Biometric

2,054 views

Published on

Best Seminar !

Published in: Technology
  • Be the first to comment

Biometric

  1. 1. Presented By:SAGAR DEOKATEKIRAN WANGIKAR
  2. 2. CONTENTSBiometrics OverviewNeed of BiometricsWorking PrincipalPhysical ModesBehavioral ModesApplicationsBenefitsConcernConclusion
  3. 3. Biometrics OverviewDefinition:  Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic  Better than traditional method.  Physical:  Fingerprint  Facial Recognition  Hand Geometry  Iris Scan  Retinal Scan  DNA  Behavioral:  Speaker Recognition  Signature Recognition
  4. 4. NEEDTraditional methods have some flawsTo secure access to building, computer system, laptop, phone, ATM, bank account, & many more.For security & reduce financial fraud.To prevent fraudulent acts like faking ID badges or licenses.Types of biometric: 1. single model biometric system. 2. multi model biometric system.
  5. 5. WORKING PRINCIPAL1.Enrollment Adding biometric information to data file.2.Input Device Sensors, cameras etc3. Comparison with the database.4. Decision
  6. 6. WORKING
  7. 7. Biometrics OverviewWays to recognize a person: Verification  Matching against a single record.  It is 1:1 matching Identification  Matching against all record in the database.  It is 1:N matching.
  8. 8. Error and Accuracy2 types of errors:False rejection: When an actual client gets identified as imposter.False acceptance: When an actual imposter gets identified as client.Accuracy:FRR =number of false rejections/number of client accessesFAR = number of false acceptance/number of client accessesTER=(no of FA+no of FR)/total no accesses.
  9. 9. PHYSICAL MODESo Fingerprinto Facial Recognitiono Hand Geometryo Iris Scano Retinal Scano DNA
  10. 10. FingerprintTypical System: fingerprint scanner maps the series of whorls, ridges, furrows and minutiae on the surface of the fingerOptical sensor and Solid State sensor are used.
  11. 11. Fingerprint structure
  12. 12. FACIAL RECOGNITIONTypical system: digital video camera input of a person’s face images- measures facial structure; compares against database2 Methods:Face geometryFacial thermograph: uses infrared heat scans to identify facial characteristics.
  13. 13. HAND GEOMETRYAnalyses and computes features like length and width of finger, ratio of palm or fingers, width and thickness of the palm.Basic procedure involves taking images of top and side views of hand using camera.
  14. 14. Iris RecognitionIris analysisTypical system: scanner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.Sophisticated camera uses infrared imager to capture high resolution photograph.Advantage:o Iris is well protected area of eye with minimum possibility of injury.
  15. 15. Retina ScanningAnalysis of layer of blood vessels at the back of the eyeTypical system: low-intensity infrared light source and an optical coupler to scan a unique vascular pattern of retina and its reflection is recorded.Most accurate and reliable method.
  16. 16. DNA (Deoxyribonucleic acid)A DNA sample is used to produce either a DNA fingerprint or a DNA profileComparison of alleles of DNA sequences found in nuclear genetic material.Used in medical field and forensic investigation purpose.
  17. 17. BEHAVIORAL MODE Speaker Recognition Signature Recognition
  18. 18. Speaker RecognitionVoice recognition and analysisTypical system: uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes; only biometric that allows users to authenticate remotely.3 types:Fixed text methodText dependent methodText independent method
  19. 19. Signature Recognition Handwriting analysis Typical System: user will sign on a tablet, the device will record pressure, speed, sequence and shape of characters and compare to a database. Verification is based on features like no. of interior contours and no. of vertical slope components. Rarely used method.
  20. 20. Comparison Chart Accuracy/ReliabilityBiometric Accuracy Reliability ErrorsFingerprint Very High High Dirt, drynessFacial Recognition High Medium Hair, glasses, ageHand Geometry High Medium Hand injuryIris Scan Very High High Poor lightingRetinal Scan Very High High GlassesDNA Very High High noneSpeaker Recognition Medium Low Noise, coldsSignature Recognition Medium Low Changing signaturesAccuracy: How well can the specific biometric is able to tell individual apartReliability: how dependable the specific biometric is for recognition purposes
  21. 21. APPLICATIONSBIOMETRIC TECH APPLICATIONSFINGERPRINTS Law enforcement, entry devices for offices and colleges, enterprise security; medical and financialFACIAL RECOGNITION Automated bank tellers- user verification purposesHAND GEOMETRY Time and attendance systems, physical accessIRIS SCAN Law Enforcement, Employee Security Check, banking
  22. 22. RETINA SCAN High-end security, military, power plansDNA Medical applications, Paternity Tests, Criminal identification and forensicsVOICE RECOGNITION Call Centers, Law enforcement – house arrest authenticationSIGNATURE Access to documents, Banking services
  23. 23. What Biometrics are ReplacingTraditional verification methods:Passwords  PIN numbersTokens  Photo ID cards  Smart cards  Magnetic strip cards  Physical keys
  24. 24. Current Biometric Applications Computer logins ATMs Grocery stores Airport kiosks Driver’s licenses Internet banking National ID cards Welfare disbursement International border crossing Forensics – criminal identification Annual amusement park pass holders Speaker verification for television home shopping
  25. 25. BENEFITSIncreased security measuresReduce costs of password and ID card maintenanceAbility to track employees and link activitiesNo passwords to forgetElimination of problems such as lost/stolen identification cards and PIN numbersFaster login timeImproved security of sensitive information
  26. 26. CONCERNSSensitive biometric information susceptible to hackers.Lack of privacy for employees.Costly and time consuming to implement .
  27. 27. CONCLUSIONMulti biometric systems have a huge potential of growth.Access procedures are made simpler, faster and more secure. Especially governments, law enforcement agencies, military and industrial companies, already make partial use of this technology.In the future biometric devices will surely become more involved in many civil areas.
  28. 28. THANK YOU!

×