SlideShare a Scribd company logo
1 of 22
Submitted by:-
Isha Ranjan
12EARIT026
Information Technology
Authentication depends on :-
• What we have :- Smart cards
• What we know :- Passwords
• What we are :- Biometrics
Lets Define !
“A biometric is a physiological
or behavioral characteristic of a
human being that can distinguish
one person from another and that
theoretically can be used for
identification or verification of
identity.”
Why Biometrics?
Identity thefts
Something we know can be
stolen
Predicted or hacked
Reliability on manual
verification
Biometric Authentication Process :-
Two step process:-
• Acquisition
• Creation of Master characteristics
• Storage of Master characteristics
Comparison of data
•Acquisition(s)
•Comparison
•Decision
Storing of Data
Application Categories :-
Biometric applications available today
are categorized into 2 sectors :-
Psychological :- Iris, Fingerprints,
Hand, Retinal and Face recognition
Behavioral :- Voice, Typing pattern,
Signature
Fingerprint techniques :-
Optical
Capacitive
Ultrasonic
Fingerprint recognition :-
 Divides print into
loops, whorls and
arch
 Calculates minutiae
points (ridge endings)
 Comparisons
 Authentication
Storage of Master Characteristics :-
Retinal Scanning :-
 User looks straight into retinal reader
 Scan using low intensity infrared light
 Beam of light traces a standardized path
on the retina
 retinal blood vessels absorb light more
readily than the surrounding tissue
 The pattern is digitized and stored in
a database
Iris Scanner :-
 Iris recognition uses camera technology
with subtle infrared illumination
 It acquire images of the detail rich
structures of the iris
 Digital templates encoded from these
patterns by mathematical and statistical
algorithms allow unambiguous positive
identification of an individual
Face recognition :-
 Facial recognition algorithms identify facial
features by extracting landmarks, or features,
from an image of the subject's face.
 These features are then used to search for other
images with matching features.
 A probe image is then compared with the face
data.
 Recognition algorithms can be divided into two
main approaches :-
• geometric :- looks at distinguishing features
• photometric :- statistical approach that distils
an image into values and compares the values
with templates to eliminate variances.
Geometric :-
Photometric :-
Statistical approach
that distils an image
into values and
compares the values
with templates to
eliminate variances.
Behavioral :-
Voice
Signature
Typing pattern
Voice Recognition :-
 It is identification of a person
from characteristics of voice.
 Characteristics like voice pitch,
speaking style, pauses etc.
 Each voice recognition system
has two phases:
• Enrolment
• Verification
Enrolment :-
 The speaker's voice is recorded.
 A number of features are extracted
to form a voice print.
Verification :-
 A speech sample or "utterance" is
compared against a previously
created voice print
Signature Recognition :-
 Signature verification analyzes
the way a user signs her name.
 Signature measures (dynamic)
 Speed
 Pressure
Handwriting Style
Two types of digital handwritten
signature authentication :-
 Static :- Comparison between one scanned
signature and another scanned signature, or
a scanned signature against an ink signature
using advance algorithms.
 Dynamic :- Data is captured along with the
X,Y,T and P Coordinates of the signor from
the signing device. To create a biometric
template from which dynamic signatures can
be authenticated
Current applications :-
 Banks
 Mobile Phones
 Attendance System
 Forensic Science Department
 Immigration facilities across
countries
Conclusion :-
While biometrics technology provides a strong user
authentication solution, there are other variables to be
considered in the authentication protocol. When a
high level of security is needed, it is recommended
that you combine other authentication factors with
biometrics. When you combine what you know, what
you have, and what you are, you will have achieved
the highest level of security across multiple
applications and systems. According to information
made available by the International Biometrics
Group, “there is no one right biometrics technology
for every application.”
Authentication using Biometrics

More Related Content

What's hot

Biometrics (Distributed computing)
Biometrics (Distributed computing)Biometrics (Distributed computing)
Biometrics (Distributed computing)Sri Prasanna
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology NEHA SINGH
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Girish Kengar
 

What's hot (6)

Biometrics (Distributed computing)
Biometrics (Distributed computing)Biometrics (Distributed computing)
Biometrics (Distributed computing)
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Access control system
Access control systemAccess control system
Access control system
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Biometrics
BiometricsBiometrics
Biometrics
 

Similar to Authentication using Biometrics

SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasTenet Systems Pvt Ltd
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Advancing Security The Biometric Access Control System.pdf
Advancing Security The Biometric Access Control System.pdfAdvancing Security The Biometric Access Control System.pdf
Advancing Security The Biometric Access Control System.pdfStar Link Communication Pvt Ltd
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric PresentationAnand Yadav
 

Similar to Authentication using Biometrics (20)

Biometrics
BiometricsBiometrics
Biometrics
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Advancing Security The Biometric Access Control System.pdf
Advancing Security The Biometric Access Control System.pdfAdvancing Security The Biometric Access Control System.pdf
Advancing Security The Biometric Access Control System.pdf
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Hisplus Biometrics
Hisplus Biometrics Hisplus Biometrics
Hisplus Biometrics
 

Authentication using Biometrics

  • 2. Authentication depends on :- • What we have :- Smart cards • What we know :- Passwords • What we are :- Biometrics
  • 3. Lets Define ! “A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.”
  • 4. Why Biometrics? Identity thefts Something we know can be stolen Predicted or hacked Reliability on manual verification
  • 5. Biometric Authentication Process :- Two step process:- • Acquisition • Creation of Master characteristics • Storage of Master characteristics Comparison of data •Acquisition(s) •Comparison •Decision Storing of Data
  • 6. Application Categories :- Biometric applications available today are categorized into 2 sectors :- Psychological :- Iris, Fingerprints, Hand, Retinal and Face recognition Behavioral :- Voice, Typing pattern, Signature
  • 8. Fingerprint recognition :-  Divides print into loops, whorls and arch  Calculates minutiae points (ridge endings)  Comparisons  Authentication
  • 9. Storage of Master Characteristics :-
  • 10. Retinal Scanning :-  User looks straight into retinal reader  Scan using low intensity infrared light  Beam of light traces a standardized path on the retina  retinal blood vessels absorb light more readily than the surrounding tissue  The pattern is digitized and stored in a database
  • 11. Iris Scanner :-  Iris recognition uses camera technology with subtle infrared illumination  It acquire images of the detail rich structures of the iris  Digital templates encoded from these patterns by mathematical and statistical algorithms allow unambiguous positive identification of an individual
  • 12. Face recognition :-  Facial recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face.  These features are then used to search for other images with matching features.  A probe image is then compared with the face data.  Recognition algorithms can be divided into two main approaches :- • geometric :- looks at distinguishing features • photometric :- statistical approach that distils an image into values and compares the values with templates to eliminate variances.
  • 14. Photometric :- Statistical approach that distils an image into values and compares the values with templates to eliminate variances.
  • 16. Voice Recognition :-  It is identification of a person from characteristics of voice.  Characteristics like voice pitch, speaking style, pauses etc.  Each voice recognition system has two phases: • Enrolment • Verification
  • 17. Enrolment :-  The speaker's voice is recorded.  A number of features are extracted to form a voice print. Verification :-  A speech sample or "utterance" is compared against a previously created voice print
  • 18. Signature Recognition :-  Signature verification analyzes the way a user signs her name.  Signature measures (dynamic)  Speed  Pressure Handwriting Style
  • 19. Two types of digital handwritten signature authentication :-  Static :- Comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature using advance algorithms.  Dynamic :- Data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. To create a biometric template from which dynamic signatures can be authenticated
  • 20. Current applications :-  Banks  Mobile Phones  Attendance System  Forensic Science Department  Immigration facilities across countries
  • 21. Conclusion :- While biometrics technology provides a strong user authentication solution, there are other variables to be considered in the authentication protocol. When a high level of security is needed, it is recommended that you combine other authentication factors with biometrics. When you combine what you know, what you have, and what you are, you will have achieved the highest level of security across multiple applications and systems. According to information made available by the International Biometrics Group, “there is no one right biometrics technology for every application.”