BIO-METRIC
TECHNOLOGY
Main Types Of Authentication
By using passwords, PIN-Code.
By using smart card or swipe card
By using Biometric
Introduction Bio-Metric Technology
 History About Biometric Technology.
 Definition of Bio-Metric Technology
Why Bio-Metric Technology?
 Leading Bio-Metric Technology
 How its Works?
 Types Of Bio-Metric Technology.
 Comparison Of Various Bio-Metric
Technology
 Advantage & Disadvantage Of Bio-Metric
Technology
 Conclusion
History About Biometric Technology
The ancient Egyptians and the Chinese played a
large role in biometrics history.
Biometrics in practice was a form of finger printing
being used in china in the 14th century.
Bertillon developed a technique of multiple body
measurements .
A system called “Indentimat” which measured
shape of the hand and length of fingers was
introduced in 1970s.
What is Biometrics ?
 Biometrics the science with technology to measure and
analyze biological data.
 Meaning of Biometrics comes from the Greeks.
Biometry = bio(life) + metry(to measure).
 Biometrics refers to automated methods or technologies
that measure and analyze human body characteristics
like DNA, fingerprints, eye retinas and irises, voice
patterns, facial patterns and hand measurements for
authentication purposes.
Leading Biometrics Technologies
Feature
Extraction
Acquired
Biometric
Sample
Matching Decision
Database
Flowchart of Typical Biometrics Systems
Why Bio Metric-Technology
• Identity theft is not possible.
• password remembrance problem does
not exist.
• Cannot be predicted or hacked.
• Cannot be shared.
• More secure.
 Physiological  Behavioral
Face
Iris Recognition
Retina Scan
Fingerprint
Signature
Voice
Face Recognition
 Principle: analysis of the unique
shape, pattern and positioning of
facial features.
 A automated software for
identifying or verifying a person
from a digital image or a video
frame from a video source.
Typically used in security
systems.
 Uses an image or series of images
either from a camera or
photograph to recognize a person.
 Highly complex technology.
Iris Recognition
 The iris of each eye of each
person is absolutely unique.
 The false acceptance rate
for iris recognition systems
is 1 in 1.2 million.
 Iris pattern is not changed
over years or by glasses,
contact lens
Problems to Iris Scanning
 Scanning difficult from a larger distance.
 It uses INFRARED light which may cause damage to our
eyes.
 An eye photograph can also be used to gaining the access.
Retina scan
 It analyzing the layer of blood
vessels situated at the back of
the eye.
 The machine takes around ten
seconds to shine a “low intensity
coherent light source” onto the
retina to illuminate the blood
vessels.
 Once the machine has a copy of
the scan, it compares the picture
to all the different scans of
databases, looks for a match,
and identifies the individual.
 Retina scan machines are fairly
expensive.
Fingerprint Recognition
 A fingerprint in its narrow sense is an
impression left by the friction ridges
of a human finger.
 Biometrics refers to that measure and
analyze human body characteristics
such as fingerprints recognition.
 Fingerprint recognition is possible
using the fingerprint scanner.
 A fingerprint scanner has two basic
jobs.
 It needs to get an image of your
finger.
Sensor
[Fingerprint
Sensor]
Pre-Processing
Matched
Profile
BIO-METRIC SYSTEM
Fingerprint
Extraction
Profile
Search
Stored
Profiles
Application
Activation
How Finger-Print Works?
Problem to Finger Print System
 Finger prints can be easily
copied.
 Wrong result is shown if
the finger is not placed
properly.
 If the software is not
sufficiently god negative
result is shown.
Advantages of fingerprint Recognition
 Oldest form of Biometrics
 Highly Reliable
 Uses easily features of fingers
 High Security access
 Reduce cost
 Instance Report
Voice Recognition
It’s a habitual speaking recognition.
Voice recognition systems analyze differences
such as in pitch, and tone.
This biometric is also sensitive to environmental
conditions such as background noise.
Template size can vary significantly according to
the length of the pass phrase.
Signature Recognition
Static Dynamic
In this mode, users write their signature on
paper, digitize it through an optical scanner or
a camera, and the biometric system recognizes
the signature by analyzing its shape. It is also
known as “off-line”.
In this mode, users write their signature in a
digitizing tablet, which acquires the signature
in real time. Dynamic recognition is also
known as “on-line”.
 One of behavioral biometric:
Signature recognition
 Operated in two different mode:
Signature Recognition Application
 Criminal identification
 Prison security
 ATM and other Financial Transactions
 PC/LAN Login
 Database access
 Border crossing controls
Advantages of Biometrics
 Biometrics are generally used for
authentication.
 It provides higher security .e.g. Iris
recognition .
 Voice Recognition works well over the
telephone
 User friendly
 e.g. Hand geometry recognition,
 finger print recognition
Disadvantages of Biometrics
Retina recognition requires close physical contact
of the scanning device, may not be generally
accepted by public
This technology is little Costly.
Voice recognition requires large amount of
computer storage, people's voices can change,
background noises can interfere.
Biometrics features may change over time.
Signature recognition has poor long-term
reliability, accuracy difficult to ensure.
A biometric system can operate in two
modes
Identification:
• A one to many comparison of the captured biometric against a
biometric database in attempt to identify an unknown
individual.
Verification:
• A one to one comparison of a captured biometric with a stored
template to verify that the individual is who he claims to be.
• Verification is faster and performs better.
• In a verification, the user must first enter his or her identity to
the biometric system. User ID's can be forgotten and cards can
be lost, making access impossible.
Application Of Biometric Technology
Criminal identification
Internet banking
Attendance system
Airport, Bank security
PC login security
Prevents unauthorized access to private data
Financial transaction management
Conclusion
 Not to remember passwords.
 User friendliness.
 A new way to interact with devices.
References
www.biometric leading
technology.com
www.matrixcomsec.com
matrixsecusol.com
www.Youtube.com
WWW.wikipedia.com
Bio-Metric Technology

Bio-Metric Technology

  • 1.
  • 2.
    Main Types OfAuthentication By using passwords, PIN-Code. By using smart card or swipe card By using Biometric
  • 3.
    Introduction Bio-Metric Technology History About Biometric Technology.  Definition of Bio-Metric Technology Why Bio-Metric Technology?  Leading Bio-Metric Technology  How its Works?  Types Of Bio-Metric Technology.  Comparison Of Various Bio-Metric Technology  Advantage & Disadvantage Of Bio-Metric Technology  Conclusion
  • 4.
    History About BiometricTechnology The ancient Egyptians and the Chinese played a large role in biometrics history. Biometrics in practice was a form of finger printing being used in china in the 14th century. Bertillon developed a technique of multiple body measurements . A system called “Indentimat” which measured shape of the hand and length of fingers was introduced in 1970s.
  • 5.
    What is Biometrics?  Biometrics the science with technology to measure and analyze biological data.  Meaning of Biometrics comes from the Greeks. Biometry = bio(life) + metry(to measure).  Biometrics refers to automated methods or technologies that measure and analyze human body characteristics like DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for authentication purposes.
  • 6.
  • 8.
  • 9.
    Why Bio Metric-Technology •Identity theft is not possible. • password remembrance problem does not exist. • Cannot be predicted or hacked. • Cannot be shared. • More secure.
  • 10.
     Physiological Behavioral Face Iris Recognition Retina Scan Fingerprint Signature Voice
  • 11.
    Face Recognition  Principle:analysis of the unique shape, pattern and positioning of facial features.  A automated software for identifying or verifying a person from a digital image or a video frame from a video source. Typically used in security systems.  Uses an image or series of images either from a camera or photograph to recognize a person.  Highly complex technology.
  • 13.
    Iris Recognition  Theiris of each eye of each person is absolutely unique.  The false acceptance rate for iris recognition systems is 1 in 1.2 million.  Iris pattern is not changed over years or by glasses, contact lens
  • 14.
    Problems to IrisScanning  Scanning difficult from a larger distance.  It uses INFRARED light which may cause damage to our eyes.  An eye photograph can also be used to gaining the access.
  • 15.
    Retina scan  Itanalyzing the layer of blood vessels situated at the back of the eye.  The machine takes around ten seconds to shine a “low intensity coherent light source” onto the retina to illuminate the blood vessels.  Once the machine has a copy of the scan, it compares the picture to all the different scans of databases, looks for a match, and identifies the individual.  Retina scan machines are fairly expensive.
  • 16.
    Fingerprint Recognition  Afingerprint in its narrow sense is an impression left by the friction ridges of a human finger.  Biometrics refers to that measure and analyze human body characteristics such as fingerprints recognition.  Fingerprint recognition is possible using the fingerprint scanner.  A fingerprint scanner has two basic jobs.  It needs to get an image of your finger.
  • 17.
  • 18.
    Problem to FingerPrint System  Finger prints can be easily copied.  Wrong result is shown if the finger is not placed properly.  If the software is not sufficiently god negative result is shown.
  • 19.
    Advantages of fingerprintRecognition  Oldest form of Biometrics  Highly Reliable  Uses easily features of fingers  High Security access  Reduce cost  Instance Report
  • 20.
    Voice Recognition It’s ahabitual speaking recognition. Voice recognition systems analyze differences such as in pitch, and tone. This biometric is also sensitive to environmental conditions such as background noise. Template size can vary significantly according to the length of the pass phrase.
  • 21.
    Signature Recognition Static Dynamic Inthis mode, users write their signature on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the signature by analyzing its shape. It is also known as “off-line”. In this mode, users write their signature in a digitizing tablet, which acquires the signature in real time. Dynamic recognition is also known as “on-line”.  One of behavioral biometric: Signature recognition  Operated in two different mode:
  • 22.
    Signature Recognition Application Criminal identification  Prison security  ATM and other Financial Transactions  PC/LAN Login  Database access  Border crossing controls
  • 23.
    Advantages of Biometrics Biometrics are generally used for authentication.  It provides higher security .e.g. Iris recognition .  Voice Recognition works well over the telephone  User friendly  e.g. Hand geometry recognition,  finger print recognition
  • 24.
    Disadvantages of Biometrics Retinarecognition requires close physical contact of the scanning device, may not be generally accepted by public This technology is little Costly. Voice recognition requires large amount of computer storage, people's voices can change, background noises can interfere. Biometrics features may change over time. Signature recognition has poor long-term reliability, accuracy difficult to ensure.
  • 25.
    A biometric systemcan operate in two modes Identification: • A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. Verification: • A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. • Verification is faster and performs better. • In a verification, the user must first enter his or her identity to the biometric system. User ID's can be forgotten and cards can be lost, making access impossible.
  • 26.
    Application Of BiometricTechnology Criminal identification Internet banking Attendance system Airport, Bank security PC login security Prevents unauthorized access to private data Financial transaction management
  • 27.
    Conclusion  Not toremember passwords.  User friendliness.  A new way to interact with devices.
  • 28.