SlideShare a Scribd company logo
1 of 21
Download to read offline
Biometric Identification
systems: introduction
Dr. Suryakant Mishra
Assistant Professor (for Forensic Science)
Department of Zoology
Kurukshetra University
The term "biometrics" is derived from the Greek words
bio (life) and metric (to measure).
“Biometric technologies” are automated methods of
verifying or recognizing the identity of a living person
based on a physiological or behavioral characteristic.
These characteristics are unique to individuals hence can
be used to verify or identify a person.
INTRODUCTION
Common methods of identification:
• An individual’s identity can be established by object or token that
the person possesses, something that the person knows, or a
physical characteristic of the person.
• Keys, identification cards, and credit and debit cards are all
examples of objects that can be used to establish the identity and
authorize our access to our cars, workplaces, and credit.
• Physical objects are often effective means of identification, but
they can be lost, stolen, copied, or counterfeited.
Problems with current security systems
• With increasing use of IT technology and need to protect data,
we have multiple accounts/passwords.
• We can not remember so many passwords, so we end up
using things to create them like birthdays, wife/ husband /friends
name etc.
• Its is easy to crack passwords, because most of our passwords
are weak.
What Kinds of Information Can Be Used by Biometric
Systems to Identify Individuals?
Identification can be based on physiological characteristics – such
as fingerprints, the shape of the hand, or the characteristics of the
face or eye – or on behavioral characteristics – such as voice
patterns, signature, or typing dynamics.
 Facial imaging and
thermo-grams
 Fingerprint
 Voice recognition
 Palm-print
 Hand Geometry
 Iris recognition.
 Retina Scan
 DNA
 Signatures recognition
 Gait pattern
 Key strokes/typing dynamics
 Odour
Different Biometrics systems
A System Model of biometrics system
The operations performed by a generic biometric system are the
capture and storage of enrollment (reference) biometric samples
and the capture of new questioned samples and their comparison
with corresponding reference samples.
A biometric authentication system divided into five subsystems:
data collection, transmission, signal processing, decision and data
storage.
1. Data Collection
Biometric systems begin with the measurement of a
behavioral/physiological Characteristic.
The user’s characteristic must be presented to a sensor.
The presentation of any biometric characteristic to the sensor
introduces a behavioral (and, consequently, psychological)
component to every biometric method.
Fig: A System Model of biometrics system
2.Data Transmission
• Some biometric systems collect data at one location but
store and/or process it at another. Such systems require data
transmission.
• Standards currently exist for the compression of
fingerprints facial images (JPEG), and voice data.
Signal Processing -acquired and transmitted a biometric
characteristic, for matching with other like measures.
Signal-processing subsystem complete four tasks:
1. Segmentation,
2. Feature extraction,
3. Quality control, and
4. Pattern matching.
3. Signal Processing
4. Storage
After signal processing the remaining subsystem stored the data.
There will be one or more forms of storage used, depending
upon the biometric system.
Templates or models from enrolled users will be stored in a
database for comparison by the pattern matcher to incoming
feature samples.
Internal or external device could be used for data storage.
5. Decision
The decision subsystem implements system policy by directing
the database search, determines “matches” or “non-matches”
based on the distance or similarity measures received from the
pattern matcher, and ultimately makes an “accept/reject”
decision based on the system policy.
Biometrics and privacy.
 Unlike more common forms of identification, biometric
measures contain no personal information and are more difficult
to forge or steal.
 Biometric measures can be used in place of a name or Social
Security number to secure anonymous transactions.
 Some biometric measures (face images, voice signals and
“latent” fingerprints left on surfaces) can be taken without a
person’s knowledge, but cannot be linked to an identity without a
pre-existing invertible database.
 A Social Security or credit card number, and sometimes even a
legal name, can identify a person in a large population.
 Like telephone and credit card information, biometric
databases can be searched outside of their intended purpose
by court order.
 Unlike credit card, telephone or Social Security numbers,
biometric characteristics change from one measurement to
the next.
 Searching for personal data based on biometric measures is
not as reliable or efficient as using better identifiers, like
legal name or Social Security number.
 Biometric measures are not always secret, but are
sometimes publicly observable and cannot be revoked if
compromised.
Limitation of biometric systems:
Change in biometric feature:
Behavioral biometric information may change over time, the process
used to judge whether two biometrics come from the same
individual is difficult and may be prone to error.
Vulnerability to fraud:
The types of fraud that may be committed depend on whether the
application is cooperative or non cooperative.
In cooperative applications (i.e., the impostor tries to obtain a false
match), technologies may be fooled by devices such as pictures, tape
recordings, or artificial limbs.
Accuracy:
There are two types of error that a biometric identification
system can make:
(1) it can assess that two samples from different individuals
are the same, and
(2) it can assess that two samples from the same individuals
are different.
The first of these errors is termed a false match or a false
accept error. The second of these errors is termed a false
non-match or a false reject error.
Applicability to entire population.
There are some people who cannot provide the biometric
information required by the technology.
Example : roughly .5 to 1% of the population cannot provide
finger images, either because of accident or injury, or because
their fingerprints distorted due to their occupation or age.
Terminology
Identification:
Match a person’s biometrics against a database to figure out his
identity by finding the closest match.
Verification:
 The person claims to be ‘Deepak’, system must match and
compare his biometrics with ‘Deepak’s stored Biometrics data.
 If they match, then user is ‘verified’ or authenticated that he is
indeed ‘Deepak’
 Typically called as 1:1 matching.
References
1. James Wayman, Anil Jain, Davide Maltoni and Dario Maio. (2005)
Biometric Systems Technology, Design and Performance Evaluation.
2. Paul J. Sticha, J. Patrick Ford. 1999. Introduction To Biometric
Identification Technology: Capabilities and Applications to the
Food Stamp Program. R. Lewis & Company, Inc.
THANK YOU

More Related Content

Similar to Biometric Identification system.pptx

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical educationArhind Gautam
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptssuser7ec6af
 
Be presentation (how does bio metric works)
Be presentation (how does bio metric works)Be presentation (how does bio metric works)
Be presentation (how does bio metric works)Muhammad Zubair
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 

Similar to Biometric Identification system.pptx (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
MAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdfMAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdf
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
 
Be presentation (how does bio metric works)
Be presentation (how does bio metric works)Be presentation (how does bio metric works)
Be presentation (how does bio metric works)
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Biometric Identification system.pptx

  • 1. Biometric Identification systems: introduction Dr. Suryakant Mishra Assistant Professor (for Forensic Science) Department of Zoology Kurukshetra University
  • 2. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). “Biometric technologies” are automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioral characteristic. These characteristics are unique to individuals hence can be used to verify or identify a person. INTRODUCTION
  • 3. Common methods of identification: • An individual’s identity can be established by object or token that the person possesses, something that the person knows, or a physical characteristic of the person. • Keys, identification cards, and credit and debit cards are all examples of objects that can be used to establish the identity and authorize our access to our cars, workplaces, and credit. • Physical objects are often effective means of identification, but they can be lost, stolen, copied, or counterfeited.
  • 4. Problems with current security systems • With increasing use of IT technology and need to protect data, we have multiple accounts/passwords. • We can not remember so many passwords, so we end up using things to create them like birthdays, wife/ husband /friends name etc. • Its is easy to crack passwords, because most of our passwords are weak.
  • 5. What Kinds of Information Can Be Used by Biometric Systems to Identify Individuals? Identification can be based on physiological characteristics – such as fingerprints, the shape of the hand, or the characteristics of the face or eye – or on behavioral characteristics – such as voice patterns, signature, or typing dynamics.
  • 6.  Facial imaging and thermo-grams  Fingerprint  Voice recognition  Palm-print  Hand Geometry  Iris recognition.  Retina Scan  DNA  Signatures recognition  Gait pattern  Key strokes/typing dynamics  Odour Different Biometrics systems
  • 7. A System Model of biometrics system The operations performed by a generic biometric system are the capture and storage of enrollment (reference) biometric samples and the capture of new questioned samples and their comparison with corresponding reference samples. A biometric authentication system divided into five subsystems: data collection, transmission, signal processing, decision and data storage.
  • 8. 1. Data Collection Biometric systems begin with the measurement of a behavioral/physiological Characteristic. The user’s characteristic must be presented to a sensor. The presentation of any biometric characteristic to the sensor introduces a behavioral (and, consequently, psychological) component to every biometric method.
  • 9. Fig: A System Model of biometrics system
  • 10. 2.Data Transmission • Some biometric systems collect data at one location but store and/or process it at another. Such systems require data transmission. • Standards currently exist for the compression of fingerprints facial images (JPEG), and voice data.
  • 11. Signal Processing -acquired and transmitted a biometric characteristic, for matching with other like measures. Signal-processing subsystem complete four tasks: 1. Segmentation, 2. Feature extraction, 3. Quality control, and 4. Pattern matching. 3. Signal Processing
  • 12. 4. Storage After signal processing the remaining subsystem stored the data. There will be one or more forms of storage used, depending upon the biometric system. Templates or models from enrolled users will be stored in a database for comparison by the pattern matcher to incoming feature samples. Internal or external device could be used for data storage.
  • 13. 5. Decision The decision subsystem implements system policy by directing the database search, determines “matches” or “non-matches” based on the distance or similarity measures received from the pattern matcher, and ultimately makes an “accept/reject” decision based on the system policy.
  • 14. Biometrics and privacy.  Unlike more common forms of identification, biometric measures contain no personal information and are more difficult to forge or steal.  Biometric measures can be used in place of a name or Social Security number to secure anonymous transactions.  Some biometric measures (face images, voice signals and “latent” fingerprints left on surfaces) can be taken without a person’s knowledge, but cannot be linked to an identity without a pre-existing invertible database.  A Social Security or credit card number, and sometimes even a legal name, can identify a person in a large population.
  • 15.  Like telephone and credit card information, biometric databases can be searched outside of their intended purpose by court order.  Unlike credit card, telephone or Social Security numbers, biometric characteristics change from one measurement to the next.  Searching for personal data based on biometric measures is not as reliable or efficient as using better identifiers, like legal name or Social Security number.  Biometric measures are not always secret, but are sometimes publicly observable and cannot be revoked if compromised.
  • 16. Limitation of biometric systems: Change in biometric feature: Behavioral biometric information may change over time, the process used to judge whether two biometrics come from the same individual is difficult and may be prone to error. Vulnerability to fraud: The types of fraud that may be committed depend on whether the application is cooperative or non cooperative. In cooperative applications (i.e., the impostor tries to obtain a false match), technologies may be fooled by devices such as pictures, tape recordings, or artificial limbs.
  • 17. Accuracy: There are two types of error that a biometric identification system can make: (1) it can assess that two samples from different individuals are the same, and (2) it can assess that two samples from the same individuals are different. The first of these errors is termed a false match or a false accept error. The second of these errors is termed a false non-match or a false reject error.
  • 18. Applicability to entire population. There are some people who cannot provide the biometric information required by the technology. Example : roughly .5 to 1% of the population cannot provide finger images, either because of accident or injury, or because their fingerprints distorted due to their occupation or age.
  • 19. Terminology Identification: Match a person’s biometrics against a database to figure out his identity by finding the closest match. Verification:  The person claims to be ‘Deepak’, system must match and compare his biometrics with ‘Deepak’s stored Biometrics data.  If they match, then user is ‘verified’ or authenticated that he is indeed ‘Deepak’  Typically called as 1:1 matching.
  • 20. References 1. James Wayman, Anil Jain, Davide Maltoni and Dario Maio. (2005) Biometric Systems Technology, Design and Performance Evaluation. 2. Paul J. Sticha, J. Patrick Ford. 1999. Introduction To Biometric Identification Technology: Capabilities and Applications to the Food Stamp Program. R. Lewis & Company, Inc.