SlideShare a Scribd company logo
1 of 32
SUBMITED TO:
 SIR JUNAID SIDDIQUEE:
INTERNATION ISLAMIC
UNIVERSITY OF
ISLAMABAD
Group Members
 AIZAZ ASJID 3337/fbas/bsse/f16.c
 AWAIS ALI. 3352/fbas/bsse/f16.c
 ABDUL BASIT 3356/fbas/bsse/f16.c
 RANA M.AWAIS 3361/fbas/bsse/f16.c
Outline
1. The Basics
2. Biometric Technologies
3. Multi-model Biometrics
4. Biometric Applications
Section I: The Basics
 Why Biometric Authentication?
 Frauds in industry
 Identification vs. Authentication
What is Biometrics?
 The automated use behavioral and physiological
characteristics to determine or veiry an identity.
Know
HaveBe
Rapid!
Frauds in industry happens in
the following situations:
 Safety deposit boxes and vaults
 Bank transaction like ATM withdrawals
 Access to computers and emails
 Credit Card purchase
 Purchase of house, car, clothes or jewellery
 Getting official documents like birth certificates or
passports
 Obtaining court papers
 Drivers licence
 Getting into confidential workplace
 writing Checks
Why Biometric Application?
 To prevent stealing of possessions that
mark the authorised person's identity e.g.
security badges, licenses, or properties
 To prevent fraudulent acts like faking ID
badges or licenses.
 To ensure safety and security, thus
decrease crime rates
Identification vs. Authentication
Identification Authentication
It determines the identity of
the person.
It determines whether the
person is indeed who he
claims to be.
No identity claim
Many-to-one mapping.
Cost of computation ∝
number of record of users.
Identity claim from the user
One-to-one mapping.
The cost of computation is
independent of the number of
records of users.
Captured biometric signatures
come from a set of known
biometric feature stored in the
system.
Captured biometric signatures
may be unknown to the
system.
Section II: Biometric Technologies
 Several Biometric Technologies
 Desired Properties of Biometrics
 Comparisons
Types of Biometrics
 Fingerprint
 Face Recognition  Session III
 Hand Geometry
 Iris Scan
 Voice Scan  Session II
 Signature
 Retina Scan
 Infrared Face and Body Parts
 Keystroke Dynamics
 Gait
 Odour
 Ear
 DNA
Biometrics
2D Biometrics (CCD,IR, Laser, Scanner) 1D Biometrics
Fingerprint
Fingerprint Extraction and
Matching
Hand Geometry
•Captured using a CCD camera, or LED
•Orthographic Scanning
•Recognition System’s Crossover = 0.1%
IrisCode
Face
Principal Component Analysis
Desired Properties
 Universality
 Uniqueness
 Permanence
 Collectability
 Performance
 User’s Accpetability
 Robustness against Circumvention
Comparaison
Biometric Type Accuracy Ease of Use User Acceptance
Fingerprint High Medium Low
Hand Geometry Medium High Medium
Voice Medium High High
Retina High Low Low
Iris Medium Medium Medium
Signature Medium Medium High
Face Low High High
Section III: A Multi-model
Biometrics
 Pattern Recognition Concept
 A Prototype
Pattern Recognition Concept
Sensors Extractors
Image- and
signal- pro.
algo.
Classifiers
Biometrics
Voice, signature
acoustics, face,
fingerprint, iris,
hand geometry, etc
Data Rep.
1D (wav),
2D (bmp,
tiff, png)
Feature
Vectors
Negotiator
Scores
Decision:
Match,
Non-match,
Inconclusive
Enrolment Training
Submission
Threshold
An Example:
A Multi-model System
Sensors Extractors Classifiers Negotiator
Accept/
Reject
1D (wav)
2D (bmp)
ID
Face
Extractor
Voice
Extractor
Face
Feature
Voice
Feature
Face
MLP
Voice
MLP
AND
Objective: to build a hybrid and expandable biometric app. prototype
Potential: be a middleware and a research tool
Pour plus de renseignements : Pr J. Korczak, Mr N. Poh <jjk, poh>@dpt-info.u-strasbg.fr
Identité
Accepter,
Rejeter
w1
w2
Effacer les
silences
Transformation de l’ondelette
C0 C1 C2 C3 C4 C5 C6 C7
C9 C10 C11 C12
C13 C14
C15
Fréquence
Temps
Normalisation
+ Codage
Réseau des
neurones
Apprentissage et
Reconnaissance
Détection des yeux
AverageIntensityofeachrows
-50
0
50
100
150
200
250
010203040
GreyScale
Intensity
-50
0
50
100
150
200
250
01020304050
Intensity
Trouver
X
Trouver
Y
Filtre de
base
Inondation +
Convolution
Extraction
Normalisation
+ Codage
Moment
Vert
Bleu
Hue
Saturation
Intensité Réseau des
neurones
Apprentissage et
ReconnaissanceVisage
Voix
Base des données
Décision
System Architecture in Details
Section IV: Practical Application
 Biometric Applications
 Application by Technologies
 Commercial Products
Biometric Applications
 Identification or Authentication (Scalability)?
 Semi-automatic or automatic?
 Subjects cooperative or not?
 Storage requirement constraints?
 User acceptability?
1. Cell phones, Laptops, Work Stations,
PDA & Handheld device set.
2. Door, Car, Garage Access
3. ATM Access, Smart card
Biometrics-enabled
Authentication Applications
Image Source : http://www.voice-security.com/Apps.html
Biometrics-enabled Identification
Applications
1. Forensic : Criminal Tracking
e.g. Fingerprints, DNA Matching
2. Car Park Surveillance
3. Fréquent Customer Tracking
Application by Technologies
Biometrics Vendors Market
Share
Applications
Fingerprint 90 34% Law enforcement; civil
government; enterprise
security; medical and
financial transactionsHand Geometry - 26% Time and attendance systems,
physical access
Face
Recognition
12 15% Transaction authentication;
picture ID duplication
prevention; surveillance
Voice
Authentication
32 11% Security, V-commerce
Iris Recognition 1 9% Banking, access control
Commercial Products
The Head
The Eye The Face The Voice
Eye-Dentify
IriScan
Sensar
Iridian
Visionics
Miros
Viisage
iNTELLiTRAK
QVoice
VoicePrint
Nuance
The Hand
The Fingerprint Hand Geometry Behavioral
Identix
BioMouse
The FingerChip
Veridicom
Advanced Biometrics
Recognition Systems
BioPassword
CyberSign
PenOp
Other Information
Bertillonage
International Biometric Group
Palmistry
Main Reference
 [Brunelli et al, 1995]R. Brunelli, and D. Falavigna, "Personal identification using multiple cues," IEEE Trans. on Pattern
Analysis and Machine Intelligence, Vol. 17, No. 10, pp. 955-966, 1995
 [Bigun, 1997]Bigun, E.S., J. Bigun, Duc, B.: “Expert conciliation for multi modal person authentication systems by Bayesian
statistics,” In Proc. 1st
Int. Conf. On Audio Video-Based Personal Authentication, pp. 327-334, Crans-Montana, Switzerland, 1997
 [Dieckmann et al, 1997]Dieckmann, U., Plankensteiner, P., and Wagner, T.: “SESAM: A biometric person identification
system using sensor fusion,” In Pattern Recognition Letters, Vol. 18, No. 9, pp. 827-833, 1997
 [Kittler et al, 1997]Kittler, J., Li, Y., Matas, J. and Sanchez, M. U.: “Combining evidence in multi-modal personal identity
recognition systems,” In Proc. 1st
International Conference On Audio Video-Based Personal Authentication, pp. 327-344, Crans-Montana,
Switzerland, 1997
 [Maes and Beigi, 1998]S. Maes and H. Beigi, "Open sesame! Speech, password or key to secure your door?", In Proc. 3rd
Asian Conference on Computer Vision, pp. 531-541, Hong Kong, China, 1998
 [Jain et al, 1999]Jain, A., Bolle, R., Pankanti, S.: “BIOMETRICS: Personal identification in networked society,” 2nd
Printing,
Kluwer Academic Publishers (1999)
 [Gonzalez, 1993]Gonzalez, R., and Woods, R. : "Digital Image Processing", 2nd edition, Addison-Wesley, 1993.

More Related Content

What's hot

Privacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsPrivacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsFrancesco Bonadiman
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar promaproma_goswami
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materialsyasmeenreem
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technologypalsantosh
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 

What's hot (20)

Privacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsPrivacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric Systems
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
Biometrics
BiometricsBiometrics
Biometrics
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materials
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Why Is Facial Recognition Better Than Fingerprint?
Why Is Facial Recognition Better Than Fingerprint?Why Is Facial Recognition Better Than Fingerprint?
Why Is Facial Recognition Better Than Fingerprint?
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 

Similar to BIMETRIC ATTENDANCE SYSTEM

Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometricszia balti
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Girish Kengar
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systemsnishiyath
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 

Similar to BIMETRIC ATTENDANCE SYSTEM (20)

Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systems
 
Biometrics
BiometricsBiometrics
Biometrics
 
Shamaas
ShamaasShamaas
Shamaas
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Biometric
 Biometric Biometric
Biometric
 

Recently uploaded

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 

Recently uploaded (20)

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 

BIMETRIC ATTENDANCE SYSTEM

  • 1.
  • 2.
  • 3. SUBMITED TO:  SIR JUNAID SIDDIQUEE: INTERNATION ISLAMIC UNIVERSITY OF ISLAMABAD
  • 4. Group Members  AIZAZ ASJID 3337/fbas/bsse/f16.c  AWAIS ALI. 3352/fbas/bsse/f16.c  ABDUL BASIT 3356/fbas/bsse/f16.c  RANA M.AWAIS 3361/fbas/bsse/f16.c
  • 5. Outline 1. The Basics 2. Biometric Technologies 3. Multi-model Biometrics 4. Biometric Applications
  • 6. Section I: The Basics  Why Biometric Authentication?  Frauds in industry  Identification vs. Authentication
  • 7. What is Biometrics?  The automated use behavioral and physiological characteristics to determine or veiry an identity. Know HaveBe Rapid!
  • 8. Frauds in industry happens in the following situations:  Safety deposit boxes and vaults  Bank transaction like ATM withdrawals  Access to computers and emails  Credit Card purchase  Purchase of house, car, clothes or jewellery  Getting official documents like birth certificates or passports  Obtaining court papers  Drivers licence  Getting into confidential workplace  writing Checks
  • 9. Why Biometric Application?  To prevent stealing of possessions that mark the authorised person's identity e.g. security badges, licenses, or properties  To prevent fraudulent acts like faking ID badges or licenses.  To ensure safety and security, thus decrease crime rates
  • 10. Identification vs. Authentication Identification Authentication It determines the identity of the person. It determines whether the person is indeed who he claims to be. No identity claim Many-to-one mapping. Cost of computation ∝ number of record of users. Identity claim from the user One-to-one mapping. The cost of computation is independent of the number of records of users. Captured biometric signatures come from a set of known biometric feature stored in the system. Captured biometric signatures may be unknown to the system.
  • 11. Section II: Biometric Technologies  Several Biometric Technologies  Desired Properties of Biometrics  Comparisons
  • 12. Types of Biometrics  Fingerprint  Face Recognition  Session III  Hand Geometry  Iris Scan  Voice Scan  Session II  Signature  Retina Scan  Infrared Face and Body Parts  Keystroke Dynamics  Gait  Odour  Ear  DNA
  • 13. Biometrics 2D Biometrics (CCD,IR, Laser, Scanner) 1D Biometrics
  • 16. Hand Geometry •Captured using a CCD camera, or LED •Orthographic Scanning •Recognition System’s Crossover = 0.1%
  • 19. Desired Properties  Universality  Uniqueness  Permanence  Collectability  Performance  User’s Accpetability  Robustness against Circumvention
  • 20. Comparaison Biometric Type Accuracy Ease of Use User Acceptance Fingerprint High Medium Low Hand Geometry Medium High Medium Voice Medium High High Retina High Low Low Iris Medium Medium Medium Signature Medium Medium High Face Low High High
  • 21. Section III: A Multi-model Biometrics  Pattern Recognition Concept  A Prototype
  • 22. Pattern Recognition Concept Sensors Extractors Image- and signal- pro. algo. Classifiers Biometrics Voice, signature acoustics, face, fingerprint, iris, hand geometry, etc Data Rep. 1D (wav), 2D (bmp, tiff, png) Feature Vectors Negotiator Scores Decision: Match, Non-match, Inconclusive Enrolment Training Submission Threshold
  • 23. An Example: A Multi-model System Sensors Extractors Classifiers Negotiator Accept/ Reject 1D (wav) 2D (bmp) ID Face Extractor Voice Extractor Face Feature Voice Feature Face MLP Voice MLP AND Objective: to build a hybrid and expandable biometric app. prototype Potential: be a middleware and a research tool
  • 24. Pour plus de renseignements : Pr J. Korczak, Mr N. Poh <jjk, poh>@dpt-info.u-strasbg.fr Identité Accepter, Rejeter w1 w2 Effacer les silences Transformation de l’ondelette C0 C1 C2 C3 C4 C5 C6 C7 C9 C10 C11 C12 C13 C14 C15 Fréquence Temps Normalisation + Codage Réseau des neurones Apprentissage et Reconnaissance Détection des yeux AverageIntensityofeachrows -50 0 50 100 150 200 250 010203040 GreyScale Intensity -50 0 50 100 150 200 250 01020304050 Intensity Trouver X Trouver Y Filtre de base Inondation + Convolution Extraction Normalisation + Codage Moment Vert Bleu Hue Saturation Intensité Réseau des neurones Apprentissage et ReconnaissanceVisage Voix Base des données Décision System Architecture in Details
  • 25. Section IV: Practical Application  Biometric Applications  Application by Technologies  Commercial Products
  • 26. Biometric Applications  Identification or Authentication (Scalability)?  Semi-automatic or automatic?  Subjects cooperative or not?  Storage requirement constraints?  User acceptability?
  • 27. 1. Cell phones, Laptops, Work Stations, PDA & Handheld device set. 2. Door, Car, Garage Access 3. ATM Access, Smart card Biometrics-enabled Authentication Applications Image Source : http://www.voice-security.com/Apps.html
  • 28. Biometrics-enabled Identification Applications 1. Forensic : Criminal Tracking e.g. Fingerprints, DNA Matching 2. Car Park Surveillance 3. Fréquent Customer Tracking
  • 29. Application by Technologies Biometrics Vendors Market Share Applications Fingerprint 90 34% Law enforcement; civil government; enterprise security; medical and financial transactionsHand Geometry - 26% Time and attendance systems, physical access Face Recognition 12 15% Transaction authentication; picture ID duplication prevention; surveillance Voice Authentication 32 11% Security, V-commerce Iris Recognition 1 9% Banking, access control
  • 30. Commercial Products The Head The Eye The Face The Voice Eye-Dentify IriScan Sensar Iridian Visionics Miros Viisage iNTELLiTRAK QVoice VoicePrint Nuance The Hand The Fingerprint Hand Geometry Behavioral Identix BioMouse The FingerChip Veridicom Advanced Biometrics Recognition Systems BioPassword CyberSign PenOp Other Information Bertillonage International Biometric Group Palmistry
  • 31.
  • 32. Main Reference  [Brunelli et al, 1995]R. Brunelli, and D. Falavigna, "Personal identification using multiple cues," IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 17, No. 10, pp. 955-966, 1995  [Bigun, 1997]Bigun, E.S., J. Bigun, Duc, B.: “Expert conciliation for multi modal person authentication systems by Bayesian statistics,” In Proc. 1st Int. Conf. On Audio Video-Based Personal Authentication, pp. 327-334, Crans-Montana, Switzerland, 1997  [Dieckmann et al, 1997]Dieckmann, U., Plankensteiner, P., and Wagner, T.: “SESAM: A biometric person identification system using sensor fusion,” In Pattern Recognition Letters, Vol. 18, No. 9, pp. 827-833, 1997  [Kittler et al, 1997]Kittler, J., Li, Y., Matas, J. and Sanchez, M. U.: “Combining evidence in multi-modal personal identity recognition systems,” In Proc. 1st International Conference On Audio Video-Based Personal Authentication, pp. 327-344, Crans-Montana, Switzerland, 1997  [Maes and Beigi, 1998]S. Maes and H. Beigi, "Open sesame! Speech, password or key to secure your door?", In Proc. 3rd Asian Conference on Computer Vision, pp. 531-541, Hong Kong, China, 1998  [Jain et al, 1999]Jain, A., Bolle, R., Pankanti, S.: “BIOMETRICS: Personal identification in networked society,” 2nd Printing, Kluwer Academic Publishers (1999)  [Gonzalez, 1993]Gonzalez, R., and Woods, R. : "Digital Image Processing", 2nd edition, Addison-Wesley, 1993.

Editor's Notes

  1. Odour: sensor arrays  sensor descriptors (a set of vocabulary) Main Obstacles: sensors may drift, of suffer from poisoning, limited lifetime (constantly replaced), Not as sensitive as human nose. Complicated by the use of deodorants, perfumes and diets We are looking for instruments capable of distinguishing invariant components of human odour
  2. CCD = Charged coupled device, LED = Light Emitting Diodes
  3. 2D Gabor wavelets 256 bytes
  4. The objective of the project! The approach: use several algorithms manipulating the same data.
  5. Source: http://library.thinkquest.org/28062/link.html Biometric Authentication Percentages By Chris DeVoney &amp; David Hakala, Sm@rt Partner http://www.zdnet.com/sp/stories/issue/0,4537,2664300-8,00.html