SlideShare a Scribd company logo
• In the terms of computer security, biometrics refers to
authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified.
• A Biometric System is a system for the automated
recognition of individuals based on their behavioral and
biological characteristics.
• Depending on the context, in a biometric system, there are
two different ways to resolve a person’s identity
i. VERIFICATION
ii. IDENTIFICATION
Verification:- Comparing a sample against
a single stored template is called
verification
stored Template
? 1
Input Data
Identification :- Search a sample
against a database of
templates.
input data
database
1
Biometrics Process
No
Yes
Biometric
Data Collection
Transmission
Quality
Sufficient?
Yes
Template Match
Signal Processing,
Feature Extraction,
Representation
Database
Generate Template
Decision
Confidence?
new biometric sample is requested.
No
Physical biometrics:
 Fingerprint—Analyzing fingertip patterns
 Facial recognition/face location—Measuring facial
characteristics
 Hand geometry—Measuring the shape of the hand
 Iris scan—Analyzing features of colored ring of the eye.
 Retinal scan—Analyzing blood vessels in the eye
 Vascular patterns—Analyzing vein patterns
 DNA—Analyzing genetic makeup.
 Fingerprint Recognition is the identification by using patterns
of friction ridges and valleys on an individual's fingertips
which are unique to that individual.
o Face recognition uses the visible physical structure of the
face and analyses the spatial geometry of distinguishing
features in it to identify an individual.
o The distance between eyes
o Size of mouth
o It is sensitive to environmental variables such as dust and
lighting and other factors such as facial expression, facial
hair, hats and spectacles.
o Templates are typically between 80 and 1,000 bytes in
size.
Face recognition process:
Database
Input face
image
Extraction of
face image
Extraction of
face features
Positive
negative
 The colored ring surrounding
 The pupil of the eye
 Iris patterns are formed in the eighth month of age and,
remain stable throughout the life of the individual
 The iris can have approximately 270 distinct
characteristics including meshwork, striations, rings,
freckles.
 high-quality black and white image of the iris is taken for
processing into a template that is typically around 256
bytes in size.
Iris Identification Steps:
Database
 Retinal scans record the pattern of blood vessels at
the back of the eyeball
 The biometric sensor projects a light into the eye
and requires close proximity and a high degree of
user co- operation.
 Retinal patterns are affected by medical conditions,
for example high blood pressure or eye disease
 Retinal scan templates are typically 40 to 100 bytes
in size.
Behavioral Biometrics:
• Speaker/voice recognition—Analyzing vocal
behavior
• Signature/handwriting—Analyzing signature
dynamics
• Keystroke/patterning—Measuring the time
spacing of typed words
1. It’s a habitual speaking recognition.
2. Voice recognition systems analyze differences such
as in pitch, and tone.
3. This biometric is also sensitive to
environmental conditions such as background
noise.
4 . Template size can vary significantly according to
the length of the pass phrase.
Construct voice
reference template
Database
 This biometric analyses signature characteristics
such as total time, speed, acceleration, character
direction, stroke order, stroke count, pressure and
contact with the writing surface.
 These templates are typically 50 to 300 bytes in size.
Signature Verification
Process
Database
Profile
• Similar to signature verification, this measures the
characteristics of an individual’s input of a pass phrase
or password. Characteristics may include total time,
speed with particular keys and pressure.
• Again the template size can vary significantly
depending on the length of the password or
phrase.
1. Sensing
◦ User’s characteristic must be presented to a sensor
◦ Output is a function of:
 Biometric measure
 The way it is presented
 Technical characteristics of sensor
2. Signal Processing
◦ Feature extraction
◦ Extract the desired biometric pattern
 remove noise and signal losses
 discard qualities that are not distinctive/repeatable
 Determine if feature is of “good quality”
3. Pattern matching
◦ Sample compared to original signal in database
◦ Closely matched patterns have “small distances” between them
◦ Distances will hardly ever be 0 (perfect match)
4. Decisions
◦ Decide if the match is close enough
◦ Trade-off:
  false non-matches leads to false matches
Something you have:
(token: key, card)
Something you know:
(Password, Pin )
Something you are:
(biometric :physiological, behavioral)
Biometric
representation
Capture &
processing
Feature
extraction
Template
creation
Storage
Or database
1 . Location
2. Security
3. Task( identification,
verification)
4 . Number of users
5 . Circumstances(user’s)
6 . Existing data
i . Biometrics is a rapidly evolving technology that is being
widely used in forensics, such as criminal identification and prison
security, and that has the potential to be used in a large range of
civilian application areas.
i i . Biometrics can be used to prevent unauthorized access to
ATMs, cellular phones, smart cards, desktop PCs, workstations,
and computer networks.
i i i . It can be used during transactions conducted by telephone and
Internet (electronic commerce and electronic banking).
i v . In automobiles, biometrics can replace keys with keyless entry
devices.
Markets/sectors that are using
biometrics:
✓Government—Passports, national identification (ID) cards, voter
cards, driver’s licenses, social services, and so on
✓Transportation—Airport security, boarding passes, and commercial
driver’s licenses
✓Healthcare—Medical insurance cards, patient/employee identity cards
✓Financial—Bankcards, ATM cards, credit cards, and debit cards
✓Security—Access control and identity verifications, including time and
attendance
✓Education—Student/teacher identity verification and access control.
Biometrics are now being implemented in large-scale ID systems around
the globe.
1. Uniqueness
2. Universality
3. Permanence
4. Measurability
5. User friendliness
6. Accuracy
7. Comfort
• Biometrics cannot be lost, stolen or forgotten. Barring disease or
serious physical injury, the biometric is consistent and permanent.
• It is also secure in that the biometric itself cannot be socially
engineered, shared or used by others.
• There is no requirement to remember passwords, or PINs, thus
eliminating an overhead cost. The biometric is always available to
the individual;
• Coupled with a smart card, biometrics provide strong security for
any credentials on the smart card.
• Biometric system provide a high degree of confidence in user
identity.
• Organizations can implement recognition systems to obviate the
need to log onto a system manually.
i. Costly
ii. Missing body part problem.
iii. Lack of standardization
iv. While the reliability and the accuracy of biometric
devices continues to improve.
v. Biometric systems must be able to accommodate
changes to the biometric over time which may be
caused by ageing, illness or injury.
vi. The effectiveness of the sample collection process is
strongly influenced by environmental conditions, user
training and usability. For example, lighting, facial
orientations, expression, image resolution and the
wearing of hats can affect the quality of the sample.
Conclusion
Not perfect yet.
Successful applications.
Decreasing costs and increasing convenience.
Increasing both privacy and identity security.
The field of biometrics is evolving.
Benefit from this technology .
References:
• The Biometric Consortium - http://www.biometrics.org/
•National Institute of Standards and Technology - http://www.nist.gov/
•The Biometric Catalog - http://www.biometricscatalog.org/
•ITPro - http://www.computer.org/
•Georgia Institute of Technology - http://www.gatech.edu/
•http://www.biometricgroup.com/abio1/technology/researchtechnology
.htm
•http://www.conspiracyarchive.com/images/biometrics.jpg
• http://www.information-security-
topics.org/information_security_index/V
http://www.bromba.com/faq/fpfaqe.htm
Biometrics(By Aashish Tanania)

More Related Content

What's hot

What's hot (20)

Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e voting
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individuals
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics
BiometricsBiometrics
Biometrics
 

Similar to Biometrics(By Aashish Tanania)

Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxNareshKireedula
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 

Similar to Biometrics(By Aashish Tanania) (20)

Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics -Mayank.pptx
Biometrics -Mayank.pptxBiometrics -Mayank.pptx
Biometrics -Mayank.pptx
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
CYBER FORENSIC PPT
CYBER FORENSIC PPTCYBER FORENSIC PPT
CYBER FORENSIC PPT
 

Recently uploaded

Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsAtif Razi
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234AafreenAbuthahir2
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdfKamal Acharya
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfKamal Acharya
 
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxCenterEnamel
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationDr. Radhey Shyam
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdfKamal Acharya
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringDr. Radhey Shyam
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientistgettygaming1
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfPipe Restoration Solutions
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdfKamal Acharya
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 

Recently uploaded (20)

Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 

Biometrics(By Aashish Tanania)

  • 1.
  • 2. • In the terms of computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified. • A Biometric System is a system for the automated recognition of individuals based on their behavioral and biological characteristics. • Depending on the context, in a biometric system, there are two different ways to resolve a person’s identity i. VERIFICATION ii. IDENTIFICATION
  • 3. Verification:- Comparing a sample against a single stored template is called verification stored Template ? 1 Input Data
  • 4. Identification :- Search a sample against a database of templates. input data database 1
  • 5. Biometrics Process No Yes Biometric Data Collection Transmission Quality Sufficient? Yes Template Match Signal Processing, Feature Extraction, Representation Database Generate Template Decision Confidence? new biometric sample is requested. No
  • 6. Physical biometrics:  Fingerprint—Analyzing fingertip patterns  Facial recognition/face location—Measuring facial characteristics  Hand geometry—Measuring the shape of the hand  Iris scan—Analyzing features of colored ring of the eye.  Retinal scan—Analyzing blood vessels in the eye  Vascular patterns—Analyzing vein patterns  DNA—Analyzing genetic makeup.
  • 7.  Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual.
  • 8. o Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual. o The distance between eyes o Size of mouth o It is sensitive to environmental variables such as dust and lighting and other factors such as facial expression, facial hair, hats and spectacles. o Templates are typically between 80 and 1,000 bytes in size.
  • 9. Face recognition process: Database Input face image Extraction of face image Extraction of face features Positive negative
  • 10.  The colored ring surrounding  The pupil of the eye  Iris patterns are formed in the eighth month of age and, remain stable throughout the life of the individual  The iris can have approximately 270 distinct characteristics including meshwork, striations, rings, freckles.  high-quality black and white image of the iris is taken for processing into a template that is typically around 256 bytes in size.
  • 12.  Retinal scans record the pattern of blood vessels at the back of the eyeball  The biometric sensor projects a light into the eye and requires close proximity and a high degree of user co- operation.  Retinal patterns are affected by medical conditions, for example high blood pressure or eye disease  Retinal scan templates are typically 40 to 100 bytes in size.
  • 13. Behavioral Biometrics: • Speaker/voice recognition—Analyzing vocal behavior • Signature/handwriting—Analyzing signature dynamics • Keystroke/patterning—Measuring the time spacing of typed words
  • 14. 1. It’s a habitual speaking recognition. 2. Voice recognition systems analyze differences such as in pitch, and tone. 3. This biometric is also sensitive to environmental conditions such as background noise. 4 . Template size can vary significantly according to the length of the pass phrase. Construct voice reference template Database
  • 15.  This biometric analyses signature characteristics such as total time, speed, acceleration, character direction, stroke order, stroke count, pressure and contact with the writing surface.  These templates are typically 50 to 300 bytes in size.
  • 17. • Similar to signature verification, this measures the characteristics of an individual’s input of a pass phrase or password. Characteristics may include total time, speed with particular keys and pressure. • Again the template size can vary significantly depending on the length of the password or phrase.
  • 18. 1. Sensing ◦ User’s characteristic must be presented to a sensor ◦ Output is a function of:  Biometric measure  The way it is presented  Technical characteristics of sensor 2. Signal Processing ◦ Feature extraction ◦ Extract the desired biometric pattern  remove noise and signal losses  discard qualities that are not distinctive/repeatable  Determine if feature is of “good quality”
  • 19. 3. Pattern matching ◦ Sample compared to original signal in database ◦ Closely matched patterns have “small distances” between them ◦ Distances will hardly ever be 0 (perfect match) 4. Decisions ◦ Decide if the match is close enough ◦ Trade-off:   false non-matches leads to false matches
  • 20.
  • 21. Something you have: (token: key, card) Something you know: (Password, Pin ) Something you are: (biometric :physiological, behavioral)
  • 23. 1 . Location 2. Security 3. Task( identification, verification) 4 . Number of users 5 . Circumstances(user’s) 6 . Existing data
  • 24. i . Biometrics is a rapidly evolving technology that is being widely used in forensics, such as criminal identification and prison security, and that has the potential to be used in a large range of civilian application areas. i i . Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. i i i . It can be used during transactions conducted by telephone and Internet (electronic commerce and electronic banking). i v . In automobiles, biometrics can replace keys with keyless entry devices.
  • 25. Markets/sectors that are using biometrics: ✓Government—Passports, national identification (ID) cards, voter cards, driver’s licenses, social services, and so on ✓Transportation—Airport security, boarding passes, and commercial driver’s licenses ✓Healthcare—Medical insurance cards, patient/employee identity cards ✓Financial—Bankcards, ATM cards, credit cards, and debit cards ✓Security—Access control and identity verifications, including time and attendance ✓Education—Student/teacher identity verification and access control. Biometrics are now being implemented in large-scale ID systems around the globe.
  • 26. 1. Uniqueness 2. Universality 3. Permanence 4. Measurability 5. User friendliness 6. Accuracy 7. Comfort
  • 27. • Biometrics cannot be lost, stolen or forgotten. Barring disease or serious physical injury, the biometric is consistent and permanent. • It is also secure in that the biometric itself cannot be socially engineered, shared or used by others. • There is no requirement to remember passwords, or PINs, thus eliminating an overhead cost. The biometric is always available to the individual; • Coupled with a smart card, biometrics provide strong security for any credentials on the smart card. • Biometric system provide a high degree of confidence in user identity. • Organizations can implement recognition systems to obviate the need to log onto a system manually.
  • 28. i. Costly ii. Missing body part problem. iii. Lack of standardization iv. While the reliability and the accuracy of biometric devices continues to improve. v. Biometric systems must be able to accommodate changes to the biometric over time which may be caused by ageing, illness or injury. vi. The effectiveness of the sample collection process is strongly influenced by environmental conditions, user training and usability. For example, lighting, facial orientations, expression, image resolution and the wearing of hats can affect the quality of the sample.
  • 29. Conclusion Not perfect yet. Successful applications. Decreasing costs and increasing convenience. Increasing both privacy and identity security. The field of biometrics is evolving. Benefit from this technology .
  • 30. References: • The Biometric Consortium - http://www.biometrics.org/ •National Institute of Standards and Technology - http://www.nist.gov/ •The Biometric Catalog - http://www.biometricscatalog.org/ •ITPro - http://www.computer.org/ •Georgia Institute of Technology - http://www.gatech.edu/ •http://www.biometricgroup.com/abio1/technology/researchtechnology .htm •http://www.conspiracyarchive.com/images/biometrics.jpg • http://www.information-security- topics.org/information_security_index/V http://www.bromba.com/faq/fpfaqe.htm