Published on


Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. A PAPER PRESENTATION ONBIOMETRICS TECHNOLOGY Presented by Presented By: P.Srinivas ( 07W81A0542) Seetu mishra M.Anusha (07W81A0507) cse: 2nd yr Arjun college of tech & science
  2. 2. 1.Introduction2.Security and Authentication3.Methods of verification 1. Psychological verification a) Finger Print b) Hand Print. c) Face Measurement. d) Retinal Scanning e) DNA Analysis. • Behavioral verification 1. Typing. 2. Signature. 3. Voice.a)Identification.b)Applications.c)Advantages .d)Limitations.e)Conclusion.f)1st UID project in maharastrag)References
  3. 3. 1. Biometrics is derived from the conjunction of the Greek words bios and metrics that mean life and to measure respectively.2. Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity.3. A Biometrics system is actually a pattern recognition system that utilizes various patterns like iris patterns, retina patterns and biological traits like fingerprints, facial geometry, voice recognition and hand recognition etc….Functionality of Biometric device:1. First , it checks whether we are who we claim we are i.e. It sets off to verify our identity.2. Second, it tries to find out who we are, i.e. It sets off to establish an identity.3. Biometrics goes far from the traditional systems and thus helps in tightening internet security
  4. 4. Authentication is the process of GivingPermissionsExample:-Microsoft SQL Server uses permissions toenforce database securitySQL Servers permissions system recognizesfour types of users: the SA, database owners,database object owners, and other users ofthe database.
  5. 5. Methods ofVerification Psychological Psychological Behavioural Behavioural verification verification verification verification
  6. 6. Fingerprint:Fingerprint:It involves the user placing his finger over a glass-plate, which resides over a high-resolution camera,which uses optical or electromagnetic means totake its snapshot. The software analysis yourfinger for pattern such as loops, worls and archesPros:a. This technology is neither too expensivenor does it require extensive user training.b. It also simple to implement.c. Finger print system has FAR<0.5%d. It is oldest known technique that is stillused in criminal records and forensic. Cons: 1.Any injures of fingers effect more.
  7. 7. Hand print: It compares a 3D image of the users hand to that present in the system database. It is somewhat similar to finger print verification.Pros: a. Accuracy is better thanfingerprint. b. Cheap and easy to deploy. Cons: a) Complex in usage. b) Implementation is expensive. c) Any damages to hand effect more. Applications: San Francisco International Airport Immigration facilities Day Care Centers
  8. 8. Face measurement:Measuring this is as simple as taking a pictureand analyzing the image from a security videocapture. This technique enables the computerto use your face as your password andmatching these to an existing database Pros: a. Mot continents at public places. creams also effect the measurements. b. Less expensive. Cons: Inaccurate is affected by changes in lighting, age, and movement, glass. Face
  9. 9. Retinal scans: Retinal scans:It involves imaging of the blood vessels in theretina of the eye when infrared light of a certainfrequency and wavelength is incident upon it.thisenergy is absorbed by the blood vessels isdifferent in different individuals.The retinal iris patterns are unique to individualsthan any biometric yet devised. The retina is an internal part of the eyelocated at the back of the eye and is get of thinnerve which sense the light coming through acamera, pupil, eye lenses. The pattern of blood vessels whichmakeup retina are unique to each individual i.e.,<1.2 inch.
  10. 10. Retinal scans:Pros: a. Accurate with no false match in 2 millionpeople. b. It s sophisticated process.Cons: Expensive, difficult to deploy and use. Focus of light effect measurements. Applications: High-end security: military, power plans
  11. 11. DNA Analysis: It involves in checking the DNA patternof a human used when physical characteristicsare unrecognizable. It is used to identify people,who are died, to find out the relationship likeidentifying Childs natural parents. This is one Biometric that is judiciallyaccepted. No human have identified DNApatterns except in twins.Advantages: a. DNA samples can be collected fromtoothbrush, clothes.Disadvantages: DNA testing takes longer time than other methods. Twins have same DNA. Researchers produce same DNA.
  12. 12. Typing:Some systems measure thingsyou do in addition to thethings you are, you will noticethat your typing has a certainpattern. Some letters followothers in quick succession,while others take longer. Software called Biopassword is available for lessthan $100.It integrates withWindows 2000.WindowsNT.Login to provide thisauthentication without theneed for any additionalsoftware. This measure is abehavioral characteristic of aperson.
  13. 13. Signature: Some qualities looked intoinclude acceleration rates, direction,and pressure and stroke length. Heremainly concentrate on pressures. Thispressures stored in back end forfuture significations. Disadvantages: a. The disadvantage with thetechnology lies in the randomness orthe consistency with which a usermakes his signature. If pressures arenot tally with stored pressure in thedatabase Applications Access to documents Execution of contracts Banking services
  14. 14. Voice It involves in the recognition ofthe voice of the individual. Pros:It is inexpensive.It also works through telephone.Some person mimicry with other personvoices.Cons: a. One can mimic the voice ofthe individual. Biometric does not guarantee security.It simply offers ore convenient andreliable means of identification andauthentication Applications: Call Centers Law enforcement – house arrest authentication Electronic commerce Customer authentication for service calls
  15. 15. Percentage Of Usage Of VerificationsPercentage Of Usage Of Verifications
  16. 16. IdentificationIt is a process of recognition and involves taking the biometric data and searching forthe match in the database asking it a slow process that it is more prone to errors. It involves confirming your identity and the biometricsystems have to match your data with only one, single record. Depending on the technique used, Biometric have varying levels ofaccuracy .The system might let you pass in one attempt on Monday and require five onTuesday. The accuracy of any biometric system is measured in terms of FAR and FRR.FAR (False Acceptance Rates): Where an imposer is accepted as a match. It is a probability of falselyaccepting a metric as a match.FRR (False Rejection Rates): Where a legal match is denied. Where the system sails to recognize anauthentic Bio-signature. As FRR increases, the FAR goes down and vice versa.Almost all biometric systems can be adjusted to varying levels of strictness to create avariation in FAR and FRR. For a system to be successful, both have to be with inacceptable low limits.
  17. 17.       Applications Cellular  phone  Computer  Computer  industry networks networks Internet  Network  Network security and  security and  Banking authenicatio authenicatio nn Voting Multi  Solutions national  companie s
  18. 18. Advantages1. It provide good security mechanism than all other security   methods2. It never fails in security constraints.3. In public locations such as banks and airports a large number of people transit every day including known criminals.4. Face recognition systems attached to video surveillance systems are supposed to help catch them.
  19. 19.  1st UPI PROJECT IN MAHARASTRAThe worlds first ID project on biometric data is  used to provide unique identification numbers forIndia billion plus citizens rolled out on Wednesdaywith prime minister Man Mohan Singh & UPS chiefSonia Gandhi. Handling over the 1st set of 12 digitno to 10 tribals .It is a biometric based data including fromfingerprint & iris scan is being used 1st time in theworld to provide cost effective, nationally valid &verifiable single source of id proof through anauthentication infrastructure.  
  20. 20. Limitations1. It needs high memory space in the back end.2. Collect data for security is difficult3. Some times fails the security with right users4. Any time data loose in database high effect for security mechanism.5. So many equipments are needed for provide this technology.6. It highly expensive
  21. 21. ConclusionsSecurity is not just about putting big locks on the front door; it alsoinvolves making sure all the windows are shut.Each one can be individually fooled, but the comparison makes thesystem more secure as a whole.Biometrics are have its own advantages and disadvantages. It highexpensive but it provide good security.Money is not important than security. It is more useful for confidentialmaters.
  22. 22. Referencesi. http://Biometrics.comii.http://whitepapers.comiii.http://www.milesresearch.comiv.http://microsoft/biometrics.comv.D.c paper 30th september 2010