2. Authentication depends on :-
• What we have :- Smart cards
• What we know :- Passwords
• What we are :- Biometrics
3. Lets Define !
“A biometric is a physiological
or behavioral characteristic of a
human being that can distinguish
one person from another and that
theoretically can be used for
identification or verification of
identity.”
5. Biometric Authentication Process :-
Two step process:-
• Acquisition
• Creation of Master characteristics
• Storage of Master characteristics
Comparison of data
•Acquisition(s)
•Comparison
•Decision
Storing of Data
6. Application Categories :-
Biometric applications available today
are categorized into 2 sectors :-
Psychological :- Iris, Fingerprints,
Hand, Retinal and Face recognition
Behavioral :- Voice, Typing pattern,
Signature
10. Retinal Scanning :-
User looks straight into retinal reader
Scan using low intensity infrared light
Beam of light traces a standardized path
on the retina
retinal blood vessels absorb light more
readily than the surrounding tissue
The pattern is digitized and stored in
a database
11. Iris Scanner :-
Iris recognition uses camera technology
with subtle infrared illumination
It acquire images of the detail rich
structures of the iris
Digital templates encoded from these
patterns by mathematical and statistical
algorithms allow unambiguous positive
identification of an individual
12. Face recognition :-
Facial recognition algorithms identify facial
features by extracting landmarks, or features,
from an image of the subject's face.
These features are then used to search for other
images with matching features.
A probe image is then compared with the face
data.
Recognition algorithms can be divided into two
main approaches :-
• geometric :- looks at distinguishing features
• photometric :- statistical approach that distils
an image into values and compares the values
with templates to eliminate variances.
16. Voice Recognition :-
It is identification of a person
from characteristics of voice.
Characteristics like voice pitch,
speaking style, pauses etc.
Each voice recognition system
has two phases:
• Enrolment
• Verification
17. Enrolment :-
The speaker's voice is recorded.
A number of features are extracted
to form a voice print.
Verification :-
A speech sample or "utterance" is
compared against a previously
created voice print
18. Signature Recognition :-
Signature verification analyzes
the way a user signs her name.
Signature measures (dynamic)
Speed
Pressure
Handwriting Style
19. Two types of digital handwritten
signature authentication :-
Static :- Comparison between one scanned
signature and another scanned signature, or
a scanned signature against an ink signature
using advance algorithms.
Dynamic :- Data is captured along with the
X,Y,T and P Coordinates of the signor from
the signing device. To create a biometric
template from which dynamic signatures can
be authenticated
20. Current applications :-
Banks
Mobile Phones
Attendance System
Forensic Science Department
Immigration facilities across
countries
21. Conclusion :-
While biometrics technology provides a strong user
authentication solution, there are other variables to be
considered in the authentication protocol. When a
high level of security is needed, it is recommended
that you combine other authentication factors with
biometrics. When you combine what you know, what
you have, and what you are, you will have achieved
the highest level of security across multiple
applications and systems. According to information
made available by the International Biometrics
Group, “there is no one right biometrics technology
for every application.”