2. Introduction
Person Identification:
_In the early days of civilization, people lived in small
communities and everyone knew each other
_With the population growth and increase in mobility,
we started relying on documents and secret codes to
establish identity
Person identification is now an integral part of the
infrastructure needed for diverse business sectors such as
banking, border control, and law enforcement
3. How People are Identified?
People are identified by three basic means:
-something they have (Passport ,Credit card)
-something they know (Password, PIN)
-something they are (Human body)
4. Some Problems…and a Solution
•Card may be lost, stolen or forgotten
• The traditional approaches are unable to
differentiate between an authorized person
and an imposter
•Too many passwords to remember
We need
An approach which can uniquely identify an
authorized person and is easy to operate
…Biometric
5. What is Biometric?
“Biometric is the study of methods for
uniquely recognizing humans based
upon one or more physiological or
behavioral traits.”
Bios=’life’ Metron=’measure’
6. Requirements for an Ideal Biometric Identifier
•Universality
• Uniqueness
• Permanence
• Collectability
• Acceptability
13. Types Recognition
Face of Biometrics
The identification of a person by
their facial image characteristics
Matching algorithm uses the location and shape
of facial attributes
16. Hand and Finger Geometry
Identification by measuring either physical characteristics
of the fingers or the hands
17. Signature Verification
Identification using the dynamic analysis
of a signature to authenticate a person
1. X coordinate
2. Y coordinate
3. Pressure
4. Pen azimuth (0°-359°)
5. Pen altitude (0º-90°)
18. Other Recognition Methods
Keystroke Dynamics: Measures the
typing patterns
Gait Recognition: Measures how
someone appears while walking
Ear: based on the shape of the ear
19. Two Sides of a Coin…
Advantages:
•Uniqueness
•No need to remember Password or carry Cards
•Biometrics cannot be lost, stolen or forgotten
•More secure than a long password
•Not susceptible to traditional dictionary attacks
Disadvantages:
•Often requires significant computational
Equipment.
•It cannot be changed: If once forged