SlideShare a Scribd company logo
1 of 21
Biometric Authentication
Technique
Presented By
Rekha Yadav
M.Sc.(Maths with Computer
Application)
What is Authentication?
Authentication is the act of confirming something what it

claims to be.
It is the process of giving someone identity so that he or she
can access that particular application or data.
For e.g.: giving identity-card to a student of an institute.
Three main types of Authentication available
today are:
• something you know, like a password,

PIN, or code.
• Can be easily forgotten

• something you have, like a swipe card,

smart card, token, or key.
•

Can be easily stolen

• something you are, which is

biometrics.
•

Secure, convenient & unique
What is Biometrics?
BIO ► Life
METRIC ► To Measure
Biometric is the automated process of identifying or verifying
an individual based upon his or her behavioral or physical
characteristics.
Biometric based authentication systems are able to provide
high security against confidential financial transactions and
personal data privacy.
“something that you are”
Biometric Characteristics
The common Physical characteristics are:
 Fingerprint
 Face
 Iris
 Vein pattern, and
 Hand and finger geometry

Behavioral characteristics are:
 Keystroke dynamics
 Voice
 Gait, and
 Signature dynamics
Principle & Standards Of Biometrics
“Everyone in the world is unique, and this uniqueness can
be used for identity verification.”

Uniqueness : Distinction between individuals
Permanence : Resistance to ageing
Collectability : Ease to obtain a biometric for measurement.
Performance : Accuracy, speed, robustness of the biometric system.
Acceptability :Degree of approval of a technology.
Circumvention : Anomalies in the authentication system.
Working of Biometrics
Biometric systems uses three steps:
 Enrollment: The first time you use a biometric system, it records

basic information about you, like your name or an identification
number. It then captures an image or recording of your specific trait.
 Storage: most of the systems don't store the complete image or

recording. They instead analyze your trait and translate it into a code
or graph. Some systems also record this data onto a smart card that
you carry with you.
 Comparison: The next time you use the system, it compares the trait

you present to the information on file. Then, it either accepts or rejects
that you are who you claim to be.
Enrollment & Verification in Biometric
System
Components of Biometric System
Systems uses three components:
 A sensor that detects the characteristic being used for identification.
 A computer that reads and stores the information.
 Software that analyzes the characteristic, translates it into a graph or

code and performs the actual comparisons.

Biometric security systems, like the fingerprint scanner available on
the IBM ThinkPad T43, is becoming more common for home use.
Biometric Modalities
Biometric Modalities
1)
2)
3)
4)
5)

Fingerprint Recognition
Face Recognition
Iris Recognition
Voice Recognition
Signature Recognition
1) Finger Printings
1) Finger Printings
 Fingerprint Recognition is one of the most

used and familiar biometric methods.

Database
2) Face Recognition
2) Face Recognition
Input face image

Extraction of face
image

Extraction of face
features

Positive
Database
Negative
3) Iris Recognition
3) Iris Recognition
Input of face image

Detection of eye
regions

Put iris in focus

Recognition of iris
pattern

Accept

Database
Reject
4) Voice Recognition
4) Voice Recognition
It is the Identification using the acoustic features of
speech that have been found to differ between
individuals

Construct voice
reference template
Database
4) Signature Identification
4) Signature Identification



Signature identification: is the analyses of the
way a user signs his or her name.
The process used by a biometric system to
verify a signature is called dynamic signature
verification (DSV).

Biometric Traits for Signature
Verification
•The angle at which the pen is held
•The number of times the pen is lifted,
•The time it takes to write the entire signature,
•The pressure exerted by the person while signing,
•The variations in the speed with which different
parts of the signature are written.

Profile

Database
Application of Biometrics
Application of Biometrics
The applications of biometrics can be divided into the following three main groups.
 Commercial applications
 computer network login ( Fingerprint verification system)
 electronic data security
 e-commerce
 Internet access
 ATM (face recognition)
 credit card
 medical records management, and distance learning ( hand geometry systems)

 Government applications

 national ID card
 driver’s license
 social security
 border control, and passport control.

 Forensic applications

 corpse identification
 criminal investigation
 terrorist identification
 parenthood determination, and missing children.
Advantages Of Biometric System
Advantages Of Biometric System
directly authenticates the person
difficult to steal; thereby making biometrics authentication very
strong.
portable, and is unlikely to be lost.
user cannot share or forget his retina or fingerprint, while a password
and username are easily forgotten.
User friendliness
Comfort
Accuracy
Disadvantages of Biometrics
 Costly
 Facial imaging can also hinder accurate identifications.
 Missing body part problem
 False acceptances and rejections.
 The scanning of eye is fearful.
 Ethical issues
 Personal data used for something other than its advertised purpose.
 Privacy issues
 Who can access data
 Misuse of personal data
Future Prospects
Future Prospects
Biometry is one of the most promising and life-altering
technologies in existence today. It is all set to change the way we
live in the future. Some of the emerging biometrics technologies
in the near future are:
1. Ear shape identification.
2. Body odor identification.
3. Body salinity identification.
4. EEG Fingerprint
Conclusion
Conclusion
Conclusion
Not perfect yet.
Successful applications.
Decreasing costs and increasing convenience.
Increasing both privacy and identity security.
The field of biometrics is evolving.
Benefit from this technology .
Thank You!

More Related Content

What's hot (20)

Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonBiometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 

Viewers also liked

Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
EMBEDDED PROJECTS ABSTRACT:Biometric fingerprint based access control and lib...
EMBEDDED PROJECTS ABSTRACT:Biometric fingerprint based access control and lib...EMBEDDED PROJECTS ABSTRACT:Biometric fingerprint based access control and lib...
EMBEDDED PROJECTS ABSTRACT:Biometric fingerprint based access control and lib...ASHOKKUMAR RAMAR
 
Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionDr. Vinayak Bharadi
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Boimetric using 8051
Boimetric  using 8051 Boimetric  using 8051
Boimetric using 8051 Shilpa Nayak
 

Viewers also liked (16)

Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
EMBEDDED PROJECTS ABSTRACT:Biometric fingerprint based access control and lib...
EMBEDDED PROJECTS ABSTRACT:Biometric fingerprint based access control and lib...EMBEDDED PROJECTS ABSTRACT:Biometric fingerprint based access control and lib...
EMBEDDED PROJECTS ABSTRACT:Biometric fingerprint based access control and lib...
 
Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Web security
Web securityWeb security
Web security
 
Biometric AIT
Biometric AITBiometric AIT
Biometric AIT
 
APA Style
APA StyleAPA Style
APA Style
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Boimetric using 8051
Boimetric  using 8051 Boimetric  using 8051
Boimetric using 8051
 
biometrics
biometricsbiometrics
biometrics
 

Similar to Bio-metrics Authentication Technique

Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & consGagan Gowda
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometricszia balti
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 

Similar to Bio-metrics Authentication Technique (20)

21392009 laddi
21392009 laddi21392009 laddi
21392009 laddi
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Bio-metrics Authentication Technique

  • 1. Biometric Authentication Technique Presented By Rekha Yadav M.Sc.(Maths with Computer Application)
  • 2. What is Authentication? Authentication is the act of confirming something what it claims to be. It is the process of giving someone identity so that he or she can access that particular application or data. For e.g.: giving identity-card to a student of an institute.
  • 3. Three main types of Authentication available today are: • something you know, like a password, PIN, or code. • Can be easily forgotten • something you have, like a swipe card, smart card, token, or key. • Can be easily stolen • something you are, which is biometrics. • Secure, convenient & unique
  • 4. What is Biometrics? BIO ► Life METRIC ► To Measure Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical characteristics. Biometric based authentication systems are able to provide high security against confidential financial transactions and personal data privacy. “something that you are”
  • 5. Biometric Characteristics The common Physical characteristics are:  Fingerprint  Face  Iris  Vein pattern, and  Hand and finger geometry Behavioral characteristics are:  Keystroke dynamics  Voice  Gait, and  Signature dynamics
  • 6. Principle & Standards Of Biometrics “Everyone in the world is unique, and this uniqueness can be used for identity verification.” Uniqueness : Distinction between individuals Permanence : Resistance to ageing Collectability : Ease to obtain a biometric for measurement. Performance : Accuracy, speed, robustness of the biometric system. Acceptability :Degree of approval of a technology. Circumvention : Anomalies in the authentication system.
  • 7. Working of Biometrics Biometric systems uses three steps:  Enrollment: The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait.  Storage: most of the systems don't store the complete image or recording. They instead analyze your trait and translate it into a code or graph. Some systems also record this data onto a smart card that you carry with you.  Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be.
  • 8. Enrollment & Verification in Biometric System
  • 9. Components of Biometric System Systems uses three components:  A sensor that detects the characteristic being used for identification.  A computer that reads and stores the information.  Software that analyzes the characteristic, translates it into a graph or code and performs the actual comparisons. Biometric security systems, like the fingerprint scanner available on the IBM ThinkPad T43, is becoming more common for home use.
  • 10. Biometric Modalities Biometric Modalities 1) 2) 3) 4) 5) Fingerprint Recognition Face Recognition Iris Recognition Voice Recognition Signature Recognition
  • 11. 1) Finger Printings 1) Finger Printings  Fingerprint Recognition is one of the most used and familiar biometric methods. Database
  • 12. 2) Face Recognition 2) Face Recognition Input face image Extraction of face image Extraction of face features Positive Database Negative
  • 13. 3) Iris Recognition 3) Iris Recognition Input of face image Detection of eye regions Put iris in focus Recognition of iris pattern Accept Database Reject
  • 14. 4) Voice Recognition 4) Voice Recognition It is the Identification using the acoustic features of speech that have been found to differ between individuals Construct voice reference template Database
  • 15. 4) Signature Identification 4) Signature Identification   Signature identification: is the analyses of the way a user signs his or her name. The process used by a biometric system to verify a signature is called dynamic signature verification (DSV). Biometric Traits for Signature Verification •The angle at which the pen is held •The number of times the pen is lifted, •The time it takes to write the entire signature, •The pressure exerted by the person while signing, •The variations in the speed with which different parts of the signature are written. Profile Database
  • 16. Application of Biometrics Application of Biometrics The applications of biometrics can be divided into the following three main groups.  Commercial applications  computer network login ( Fingerprint verification system)  electronic data security  e-commerce  Internet access  ATM (face recognition)  credit card  medical records management, and distance learning ( hand geometry systems)  Government applications  national ID card  driver’s license  social security  border control, and passport control.  Forensic applications  corpse identification  criminal investigation  terrorist identification  parenthood determination, and missing children.
  • 17. Advantages Of Biometric System Advantages Of Biometric System directly authenticates the person difficult to steal; thereby making biometrics authentication very strong. portable, and is unlikely to be lost. user cannot share or forget his retina or fingerprint, while a password and username are easily forgotten. User friendliness Comfort Accuracy
  • 18. Disadvantages of Biometrics  Costly  Facial imaging can also hinder accurate identifications.  Missing body part problem  False acceptances and rejections.  The scanning of eye is fearful.  Ethical issues  Personal data used for something other than its advertised purpose.  Privacy issues  Who can access data  Misuse of personal data
  • 19. Future Prospects Future Prospects Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are: 1. Ear shape identification. 2. Body odor identification. 3. Body salinity identification. 4. EEG Fingerprint
  • 20. Conclusion Conclusion Conclusion Not perfect yet. Successful applications. Decreasing costs and increasing convenience. Increasing both privacy and identity security. The field of biometrics is evolving. Benefit from this technology .

Editor's Notes

  1. Biometric is a combination of two Greek words Bio(Life) and Metric(To Measure). It actually measures and analyzes the biological traits of a human being.
  2. Universality: Every person should have the characteristic. People who are mute or without a fingerprint will need to be accommodated in some way. Uniqueness: Generally, no two people have identical characteristics. However, identical twins are hard to distinguish. Permanence: The characteristics should not vary with time. A person's face, for example, may change with age. Collectability: The characteristics must be easily collectible and measurable. Performance: The method must deliver accurate results under varied environmental circumstances. Acceptability: The general public must accept the sample collection routines. Nonintrusive methods are more acceptable
  3. Enrollment Mode: A sample of the biometric trait is captured, processed by a computer, and stored for later Comparison. Verification Mode: In this mode biometric system authenticates a person’s claimed identity from their previously enrolled pattern.
  4. Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual. A light-sensitive device, either a scanner or camera, takes an analogue image of the fingertip. The image is then digitized and compared with template records that were created during the enrolment process. At the most basic level, these systems work by matching relationships amongst minutiae—the points on fingertips where print ridges end or divide. More complex scanning systems also examine other major features, such as the arch, loop and whorl that appear on the finger. The advantages include: Ease of use—Very little time is required for enrolment with a fingerprint scanning system compared to other biometric devices, such as retina scanners, fingerprint scanners. Uniqueness—As noted previously, fingerprints are a unique identifier specific to the individual. Security—Fingerprints cannot be lost or stolen, and are difficult to reproduce. The disadvantages include: Injury—Injury, whether temporary or permanent, can interfere with the scanning process.
  5. Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual. Scanner starts reading the geometry of the face & then plot features on a grid. Then points are transferred as algorithm of numbers . Then comparisons can be quickly made using computer software. Once a match is found an identity can be quickly verified.
  6. The iris is the colored ring of textured tissue that surrounds the pupil of the eye.
  7. the first step is for the user to speak a word or phrase into a microphone. The electrical signal from the microphone is digitized by an "analog-to-digital (A/D) converter", and is stored in memory. To determine the "meaning" of this voice input, the computer attempts to match the input with a digitized voice sample, or template, that has a known meaning. This technique is a close analogy to the traditional command inputs from a keyboard. The program contains the input template, and attempts to match this template with the actual input using a simple conditional statement.
  8. Biometrics directly authenticates the person, not indirectly through a password or token. Biometrics features are difficult to steal; thereby making biometrics authentication very strong. The Biometrics feature is eminently portable, and is unlikely to be lost. Another advantage of biometrics authentication systems is user cannot share or forget his retina or fingerprint, while a password and username are easily forgotten.