2. Biometrics = bios + metron. Bios means life and metron
means measure.
In the terms of computer security, biometrics refers to
authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified .
A Biometrics System is a system for the automated
recognition of individuals based on their behaviour and
biological characteristics. Also called
BEHAVIOMETRICS.
Biometric-based solutions are able to provide for
confidential financial transactions and personal data
privacy
3. There two types of biometrics
1. Physiological biometrics
2. Behavioral biometrics
Depending on the context, in a biometrics system, there are two
different ways to resolve a person’s identity
I. Verification
II. Identification
VERIFICATION
Comparing a sample against a single stored template is called
verification.
IDENTIFICATION
Search a sample against a database of templates.
4. 1) Physiological biometrics :
Physiological are related to the shape of the body.
EXAMPLES :-
Handprint
Fingerprint
Retina
Face
2) Behavioral biometrics:
Behavioral are related to the behavior of a person.
EXAMPLES :-
Voice/Speech
Handwriting/Signature
Movement Patterns(i.e. typing, walking, etc.)
1) Physiological Biometrics
2) Behavioral Biometrics
5.
6. Everybody has unique handprints.
A handprint Biometric Systems
scans hand and finger sand the
data is compared with the
specimen stored for you in the
system. The user is allowed or
denied based on the result of this
verification.
Fingerprints are used in forensic
and identification for long time.
Fingerprint Biometric Systems
examine the unique
characteristics of your
fingerprints and use that
information to determine
whether or not you should be
7.
8. Retina Pattern Biometric system
uses an infrared beam to scan
your retina. Retina pattern
biometric systems examine the
unique characteristics of user’s
retina and compare that
information with stored pattern
to determine whether user should
be allowed access.
A facial recognisation system is a
computer application for
automatically identifying or
verifying a person from a digital
image or a video frame from a
video source.
9. Voice Patterns Biometric
Systems can also be used for
user authentication. Voice
Patterns Biometric Systems
examine the unique
characteristics of user’s voice.
Signature recognition is a
behavioral biometric. The
dynamics is measured as a
means of the pressure,
direction, acceleration and
the length of the strokes,
dynamics number of strokes
and their duration.
10. Keystroke Biometric Systems
examine the unique
characteristics of user’s
keystrokes and use that
information to determine
whether the user should be
allowed access.
11. • Criminal identification
• Prison security
• ATM and other Financial
Transactions
• PC/LAN Login
• Database access
• Border crossing controls
Biometrics
• Costly
• Facial imaging can also hinder
accurate identifications.
• Missing body part problem.
• False acceptances and rejections.
• The amount of comfort.
13. Time Clocks or Biometric time and attendance systems, which
are being increasingly used in various organizations to control
employee timekeeping.
Biometric safes and biometric locks, provides security to the
homeowners.
Biometric access control systems, providing strong security at
entrances.
Biometric systems are also developed for securing access to pc's
and providing single logon facilities.
Biometrics airport security devices are also deployed at some of
the world's famous airports to enhance the security standards.
14. Biometrics is a very interesting and exciting field that has be growing
exponentially in recent years (especially 2001).
While Biometric authentication can offer a high degree of security,
they are far from perfect solution.
The influences of biometric technology on society and the risks to
privacy and threat to identify will require meditation through
legislation.
The wide variety of physically unique traits our bodies give us will
soon allow us to live in a very secure password-less world.