Biometrics

7,715 views

Published on

Biometrics

Published in: Education, Technology
0 Comments
6 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
7,715
On SlideShare
0
From Embeds
0
Number of Embeds
46
Actions
Shares
0
Downloads
679
Comments
0
Likes
6
Embeds 0
No embeds

No notes for slide

Biometrics

  1. 1. WELCOME
  2. 2. BIOMETRICS Presented By, Aleena P.S. S2 MCA
  3. 3. Introduction <ul><li>Biometrics is the study of methods for uniquely recognizing humans based on some physical and behavioral traits. </li></ul><ul><li>Biometric characteristics can be divided in two main classes: </li></ul><ul><li>Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent. </li></ul><ul><li>Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice . </li></ul>
  4. 4. Fields of biometrics <ul><li>Fingerprint - from a print made by an impression of ridges in the skin of a finger. </li></ul><ul><li>Face recognition – scanning a persons face and matching it with a library of known faces. </li></ul><ul><li>Iris scanning- scanning the iris. The structure of iris is distinct. </li></ul><ul><li>Signature recognition – scanning a person’s signature and matching it with known signatures. </li></ul><ul><li>Voice recognition – identification by electronically recognizing and graphically representing a person’s voice. </li></ul>
  5. 5. Operation and performance <ul><li>First the physical and behavioral characteristics are obtained from a person. </li></ul><ul><li>This information is then passed to the database by creating a digital representation or template. </li></ul><ul><li>In order to use the system ,the biometrics of the person is captured again and processed to create a digital templates. </li></ul><ul><li>Then the templates now generated and those in the database are compared. </li></ul><ul><li>If a match occurs then system will allow the user to log in. </li></ul><ul><li>Otherwise it will never allow the user to login. </li></ul><ul><li>This enables authentication. </li></ul><ul><li>performance is mainly measured in terms of </li></ul><ul><li>FAR- false accept rate </li></ul><ul><li>FRR- false reject rate. </li></ul>
  6. 6. <ul><li>FAR measures the percentage of invalid users that is incorrectly accepted as genuine users. </li></ul><ul><li>FRR measures percentage of valid users who are rejected as imposters. </li></ul><ul><li>One of the most common measures of real world biometric system is the rate at which both accept and reject rate are equal ie, the equal error rate (ERR) or cross over error rate (CER). The lower the ERR or CER ,the more accurate the system is considered to be. </li></ul>
  7. 7. Facial recognition <ul><li>During 1964 and 1965 ,Woody Bledsoe, Helen Chan Wolf and Charles Bisson introduced this technology. </li></ul><ul><li>Face recognition works by using a computer to analyze a subject's facial structure. </li></ul><ul><li>Face recognition software takes a number of points and measurements, including the distances between key characteristics such as eyes, nose and mouth, angles of key features such as the jaw and forehead, and lengths of various portions of the face. </li></ul><ul><li>Using all of this information, the program creates a unique template incorporating all of the numerical data. </li></ul><ul><li>This template may then be compared to enormous databases of facial images to identify the subject. </li></ul><ul><li>Good biometric software then produces a number of potential matches, rating each based on a numeric score of how similar the match is. </li></ul>
  8. 8. The image on the left shows his normal facial expressions, and the image on the right shows the temperature changes when he lied.
  9. 9. Some Images . . . Finger print scanning Iris scanning
  10. 10. Fingerprint Technology <ul><li>Most commonly used method. </li></ul><ul><li>Features such as a person’s gait, face, or signature may change with passage of time and may be fabricated or imitated. However, a fingerprint is completely unique to an individual and stayed unchanged for lifetime. </li></ul><ul><li>Fingerprint identification process consists of two essential procedures: enrollment and authentication. </li></ul>
  11. 11. <ul><li>Step 1. Image Acquisition </li></ul><ul><li>* Optical :- uses optical lens and image sensor. uses light as measuring method. Produce high quality images. </li></ul><ul><li>* Non optical :- measuring method used are pressure, heat etc. </li></ul><ul><li>Step 2. Feature Extraction </li></ul><ul><li>There are two main ways to compare an input fingerprint image and registered fingerprint data. </li></ul><ul><li>One is to compare an image with another image directly . The other is to compare the so-called 'features' extracted from each fingerprint image. This is called Feature based/minutia based matching. </li></ul><ul><li>Every finger has a unique pattern formed by a flow of embossed lines called “ridges” and hollow regions between them called “valleys”. </li></ul>
  12. 12. <ul><li>Step 3. Matching </li></ul><ul><li>* 1:1 method :- Also called personal identification or verification. It is a procedure in which a user claims his/her identity by means of an ID and proves it with a fingerprint. The comparison occurs only once between the input fingerprint image and the selected one from the database following the claim by the user. </li></ul><ul><li>* 1:N method :- A procedure where the system determines the user's identity by comparing the input fingerprint with the information in the database without asking for the user's claim. Frequently used in criminal investigation. </li></ul><ul><li>The output result of the matching step is whether or not the input fingerprint is identical to the one being compared in the database. </li></ul><ul><li>Main applications of finger print technology are entrance control, door lock applications etc. </li></ul>
  13. 13. Iris Recognition <ul><li>Iris technology algorithm should identify the concentric circular outer boundaries of iris and pupil in a photo of eye. </li></ul><ul><li>Set of pixels covering only the iris is transformed into bit pattern that preserves the information that is essential for comparison between two iris images. </li></ul><ul><li>The algorithm used to evaluate iris recognition is Daugman’s algorithm. </li></ul><ul><li>A practical problem is that the iris is usually partially covered by eye lids and eye lashes. </li></ul><ul><li>Inorder to reduce FRR, additional algorithms are needed to identify the locations of eye lids and eye lashes, and exclude the bits in the resulting code from the comparison operation. </li></ul>
  14. 14. Advantages <ul><li>Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly. </li></ul><ul><li>Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords). </li></ul><ul><li>Automated biometric identification can be done very rapidly and uniformly, with a minimum of training. </li></ul><ul><li>Your identity can be verified without resort to documents that may be stolen, lost or altered. </li></ul>
  15. 15. Disadvantages <ul><li>The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication. </li></ul><ul><li>It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time </li></ul><ul><li>For people affected with diabetes, the eyes get affected resulting in differences.  </li></ul><ul><li>Biometrics is an expensive security solution. </li></ul>
  16. 16. Issues and concerns <ul><li>Privacy </li></ul><ul><li>One common concern is how a person's biometric, once collected, can be protected. </li></ul><ul><li>Discrimination </li></ul><ul><li>There are concerns whether our personal information taken through biometric methods can be misused. </li></ul><ul><li>Danger to owners of secured items </li></ul><ul><li>When thieves cannot get access to secure properties, there is a chance that the thieves will stalk and assault the property owner to gain access. </li></ul><ul><li>Cancelable biometrics </li></ul><ul><li>One advantage of passwords over biometrics is that they can be re-issued. If a token or a password is lost or stolen, it can be cancelled and replaced by a newer version. </li></ul>
  17. 17. Conclusion <ul><li>Biometric authentication technology is used for the research field of IT industry. It is shown that more than seven thousand single possible risk effect classes can be identified using biometrics. IT security biometrics is based on person recognition methods based on sensing a person’s biological characters ,measuring them and creating templates and verifying them. </li></ul><ul><li> A biometric authentication is defined as a set of hardware components, processes ,algorithms fulfilling internalor external communication between elements for the purpose of biometric authentication. </li></ul>
  18. 18. THANK YOU

×