SlideShare a Scribd company logo
BIOMETRIC AUTHENTICATION
TECHNIQUES

Preparedd By
Subhash Basishtha
Saptarshi Boruah
M.Tech Scholar.
Presentation outlines















What is Authentication ?
Types of Authentication
What is Biometric?
Why Biometric?
Characteristics of Biometric
Mode of Biometric system
Working of Biometrics System
Different Biometric techniques
Comparison Between Different Techniques
Performance Metrics
Applications of Biometric Authentication
Limitations of Biometric System
Conclusion
References
What is Authentication






Authentication is the act of confirming
something what it claims to be.
It is the process of giving someone identity so
that he or she can access that particular
application or data.
For e.g.: giving identity-card to a student of an
institute.
Main types of authentication


By using passwords, PIN



By using smart card or swipe card



By using Biometric
What Is Biometric ?






Biometric is a combination of two Greek words
Bio(Life) and Metric(To Measure).
It actually measures and analyzes the
biological traits of a human being.
Biometric is the automated process of
identifying or verifying an individual based
upon his or her behavioral or physical
characteristics.
Contd..


Biometric based authentication systems are
able to provide high security against
confidential financial transactions and
personal data privacy.
“something that you are”
Why Biometric?







Identity theft is not possible
password remembrance problem does not
exist
Cannot be predicted or hacked
Cannot be shared
Perceived as more secure
Characteristics of Biometric
Automated method of recognizing an individual is
based
on two main characteristics :




Physical characteristics are related to physical
shape of the body. For e.g.: fingerprint ,face
recognition, hand geometry, iris recognition etc.
Behavioral characteristics are related to the
behavior of a person. For e.g.: voice pitch,
speaking style, typing rhythm, signature etc.
Biometric Technique
Classification

[3]
Mode of Biometric System
Identification
 One-to-many comparison
 It search for a sample against a database of templates
 It identifies an unknown individual.
 For e.g.: who is “x”?
Verification
 One-to-one comparison
 It compares a sample against a single stored template
 It verifies that the individual is who he claims to be
 For e.g.: is this “x”?
Working of biometric system
Steps:
 Capturing
 Pre-processing
 Feature extraction
 Template matching
 Matcher/Comparison
 Application Device
[3]
Working process


Enrollment: In this stage, the information
captured from the subject by the sensing
device is stored in a database for later
comparison. When someone uses biometric
for the first time then the stage is called
enrollment.
Contd…


Authentication: In this stage, the registered
biometric sample during the enrollment
process are matched against newly capturing
biometric sample.
Biometric devices consist of





A scanning device
A software which converts scanned
information into digital forms and compares on
some matching points
A database that stores biometric features for
further comparison
Different biometric technique
Fingerprint technology:
 It is the oldest and most widely used method.
 It needs a fingerprint reader.
 Registered points are located and compared.
 Optical sensors are used for scanning purpose.
 It can be used for many applications like pc
login security, voting system,
attendance system etc.
[12]
Contd..




Uses the ridge endings and bifurcation's on a persons
finger to plot points known as Minutiae
The number and locations of the minutiae vary from
finger to finger in any particular person, and from person
to person for any particular finger

Finger Image

Finger Image + Minutiae

Minutiae
Contd..
Face recognition technology:




Face Recognition is a biometric technique for automatic
identification or verification of a person from a digital
image.
These include the position/size/shape of the eyes, nose,
cheekbones and jaw line.
Contd..
Iris Recognition Technology:
 It measures the iris pattern of the eye i.e. the
colored part of the eye that surrounds the pupil.
 The iris canner analyzes features like rings,
furrows, and freckles existing in the colored tissue
surrounding the pupil.
 Iris pattern is not changed over
years or by glasses, contact lens
Contd..
Hand Geometry Technology
 This method uses hand images for person
identification or verification.
 Person identification using hand geometry
utilizes hand images to extract a number of
features such as finger length, width,
thickness, finger area etc.
 Measures the digits of the hand and compares
to those collected at the time of enrollment.
Contd..


Places hand on the system, which takes the
three dimensional image of the hand.

[6]
Contd..


Speaker recognition technology:
Voice Recognition or Speaker Recognition is a biometric

process of validating a user's claimed identity using
characteristics extracted from their voices.
It uses the pitch, pattern, tone, frequency, rhythm of speech
for identification purposes.
A telephone or microphone can act as a sensor.
Contd..






During the enrollment phase, the spoken
words are converted from analog to digital
format, and the distinctive vocal characteristics
such as pitch, frequency, and tone, are
extracted, and a speaker model is established.
A template is then generated and stored for
future comparisons.
Speaker recognition is often used where voice
is the only available biometric identifier, such
as telephone.
Comparison Between Different
Technique

[3]
Performance Metrics






FAR(False Acceptance Rate) : It is a measure
of the percent of invalid inputs that are
incorrectly accepted.
FRR(False Reject Rate) : It is a measure of
the percent of valid inputs that are incorrectly
rejected.
CER(Crossover Error Rate) : The rate at
which both the accept and reject errors are
equal.
- a lower value of the CER is more accurate
for Biometric System.
Performance Metrics Curve

[4]
Applications of Biometric System








Criminal identification
Internet banking
Attendance system
Airport, Bank security
PC login security
Prevents unauthorized access to private data
Financial transaction management
Limitations of Biometric System





Presence of noise in the sensed data
Variations in the enrolled data
Non-universality
It is an expensive security solution
Conclusion




The development of e-commerce or egovernment sites can be achieved through the
utilization of this strong authentication
process.
The greatest strength of the biometric system
is that they does not change over time so it is
much more efficient than other traditional
security mechanism.
REFERENCES
1.

2.

3.

4.

Emanuele Maiorana, Chiara Ercole, Secure
Biometric Authentication System Architecture
using Error Correcting Codes and Distributed
Cryptography.
Fernando L. Podio and Jeffrey S.
Dunn.Biometric Authentication Technology:
From the Movies to Your Desktop.
Fahad Al-harby, Rami Qahwaji, and Mumtaz
Kamala. Secure Biometrics Authentication: A
brief review of the Literature.
Dr. NatarajanMeghanathan. Biometrics for
Information Security.
REFERENCES
5.

6.

7.
8.

Anil K. Jain, AjayKumar,
Biometrics of Next Generation: An Overview.
SPRINGER, 2010.
Debnath Bhattacharyya, Rahul Ranjan, Farkhod
Alisherov A.,and Minkyu Choi. Biometric
Authentication: A Review, International Journal
of u- and e- Service, Science and Technology
,Vol. 2, No. 3, September, 2009.
Dr. JK Schneider. BIOMETRICS,
SMARTPHONES AND THE E-WALLET.2011.
Zdenek Ríha, Václav Matyáš. Biometric
Authentication Systems. FIMU Report Series.
REFERENCES
9.

10.

11.

12.

Phalguni Gupta, Ajita Rattani, Hunny Mehrotra, Anil
Kumar Kaushik. Multimodal Biometrics System for
Efficient Human Recognition.
Debnath Bhattacharyya,Rahul Ranjan,Poulami
Das,Tai Hoon Kim, Samir Kumar Bandyopadhyay,
Biometric Authentication Technique and Its Future
probabilities. IEEE Trans Int. conf. On Computer and
Electrical Engineering,pp. 652-655, 2009.
A. K. Jain, A. Ross and S. Pankanti, “Biometrics: A
Tool for Information Security,” IEEE Transactions on
Information Forensics and Security, vol. 1, no. 2, pp.
125 –143, June 2006.
http://en.wikipedia.org/wiki/Biometric_authentication
A study on biometric authentication techniques

More Related Content

What's hot

Biometrics
BiometricsBiometrics
Biometrics
Divya Shah
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
Abdul Rehman
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
ajith chandran
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometrics
BiometricsBiometrics
Biometrics
senejug
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
Aalaa Khattab
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
Shreyans Jain
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
shahab islam
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Face recognition
Face recognition Face recognition
Face recognition
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 

Similar to A study on biometric authentication techniques

Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
IJERA Editor
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
xiaomi5
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
ijcisjournal
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
ijsptm
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
Seetu
SeetuSeetu
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measuresanasz
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
Waseelsultan
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
Editor IJCATR
 

Similar to A study on biometric authentication techniques (20)

Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric
 Biometric Biometric
Biometric
 
Biometric
 Biometric Biometric
Biometric
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Seetu
SeetuSeetu
Seetu
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

A study on biometric authentication techniques

  • 1. BIOMETRIC AUTHENTICATION TECHNIQUES Preparedd By Subhash Basishtha Saptarshi Boruah M.Tech Scholar.
  • 2. Presentation outlines               What is Authentication ? Types of Authentication What is Biometric? Why Biometric? Characteristics of Biometric Mode of Biometric system Working of Biometrics System Different Biometric techniques Comparison Between Different Techniques Performance Metrics Applications of Biometric Authentication Limitations of Biometric System Conclusion References
  • 3. What is Authentication    Authentication is the act of confirming something what it claims to be. It is the process of giving someone identity so that he or she can access that particular application or data. For e.g.: giving identity-card to a student of an institute.
  • 4. Main types of authentication  By using passwords, PIN  By using smart card or swipe card  By using Biometric
  • 5. What Is Biometric ?    Biometric is a combination of two Greek words Bio(Life) and Metric(To Measure). It actually measures and analyzes the biological traits of a human being. Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical characteristics.
  • 6. Contd..  Biometric based authentication systems are able to provide high security against confidential financial transactions and personal data privacy. “something that you are”
  • 7. Why Biometric?      Identity theft is not possible password remembrance problem does not exist Cannot be predicted or hacked Cannot be shared Perceived as more secure
  • 8. Characteristics of Biometric Automated method of recognizing an individual is based on two main characteristics :   Physical characteristics are related to physical shape of the body. For e.g.: fingerprint ,face recognition, hand geometry, iris recognition etc. Behavioral characteristics are related to the behavior of a person. For e.g.: voice pitch, speaking style, typing rhythm, signature etc.
  • 10. Mode of Biometric System Identification  One-to-many comparison  It search for a sample against a database of templates  It identifies an unknown individual.  For e.g.: who is “x”? Verification  One-to-one comparison  It compares a sample against a single stored template  It verifies that the individual is who he claims to be  For e.g.: is this “x”?
  • 11. Working of biometric system Steps:  Capturing  Pre-processing  Feature extraction  Template matching  Matcher/Comparison  Application Device [3]
  • 12. Working process  Enrollment: In this stage, the information captured from the subject by the sensing device is stored in a database for later comparison. When someone uses biometric for the first time then the stage is called enrollment.
  • 13. Contd…  Authentication: In this stage, the registered biometric sample during the enrollment process are matched against newly capturing biometric sample.
  • 14. Biometric devices consist of    A scanning device A software which converts scanned information into digital forms and compares on some matching points A database that stores biometric features for further comparison
  • 15. Different biometric technique Fingerprint technology:  It is the oldest and most widely used method.  It needs a fingerprint reader.  Registered points are located and compared.  Optical sensors are used for scanning purpose.  It can be used for many applications like pc login security, voting system, attendance system etc. [12]
  • 16. Contd..   Uses the ridge endings and bifurcation's on a persons finger to plot points known as Minutiae The number and locations of the minutiae vary from finger to finger in any particular person, and from person to person for any particular finger Finger Image Finger Image + Minutiae Minutiae
  • 17. Contd.. Face recognition technology:   Face Recognition is a biometric technique for automatic identification or verification of a person from a digital image. These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
  • 18. Contd.. Iris Recognition Technology:  It measures the iris pattern of the eye i.e. the colored part of the eye that surrounds the pupil.  The iris canner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.  Iris pattern is not changed over years or by glasses, contact lens
  • 19. Contd.. Hand Geometry Technology  This method uses hand images for person identification or verification.  Person identification using hand geometry utilizes hand images to extract a number of features such as finger length, width, thickness, finger area etc.  Measures the digits of the hand and compares to those collected at the time of enrollment.
  • 20. Contd..  Places hand on the system, which takes the three dimensional image of the hand. [6]
  • 21. Contd..  Speaker recognition technology: Voice Recognition or Speaker Recognition is a biometric process of validating a user's claimed identity using characteristics extracted from their voices. It uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes. A telephone or microphone can act as a sensor.
  • 22. Contd..    During the enrollment phase, the spoken words are converted from analog to digital format, and the distinctive vocal characteristics such as pitch, frequency, and tone, are extracted, and a speaker model is established. A template is then generated and stored for future comparisons. Speaker recognition is often used where voice is the only available biometric identifier, such as telephone.
  • 24. Performance Metrics    FAR(False Acceptance Rate) : It is a measure of the percent of invalid inputs that are incorrectly accepted. FRR(False Reject Rate) : It is a measure of the percent of valid inputs that are incorrectly rejected. CER(Crossover Error Rate) : The rate at which both the accept and reject errors are equal. - a lower value of the CER is more accurate for Biometric System.
  • 26. Applications of Biometric System        Criminal identification Internet banking Attendance system Airport, Bank security PC login security Prevents unauthorized access to private data Financial transaction management
  • 27. Limitations of Biometric System     Presence of noise in the sensed data Variations in the enrolled data Non-universality It is an expensive security solution
  • 28. Conclusion   The development of e-commerce or egovernment sites can be achieved through the utilization of this strong authentication process. The greatest strength of the biometric system is that they does not change over time so it is much more efficient than other traditional security mechanism.
  • 29. REFERENCES 1. 2. 3. 4. Emanuele Maiorana, Chiara Ercole, Secure Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography. Fernando L. Podio and Jeffrey S. Dunn.Biometric Authentication Technology: From the Movies to Your Desktop. Fahad Al-harby, Rami Qahwaji, and Mumtaz Kamala. Secure Biometrics Authentication: A brief review of the Literature. Dr. NatarajanMeghanathan. Biometrics for Information Security.
  • 30. REFERENCES 5. 6. 7. 8. Anil K. Jain, AjayKumar, Biometrics of Next Generation: An Overview. SPRINGER, 2010. Debnath Bhattacharyya, Rahul Ranjan, Farkhod Alisherov A.,and Minkyu Choi. Biometric Authentication: A Review, International Journal of u- and e- Service, Science and Technology ,Vol. 2, No. 3, September, 2009. Dr. JK Schneider. BIOMETRICS, SMARTPHONES AND THE E-WALLET.2011. Zdenek Ríha, Václav Matyáš. Biometric Authentication Systems. FIMU Report Series.
  • 31. REFERENCES 9. 10. 11. 12. Phalguni Gupta, Ajita Rattani, Hunny Mehrotra, Anil Kumar Kaushik. Multimodal Biometrics System for Efficient Human Recognition. Debnath Bhattacharyya,Rahul Ranjan,Poulami Das,Tai Hoon Kim, Samir Kumar Bandyopadhyay, Biometric Authentication Technique and Its Future probabilities. IEEE Trans Int. conf. On Computer and Electrical Engineering,pp. 652-655, 2009. A. K. Jain, A. Ross and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125 –143, June 2006. http://en.wikipedia.org/wiki/Biometric_authentication

Editor's Notes

  1. 1.(Something that you have or you know may be stolen, but something that you are can’t be stolen or fraud.) As security level decreases and transactional fraud increases now-a-days, it is very essential to have a highly secure identification and verification system. The main reason behind biometric systems are:
  2. Depending on application it can operate on two modes.
  3. See pdf