MY PRESENTATION• INTRODUCTION• HISTORY• WORKING PROCESS• TECHNOLOGIES• ADVANTAGES & DIS-ADVANTAGES• CONCLUSION• BIBLIOGRAPHY
INTRODUCTION• Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.• As the level of security decreases and transaction fraud increases, the need for highly secure identification and personal verification technologies is more.• Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy.
HISTORY• The term "biometrics" is derived from the Greek words bio (life) and metric (to measure).• The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century by “Joao de Barros.”• “Bertillonage” a method of bodily measurement was used by police authorities.• The police then used finger printing, which was developed by Richard Edward Henry of Scotland Yard.
WHY BIOMETRICS…?• Convenient• Passwords are not user-friendly• Perceived as more secured• Passive identification
WORKINGAll biometric systems works in a four-stage process that consists of the following steps: • Capture: A biometric system collects the sample of biometric features like fingerprint, voice etc of the person who “LOGGS” in. • Extraction: The data extraction is done uniquely from the sample and a template is created for unique features. Templates stores in digital biometric code format. • Comparison: The template is then compared with a new sample. • Match/non-match: The system then decides whether the features extracted from the new sample are a match or a non-match with the template. When identity needs checking, the person interacts with the biometric system, a new biometric sample is taken and compared with the template.
TECHNOLOGIES• Identification And Verification Systems Identification:Search a sample against a database of templates. Typical application: identifying fingerprints Verification:Compare a sample against a single stored template Typical application: voice lock
METHODSBIOMETRIC METHODS:1)Behavioral Biometrics a)Keystroke or Typing Recognition b)Speaker Identification or Recognition2)Physical Biometrics a)Fingerprint Identification or Recognition b)Speaker or Voice Authentication c)Hand or Finger Geometry Recognition d) Facial Recognition
BEHAVIORAL BIOMETRICS• Used for verification purpose• Keystroke or Typing Recognition:Keystroke recognition measures the characteristics of an individual’s typing patterns, including the time spacing of words. It can be used for identifying people who may create inappropriate email or conduct.• Speaker Identification or Recognition: Speaker identification and recognition is used to discover an unknown speaker’s identity based on patterns of voice pitch and speech style. Behavioral patterns of a voice differ with every individual.
PHYSICAL BIOMETRICS• Used for Identification purpose• Fingerprint Identification or Recognition: This type of biometrics compares two fingerprints to determine identification.• Speaker or Voice Authentication: Speaker or voice authentication is the analysis of vocal behavior by matching it to a voice model template• Hand or Finger Geometry Recognition:The method uses 3D analysis of the finger for tracking and identification purposes.• Facial Recognition: Facial recognition uses algorithms to analyze features. These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
ADVANTAGES• Increase security• Eliminate problems caused by lost IDs or forgotten passwords• Reduce password administration costs.• Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN?• Replace hard-to-remember passwords which may be shared or observed.
DISADVANTAGES• The finger print of those people working in Chemical industries are often affected.• It is found that with age, the voice of a person differs.• For people affected with diabetes, the eyes get affected resulting in differences.• Biometrics is an expensive security solution.
CONCLUSION• Biometrics is a very interesting and exciting field that has be growing exponentially in recent years (especially 2001).• The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world