikely to be lost. user cannot share or forget his retina or fingerprint, while a password and username are easily forgotten. User friendliness Comfort Accuracy
  18. 18. Disadvantages of Biometrics  Costly  Facial imaging can also hinder accurate identifications.  Missing body part problem  False acceptances and rejections.  The scanning of eye is fearful.  Ethical issues  Personal data used for something other than its advertised purpose.  Privacy issues  Who can access data  Misuse of personal data
  19. 19. Future Prospects Future Prospects Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are: 1. Ear shape identification. 2. Body odor identification. 3. Body salinity identification. 4. EEG Fingerprint
  20. 20. Conclusion Conclusion Conclusion Not perfect yet. Successful applications. Decreasing costs and increasing convenience. Increasing both privacy and identity security. The field of biometrics is evolving. Benefit from this technology .
  21. 21. Thank You!

×