Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. BIOMETRICS Guided By:- Mrs. Sunita Soni Mrs. Ani Thomas Mr. Pavan Patnayak Presented By:- Amit Kumar Pandey MCA 4 th Sem Roll No.- 03
  2. 2. Introduction to Biometrics <ul><li>Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.  Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice . </li></ul>
  3. 3. What is Biometrics ? <ul><li>Bio metrics is a general term used alternatively to describe a characteristics or a process:- </li></ul><ul><li>As a characteristics. </li></ul><ul><li>As a process. </li></ul>
  4. 4. Different Biometrics Modalities <ul><li>Fingerprints </li></ul><ul><li>Face </li></ul><ul><li>Hand Geometry </li></ul><ul><li>Handwriting </li></ul><ul><li>Iris </li></ul><ul><li>Retina </li></ul><ul><li>Vein </li></ul><ul><li>Voice </li></ul>
  5. 5. Uses of Biomatrics <ul><li>Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. </li></ul><ul><li>Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy . </li></ul>
  6. 6. Application area of Biomatrics <ul><li>Workstation </li></ul><ul><li>Network </li></ul><ul><li>Domain access </li></ul><ul><li>Single sign-on </li></ul><ul><li>Application logon </li></ul><ul><li>Data protection </li></ul><ul><li>Remote access to resources </li></ul><ul><li>Transaction security </li></ul><ul><li>Web security </li></ul>
  7. 7. Types of sensors <ul><li>Optics-based sensors </li></ul><ul><li>Capacitance-based sensors </li></ul><ul><li>Radio frequency (RF) sensors </li></ul>
  8. 8. Process of Biometric system <ul><li>Collection </li></ul><ul><li>Extraction </li></ul><ul><li>Comparison </li></ul><ul><li>Decision </li></ul>
  9. 9. How fingerprint scanners work <ul><li>Image capture. </li></ul><ul><li>Image processing. </li></ul><ul><li>Feature extraction. </li></ul><ul><li>Feature comparison. </li></ul>
  10. 10. How facial scanners work <ul><li>Finding faces . </li></ul><ul><li>Matching faces against a database . </li></ul><ul><li>Manually resolving 'matches' returned by the facial-scan system . </li></ul>
  11. 11. Barriers to biometrics <ul><li>Consumer acceptance </li></ul><ul><li>The competition is entrenched </li></ul><ul><li>Consumer-device cost is an issue </li></ul><ul><li>Standards are needed </li></ul>
  12. 12. Biometric technologies in use <ul><li>At the San Francisco International Airport . </li></ul><ul><li>Chase Manhattan Bank implemented biometrics . </li></ul>
  13. 13. Finger-scan companies <ul><li>AuthenTec (private) </li></ul><ul><li>The company provides biometric fingerprint sensors to the PC, wireless, PDA, access control, and automotive markets . </li></ul><ul><li>DigitalPersona (private) </li></ul><ul><li>DigitalPersona manufactures finger-scan systems for home and corporate uses </li></ul><ul><li>Identix [IDNX] </li></ul><ul><li>Identix has numerous finger-scan products for uses from forensics, to consumer-PC access, to physical-access solutions for businesses . </li></ul>
  14. 14. Facial-scan companies <ul><li>AIR Corporation (private) </li></ul><ul><li>Active Image Recognition (AIR) Corporation provides technology for finding, recognizing and matching objects and events within multimedia data, including video and photographs . </li></ul><ul><li>Viisage (private) </li></ul><ul><li>Viisage has deployed more face-scanning systems for driver's-license related functions than any other vendor . </li></ul>
  15. 15. Eye-scan companies <ul><li>Iridian Technologies (private) </li></ul><ul><li>Iridian Technologies' Private ID™ software engine. </li></ul><ul><li>LG Electronics </li></ul><ul><li>Panasonic [MC] </li></ul>
  16. 16. Companies Name <ul><li>Aditech </li></ul><ul><li>ActivCard </li></ul><ul><li>AIR Corporation </li></ul><ul><li>Atmel </li></ul><ul><li>AuthenTec </li></ul><ul><li>BAC </li></ul><ul><li>BioNetrix </li></ul><ul><li>Bioscrypt [TSX:BYT] </li></ul><ul><li>BioThentica </li></ul><ul><li>Buytel </li></ul><ul><li>CIC </li></ul><ul><li>Cogent Systems </li></ul><ul><li>DigitalPersona </li></ul><ul><li>I/O Software </li></ul><ul><li>Identix [IDNX] </li></ul><ul><li>Ultra-Scan </li></ul><ul><li>Viisage </li></ul><ul><li>Infineon [XETRA] </li></ul><ul><li>International Biometric Group </li></ul><ul><li>Iridian </li></ul><ul><li>Keyware </li></ul><ul><li>LG Electonics </li></ul><ul><li>NetNanny [NNSWF] </li></ul><ul><li>Nuance </li></ul><ul><li>OptiBrand </li></ul><ul><li>Panasonic [MC] </li></ul><ul><li>Precise </li></ul><ul><li>Printrack </li></ul><ul><li>RSI Ingersol-Rand </li></ul><ul><li>SAFLINK </li></ul><ul><li>Sagem-Morpho </li></ul><ul><li>SecuGen </li></ul><ul><li>ST Microelectronics </li></ul><ul><li>Sony [JPY] </li></ul>
  17. 17. Iris recognition uses the unique patterns in the individual’s iris, a muscle that is the colored portion on the front of the eye. Retinal recognition uses the unique pattern of blood vessels on an individual’s retina at the back of the eye. Iris Recognition :-
  18. 18. Speaker/Voice :- <ul><li>Advantages </li></ul><ul><li>Public acceptance </li></ul><ul><li>No contact required </li></ul><ul><li>Commonly available sensors(telephones, microphones ) </li></ul><ul><li>Disadvantages </li></ul><ul><li>Difficult to control sensor and channel variances that significantly impact capabilities. </li></ul><ul><li>Not sufficiently distinctive for identification over large databases . </li></ul>
  19. 19. Hand Geometry :- <ul><li>Advantages </li></ul><ul><li>Easy to capture </li></ul><ul><li>Believed to be a highly stable pattern over the adult lifespan . </li></ul><ul><li>Disadvantages </li></ul><ul><li>Use requires some training. </li></ul><ul><li>Not sufficiently distinctive for identification over large databases; usually used for verification of a claimed enrollment identity </li></ul><ul><li>System requires a large amount of physical space . </li></ul>
  20. 20. Face :- <ul><li>Advantages </li></ul><ul><li>No contact required </li></ul><ul><li>Commonly available sensors (cameras) </li></ul><ul><li>Large amounts of existing data to allow background and/or watchlist checks </li></ul><ul><li>Easy for humans to verify results </li></ul><ul><li>Disadvantages </li></ul><ul><li>Face can be obstructed by hair, glasses, hats, scarves,etc. </li></ul><ul><li>Sensitive to changes in lighting, expression, and pose Faces change over time </li></ul><ul><li>Propensity for users to provide poor-quality video images yet to expect accurate results </li></ul>
  21. 21. Iris :- <ul><li>Advantages </li></ul><ul><li>No contact required. </li></ul><ul><li>Protected internal organ; less prone to injury. </li></ul><ul><li>Believed to be highly stable over lifetime. </li></ul><ul><li>Disadvantages </li></ul><ul><li>Difficult to capture for some individuals. </li></ul><ul><li>Public myths and fears related to “scanning” the eye with a light source. </li></ul><ul><li>Cannot be verified by a human. </li></ul><ul><li>Acquisition of an iris image requires more training and attentiveness than most biometrics. </li></ul><ul><li>Lack of existing data deters ability to use for </li></ul><ul><li>background or watchlist checks </li></ul>
  22. 22. Fingerprint :- <ul><li>Advantages </li></ul><ul><li>Subjects have multiple fingers. </li></ul><ul><li>Easy to use, with some training. </li></ul><ul><li>Some systems require little space. </li></ul><ul><li>Fingerprints are unique to each finger of each individual . </li></ul><ul><li>Disadvantages </li></ul><ul><li>Public Perceptions. </li></ul><ul><li>Privacy concerns of criminal implications. </li></ul><ul><li>Health or societal concerns with touching a sensor used by countless individuals . </li></ul>