PROF.V.B.SHAH INSTITUTE OF MANAGEMENT & R.V.PATEL COLLEGE OF COMMERCE (ENG.MED.) & V.L.SHAH COLLEGE OF COMMERCE
(GUJ.MED.) &
SUTEX BANK COLLEGE OF COMPUTER APPLICATIONS & SCIENCE, AMROLI
VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT
Submitted By
Mr. Prince Finaviya -
71
Guided By
Asst. Prof. Mansi
Shah
CONTENT
• Introduction
• What is a biometric?
• Method of verification
• Fingerprint recognition
• Verification & authentication
• Applications area of biometric
• Advantages of biometrics
• Disadvantages of biometrics
• Reference
INTRODUCTION
• Fingerprint authentication technology widely used now days for security
reason.
• Many system want first identify user then give access to use the system .
• Identification process are easy to use now days . just because of fingerprint
authentication.
• Fingerprints have been accepted as the most common form of biometrics
authentication today.
• Every human beings fingerprint is unique. Each fingerprint has a unique
characteristic and pattern that is made up of lines and spaces.
• The lines are called ridges while the spaces between the ridges are called
valleys. These patterns of ridges and valleys are used to match the
fingerprint for verification and authentication.
• There are about one billion possible minutiae combinations on a
fingerprint; since there are about 5 billion people inhabiting the earth, and
each has ten fingers, this means that statistically it is likely that fifty
people on earth share a fingerprint”.
• In identification process, an individual presents a sample to the biometric
system during enrolment. The biometric system then attempts to compare
the sample with the database which has samples stored in it. This is one-
to-many form of comparison. The identification process is further divided
into positive identification and negative identification.
WHAT IS BIOMETRIC ?
• Biometrics are automated methods of identifying a
person or verifying the identity of a person based on
a physiological or behavioural characteristic.
Biometrics as authentication
Something You Know
Something You Have
Something You Are
• Can be combined with other tools to form more
secure, easier to use verification solutions.
• Recognizes individuals definitively.
METHOD OF VERIFICATION
There are two methods of verification for security.
Psychological verification :
Verification of the organs of the human being, which will have unique identification.
There are five types of verifications.
These are:
Fingerpri
nt
Handpri
nt
Face
measurement
Retinal
scans
DNA
analysis
Finger print
It involves the user placing his finger over a glass-plate, which resides
over a high-resolution camera, which uses optical or electromagnetic means
to take its snapshot.
Handprint
It compares a 3D image of the users hand to that present in the
system database. It is somewhat similar to finger print verification.
Face measurement
measuring this is as simple as taking a picture and analyzing the image
from a security video capture. This technique enables the computer to use
your face as your password and matching these to an existing database
Retinal scans
It involves imaging of the blood vessels in the retina of the eye when
infrared light of a certain frequency and wavelength is incident upon it. This
energy is absorbed by the blood vessels is different in different individuals.
DNA analysis
It involves in checking the dna pattern of a human used when physical
characteristics are unrecognizable
• This is one biometric that is judicially accepted. No human have identified
similar DNA patterns except in twins.
Behavioural verification
this involves in oral thing done by the individual.
There are 3 types of behavioral verifications,
Typing
Signature
Voice
Typing
Some systems measure things you do in addition to the things
you are, you will notice that your typing has a certain pattern. Some
letters follow others in quick succession, while others take longer.
Signature
Some qualities looked into include acceleration rates, direction, and
pressure and stroke length. Here mainly concentrate on pressures. This
pressures stored in back end for future significations.
Voice
It involves in the recognition of the voice of the individual.
FINGERPRINT RECOGNITION
• This is a technique used to match and identify unique finger prints that might
need to be stored and then accessed in a database.
WHY FINGERPRINT RECOGNITION?
Pin's and passwords may be forgotten
The fingerprints in twins are not the same.
Relies on the concept that no two people have identical fingerprints.
More secure.
A person's fingerprint will not naturally change structure after about one
year after birth
FINGERPRINT RECOGNITION SYSTEMS
Fingerprint recognition system is a free tool that will recognize and verify
fingerprints.
Fingerprint identification system is a biometric identification (id) methodology that
uses digital imaging technology to obtain, store, and analyze fingerprint data.
The three main functions of fingerprint recognition systems are:
1) Acquisition of fingerprints
2) Derivation of characteristics and
3) Matching
FINGERPRINT SENSORS
Fingerprint scanners are security systems of biometrics. They are now used
in police stations, security industries and most recently, on computers.
A fingerprint sensor is an electronic device used to capture a digital image of
the fingerprint pattern. The captured image is called a live scan.
There are two types of fingerprint scanners:
1. The optical scanner
optical fingerprint imaging involves capturing a digital image of
the print using visible light.
2. The ultrasonic scanner
Ultrasonic sensors make use of the principles of medical ultra
sonography in order to create visual images of the fingerprint
VERIFICATION AND AUTHENTICATION
This refers to the automated method of verifying a match between two
human fingerprints.
The analysis of fingerprints for matching purposes generally are of two types
1)patterns
The three basic patterns of fingerprint ridges
they are:
A) arch
B) loop
C) whorl
Arch:
the ridges enter from one side of the finger, rise in the center forming an arc,
and then exit the other side of the finger.
Loop:
the ridges enter from one side of a finger and then exit on that same side.
2)Minutia
The major minutia features of fingerprint ridges are
a) ridge ending
b) bifurcation.
C) short ridge (dot).
A) ridge ending
The ridge ending is the point at which a ridge terminates
c) Short ridges
Short ridges (or dots) are ridges which are significantly shorter than the
average ridge length on the fingerprint.
APPLICATION AREA OF BIOMETRIC
o Fingerprint based biometrics has primarily been used to secure entry
devices for building door locks and computer network access.
o Perhaps one of the most common uses of biometric technology is
smartphone security. Apple were the first to introduce the touch ID solution
using fingerprint recognition technology and since then, mobile phone
security has evolved to utilize a number of biometric technologies including
facial recognition, iris recognition and voice recognition. A small number of
banks use fingerprint readers for authorization at atms.
o Grocery stores are experimenting with a fingerprint scan checkout that
automatically recognizes and bills a registered user’s credit card or debit
account.
ADVANTAGES OF BIOMETRICS
o It provide good security mechanism than all other security methods
o It never fails in security constraints.
o In public locations such as banks and airports a large number of people
transit every day including known criminals. Face recognition systems
attached to video surveillance systems are supposed to help catch them.
o Fairly small storage space is required for the biometric template, reducing
the size of the database required.
o It is one of the most developed biometrics, with more history, research, and
design.
DISADVANTAGES OF BIOMETRICS
o It needs high memory space in the back end.
o Collect data for security is difficult
o Sometimes fails the security with right users
o Any time data loose in database high effect for security mechanism.
o So many equipment’s are needed for provide this technology.
o It highly expensive
o Facial imaging can also hinder accurate identifications.
o Missing body part problem.