Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Biometrics

3,570 views

Published on

it's all about biometrics authentication.....

Published in: Technology
  • Be the first to comment

Biometrics

  1. 1. 8/5/2009<br />1<br />BIOMETRICAUTHENTICATION<br />By<br />07BCE095<br />DIVYA SHAH<br />
  2. 2. Contents – biometric systems<br />Biometric identifiers<br />Classification of biometrics methods<br />Bio Introduction<br />metric system architecture<br />Performance evaluation<br />Signature recognition<br />Voice recognition<br />Retinal scan<br />Iris scan<br />Face-scan and facial thermo gram<br />Hand geometry<br />8/5/2009<br />2<br />
  3. 3. Personal identification objects<br /><ul><li> Token-based: “something that you have”
  4. 4. Knowledge-based: “something that you know”
  5. 5. Biometrics-based: “something that you are”</li></ul>8/5/2009<br />3<br />
  6. 6. Definition of Biometrics<br />Any automatically measurable, robust and<br /> distinctive physical characteristic or personal<br /> trait that can be used to identify an individual or verify the claimed identity <br />of an individual.<br />8/5/2009<br />4<br />Biometrics is the automatic recognition of<br />a person using distinguishing traits<br />
  7. 7. Some applications<br /><ul><li>Financial security
  8. 8. Physical access control,
  9. 9. Benefits distribution,
  10. 10. Customs and immigration,
  11. 11. National ID systems,
  12. 12. Voter and driver registration,
  13. 13. Telecommunications </li></ul>8/5/2009<br />5<br />
  14. 14. Biometric identifiers<br /><ul><li>Universality
  15. 15. Uniqueness
  16. 16. Stability
  17. 17. Collectability
  18. 18. Performance
  19. 19. Acceptability
  20. 20. Forge resistance</li></ul>8/5/2009<br />6<br />
  21. 21. Classification of biometrics methods<br /> Static<br /><ul><li> fingerprint
  22. 22. retinal scan
  23. 23. iris scan
  24. 24. hand geometry</li></ul>8/5/2009<br />7<br /> Dynamic<br /><ul><li> signature recognition
  25. 25. speaker recognition</li></li></ul><li>Biometric system architecture<br /><ul><li>Basic modules of a biometric system
  26. 26. Data acquisition
  27. 27. Feature extraction
  28. 28. Matching
  29. 29. Decision
  30. 30. Storage</li></ul>8/5/2009<br />8<br />
  31. 31. Biometric system model<br />8/5/2009<br />9<br />
  32. 32. Data acquisition module<br /><ul><li>Reads the biometric info from the user.
  33. 33. Examples: video camera, fingerprint scanner/sensor, microphone, etc.
  34. 34. All sensors in a given system must be similar to ensure recognition at any location.
  35. 35. Environmental conditions may affect their performance.</li></ul>8/5/2009<br />10<br />
  36. 36. Feature extraction module<br /><ul><li>Discriminating features extracted from the raw biometric data.
  37. 37. Raw data transformed into small set of bytes – storage and matching.
  38. 38. Various ways of extracting the features.
  39. 39. Pre-processing of raw data usually necessary.</li></ul>8/5/2009<br />11<br />
  40. 40. Matching module<br /><ul><li> The core of the biometric system.
  41. 41. Measures the similarity of the claimant’s sample with a reference template.
  42. 42. Typical methods: distance metrics, probabilistic measures, neural networks, etc.
  43. 43. The result: a number known as match score.</li></ul>8/5/2009<br />12<br />
  44. 44. Storage module<br /><ul><li> Maintains the templates for enrolled users.
  45. 45. One or more templates for each user.
  46. 46. The templates may be stored in:
  47. 47. a special component in the biometric device,
  48. 48. conventional computer database,
  49. 49. portable memories such as smartcards.</li></ul>8/5/2009<br />13<br />
  50. 50. Possible decision outcomes<br /><ul><li> A genuine individual is accepted.
  51. 51. A genuine individual is rejected (error).
  52. 52. An impostor is rejected.
  53. 53. An impostor is accepted (error).</li></ul>8/5/2009<br />14<br />
  54. 54. Biometric technologies<br /><ul><li>Signature recognition
  55. 55. Voice recognition
  56. 56. Retinal scan
  57. 57. Iris scan
  58. 58. Face biometrics
  59. 59. Hand geometry</li></ul>8/5/2009<br />15<br />
  60. 60. Signature recognition<br />Variety of characteristics can be used<br />angle of the pen<br />pressure of the pen<br />total signing time<br />velocity and acceleration<br />geometry<br />8/5/2009<br />16<br />
  61. 61. Fingerprint recognition<br /><ul><li>Ridge patterns on fingers uniquely identify people.
  62. 62. Classification scheme devised in 1890s.
  63. 63. Major features: arch, loop, whorl.
  64. 64. Each fingerprint has at least one of the major features and many ‘small’ features.</li></ul>8/5/2009<br />17<br />
  65. 65. Eye biometric<br />8/5/2009<br />18<br /> Iris<br /><ul><li>colored portion of the eye surrounding the pupil.
  66. 66. complex iris pattern used for identification.</li></ul> Retina<br /><ul><li>Back inside of the eye ball.
  67. 67. Pattern of blood vessels used for identification.</li></li></ul><li>Speaker recognition<br /><ul><li>Linguistic and speaker dependent acoustic patterns.
  68. 68. Speaker’s patterns reflect:
  69. 69. anatomy (size and shape of mouth and throat),
  70. 70. behavioral (voice pitch, speaking style).
  71. 71. Heavy signal processing involved (spectral analysis, periodicity, etc)</li></ul>8/5/2009<br />19<br />
  72. 72. Face-scan and Facial Thermograms<br /><ul><li> Static controlled or dynamic uncontrolled shots.
  73. 73. Visible spectrum or infrared (thermo grams).
  74. 74. Non-invasive, hands-free, and widely accepted.
  75. 75. Questionable discriminatory capability.</li></ul>8/5/2009<br />20<br />
  76. 76. Hand geometry<br /><ul><li> Features: </li></ul>Dimensions and shape of the hand, fingers, and knuckles as well as their relative locations.<br /><ul><li> Two images taken: One from the top and one from the side.</li></ul>8/5/2009<br />21<br />
  77. 77. 8/5/2009<br />22<br />Thank you<br />

×