SlideShare a Scribd company logo
1 of 37
-Sumit Gupta
Sumit
Gupta 1
 1.Introduction
 2. Background ~ How it all Started
 3. Basic Technique
 4. Verifation Vs Identification
 5. Potential and Current Application Areas
 6. Fingerprint verification
 7. Hand geometry
 8. Voice verification
 9. Retinal scanning
 9. Iris scanning
 10. Signature verification
 11. Facial recognition
 12. Applications ~ The Story so Far
 13. Problems
 14. Future Applications ~ Some Common Ideas
 15. Conclusion
Sumit Gupta 2
Biometrics ~ Introduction
3
 The terms "Biometrics" and "Biometry" have been used since
early in the 20th century to refer to the field of development of
statistical and mathematical methods applicable to data analysis
problems in the biological sciences. Recently, these terms have
also been used to refer to the emerging field of information
technology devoted to automated identification of individuals
using biological traits, such as those based on retinal or iris
scanning, voice patterns, dynamic signatures, fingerprints, face
recognition, or hand measurements, especially for
authentication purposes. Thus biometrics can be defined as the
science and technology of measuring and statistically analyzing
biological data. They are measurable physiological and / or
behavioral characteristics that can be utilized to verify the
identity of an individual. For a layman, it could be said that
biometrics are the science of measuring physical and/or
behavioral characteristics that are unique to each individual and
they verify that an individual is who he or she claims to be.
Sumit Gupta 4
 Often seen in science-fiction action adventure movies, face
pattern matchers and body scanners seem about to emerge as
replacements for computer passwords. Thus biometric
techniques are of interest in any area where it is important to
verify the true identity of an individual. Initially, these
techniques were employed primarily in specialist high security
applications, however we are now seeing their use and
proposed use in a much broader range of public facing
situations.
 Fingerprint, facial, or other biometric data can also be placed
on a smart card and users can present both the smart card and
their fingerprints or faces to merchants, banks, or telephones
for an extra degree of authentication.
Sumit Gupta 5
Background ~ How it all Started
Sumit Gupta 6
 The results were not conclusive but the idea of measuring
individual physical characteristics seemed to stick and the
parallel development of fingerprinting became the international
methodology among police forces for identity verification.
 But, for many years, a fascination with the possibility of using
electronics and the power of microprocessors to automate
identity verification had occupied the minds of individuals and
organizations both in the military and commercial sectors.
Hence, various projects were initiated to look at the potential of
biometrics. In the last decade, the biometric industry has
matured to a global industry shipping respectable numbers of
devices and poised for significant growth as large-scale
applications have started to unfold.
Sumit Gupta 8
Basic Technique
 A biometric system is a real-time identification system which
identifies a person by measuring a particular physical or
behavioral characteristic and later comparing it to a library of
characteristics belonging to many people.Fingerprint and other
biometric devices consist of a reader or scanning device,
software that converts the scanned information into digital
form, and wherever the data is to be analyzed, a database that
stores the biometric data for comparison with previous records.
When converting the biometric input, the software identifies
specific points of data as match points. The match points are
processed using an algorithm into a value that can be compared
with biometric data scanned when a user tries to gain access
Sumit Gupta 9
 Thus biometric devices can be explained with a 3-step
procedure. They are-
Sumit Gupta 10
-
 A sensor takes an observation. The type of sensor and its
observation depend on the type of biometrics device used. This
observation gives us a ABiometric Signature of the individual.
 A computer algorithm Anormalizes the biometric signature so
that it is in the same format (size, resolution, etc.) as the
signatures on the system's database. The normalization of the
biometric signature gives us an ANormalized Signature of the
individual.
 A matcher compares the normalized signature with the set (or
sub-set) of normalized signatures on the system's database and
provides a Asimilarity score that compares the individual's
normalized signature with each signature in the database set (or
sub-set). What is then done with the similarity scores depends on
the biometric system's application.
Sumit Gupta 11
Verifation Vs Identification
Sumit Gupta 12
 There are two different ways to resolve a person's
identity: Verification and Identification. Identification means
establishing a person's identity Verification involves
confirming or denying a person's claimed identity. Each one of
these approaches has it's own complexities and could probably
be solved best by a certain biometric system.
 The majority of available devices operate
in identification mode. This means that an identity is claimed
by calling a particular template from storage (by the input of a
PIN or presentation of a token) and then presenting a live
sample for comparison, resulting in a match or no match
according to predefined parameters. Thus a simple one to one
match may be performed quickly and generate a binary yes/no
result. A few devices claim to offer biometric identification
whereby the user submits his live sample and the system
attempts to identify him within a database of templates.
Sumit Gupta 13
 A more complex one to many match may generate a multiple
result according to the number and similarity of stored templates.
Suppose that a large number of templates (say 750’000) are
stored in a database. The user presents his live sample and the
database engine starts searching. Depending on how tightly the
likeness threshold parameter is defined, the search may result in a
large number (say 10000) of possible identities for the user. Now
filters may be applied based upon sex, ethnic origin, age and so
forth in order to reduce this list to a manageable size, if this
information can be captured from the user. But still the list of
potential identities may be sizeable. Of course, in a smaller
database this becomes less of a problem, but it is precisely with
large databases that this functionality is typically sought.
 All of this assumes that the system can indeed function as claimed
in identification mode. Certain devices have been demonstrated to
work well in this manner with small databases of tens of users,
but the situation becomes very complicated with databases of
even a few hundred.
Sumit Gupta 14
 The mathematical probability of finding an exact match within
such a database is extremely slim (to say the least). A large
database, such as might be the case with travelers across
borders for example, would be almost impossible to manage in
this manner with current technology. This is without
considering the time taken to search such a database and the
impact of multiple concurrent users. For these and other
reasons, one should exercise extreme caution when considering
biometric identification systems. Whilst one can readily
understand the attraction of this mode of operation, it has to
date rarely been successful in practice, except in small scale
and carefully controlled situations.
 Verification systems on the other hand are straightforward in
operation and may easily be deployed within a broad cross
section of applications, as indeed has been the case.
Sumit Gupta 15
 Potential and Current Application Areas:
Sumit Gupta 16
 PINs (personal identification numbers) were one of the first
identifiers to offer automated recognition. However they meant
recognition of the PIN and not necessarily recognition of the
person who provided it. Card tokens had a similar problem. A
biometric however cannot be easily transferred between
individuals and represents as unique an identifier. It means that
verifying an individual's identity can become both more
streamlined (by the user interacting with the biometric reader)
and considerably more accurate as biometric devices are not
easily fooled.
 Reference to a number of biometrics can be seen. Some of these
are rather impractical even if technically interesting. The method
of identification using biometrics is preferred over traditional
methods involving passwords and PIN numbers for various
reasons:
Sumit Gupta 17
 (i) The person to be identified is required to be physically
present at the point-of-identification.
 ii) Identification based on biometric techniques obviates the
need to remember a password or carry a token.
 (iii) The critical variable for identification cannot be lost or
forged.
 Presently, biometrics gravitate around the following
methodologies
Sumit Gupta 18
 Fingerprint verification
Sumit Gupta 19
 There are a variety of approaches to fingerprint verification.
Some of them try to emulate the traditional police method of
matching minutiae, others are straight pattern matching
devices, and some adopt a unique approach all of their own,
including ultrasonics. There are a greater variety of fingerprint
devices available than other biometric systems at present.
 Potentially capable of good accuracy (low instances of false
acceptance) fingerprint devices can also suffer from usage
errors among insufficiently disciplined users (higher instances
of false rejection) such as might be the case with large user
bases. Fingerprint verification may be a good choice for in
house systems where adequate explanation and training can be
provided to users and where the system is operated within a
controlled environment. It is not surprising that the workstation
access application area seems to be based almost exclusively
around fingerprints, due to the relatively low cost, small size
(easily integrated into keyboards) and ease of integration.
Sumit Gupta 20
 Hand geometry -
Sumit Gupta 21
 Hand geometry is concerned with measuring the physical
characteristics of the users hand and fingers, from a three-
dimensional perspective. One of the most established
methodologies, it offers a good balance of performance
characteristics and is relatively easy to use. This methodology
may be suitable where we have larger user bases or users who
may access the system infrequently and may therefore be less
disciplined in their approach to the system. Accuracy can be
very high if desired. Hand geometry readers are deployed in a
wide range of scenarios, including time and attendance
recording where they have proved extremely popular. Ease of
integration into other systems and processes, coupled to ease of
use makes hand geometry an obvious first step for many
biometric projects.
Sumit Gupta 22
 Voice verification
Sumit Gupta 23
 This is a potentially interesting technique if the amount of
voice communication that takes place with regard to
everyday business transactions is considered. Some
designs have concentrated on wall-mounted readers whilst
others have sought to integrate voice verification into
conventional telephone handsets. Whilst there have been a
number of voice verification products introduced to the
market, many of them have suffered in practice due to the
variability of both transducers and local acoustics. In
addition, the enrolment procedure has often been more
complicated than with other biometrics leading to the
perception of voice verification as unfriendly in some
quarters. However, much work has been and continues to
be undertaken in this context and it will be interesting to
monitor progress accordingly.
Sumit Gupta 24
 Retinal scanning -
Sumit Gupta 25
 This is an established technology where the unique patterns of
the retina are scanned by a low intensity light source via an
optical coupler. Retinal scanning has proved to be quite
accurate in use but does require the user to look into a
receptacle and focus on a given point. This is not particularly
convenient for spectacle wearers and for those who avoid
intimate contact with the source used for the scan and hence
this has a few user acceptance problems although the
technology itself can work well. It is believed to replace
traditional ID methods such as P.I.N. numbers for accessing
A.T.M.s and virtually every other electronic device used for
conducting business where identification is a requirement and
prerequisite.
Sumit Gupta 26
 Iris scanning -
Sumit Gupta 27
 Iris scanning is the less intrusive of the eye related biometrics.
It utilizes a conventional camera element and requires no
intimate contact between user and reader. In also has the
potential for higher than average template matching
performance. It has been demonstrated to work with spectacles
in place and with a variety of ethnic groups and is one of the
few devices that can work well in identification mode.
However, ease of use and system integration have not
traditionally been strong points with the iris scanning devices.
Sumit Gupta 28
 Signature verification -
Sumit Gupta 29
 Signature verification enjoys a synergy with existing processes
that other biometrics do not as people are used to signatures as
a means of transaction related identity verification and mostly
see nothing unusual in extending this to encompass biometrics.
Signature verification devices have proved to be reasonably
accurate in operation and obviously lend themselves to
applications where the signature is an accepted identifier.
Sumit Gupta 30
 Facial recognition -
Sumit Gupta 31
 Facial recognition devices have been difficult to substantiate in
practice and extravagant claims have sometimes been made
them. Facial recognition is very attractive from the user
perspective and they may eventually become a primary
biometric methodology.
Sumit Gupta 32
Applications ~ The Story so Far:
 Most of the biometric applications are related to security and are
used extensively for military purposes and other government
purposes. The applications in the public domain that are available
to common people include:
 Prison visitor systems, where visitors to inmates are subject to
verification procedures in order that identities may not be swapped
during the visit - a familiar occurrence among prisons worldwide.
 Driver's licenses, whereby drivers are expected to have multiple
licenses or swapped licenses among themselves when crossing
state lines or national borders.
 Canteen administration, particularly on campus where subsidized
meals are available to bona fide students, a system that was being
heavily abused in some areas.
 Benefit payment systems - In America, several states have saved
significant amounts of money by implementing biometric
verification procedures. The numbers of individuals claiming
benefit has also dropped dramatically in the process, validating the
systems as an effective deterrent against multiple claims.
Sumit Gupta 33
 Border control - A notable example for this is the INSPASS
trial in America where travelers were issued with a card
enabling them to use the strategically based biometric terminals
and bypass long immigration queues. There are other pilot
systems operating elsewhere in this respect.
 Voting systems, where eligible politicians are required to verify
their identity during a voting process. This is intended to stop
‘proxy’ voting where the vote may not go as expected.
 Junior school areas where problems are experienced with
children being either molested or kidnapped.
 In addition there are numerous applications in gold and
diamond mines, bullion warehouses and bank vaults as well as
the more commonplace physical access control applications
in industry.
Sumit Gupta 34
Problems:
 There are significant privacy and civil liberties concerns regarding the
use of devices using biometrics that must be addressed before any
widespread deployment. Briefly there are six major areas of concern:
 Storage. How is the data stored, centrally or dispersed? How should
scanned data be retained?
 Vulnerability. How vulnerable is the data to theft or abuse?
 Confidence. How much of an error factor in the technology's
authentication process is acceptable? What are the implications of false
positives and false negatives created by a machine?
 Authenticity. What constitutes authentic information? Can that
information be tampered with?
 Linking. Will the data gained from scanning be linked with other
information about spending habits, etc.? What limits should be placed
on the private use (as contrasted to government use) of such
technology?
 Ubiquity. What are the implications of having an electronic trail of our
every movement if cameras and other devices become commonplace,
used on every street corner and every means of transportation?
Sumit Gupta 35
Future Applications ~ Some Common Ideas:
 With the increased use of computers as vehicles of
information technology, it is necessary to restrict access to
sensitive/personal data. By replacing PINs, biometric
techniques can potentially prevent unauthorized access to or
fraudulent use of ATMs, cellular phones, smart cards,
desktop PCs, workstations, and computer networks. PINs
and passwords may be forgotten, and token-based methods
of identification like passports and driver's licenses may be
forged, stolen, or lost. Thus biometric systems of
identification are enjoying a renewed interest.
Sumit Gupta 36
 There are many views concerning potential biometric applications,
some popular examples being -
 1. ATM machine use - Most of the leading banks are
considering using biometrics for ATM machine and as a general
means of combating card fraud.
 2. Workstation and network access
 3. Travel and tourism - Many people hold the vision for a
multi application card for travelers which, incorporating a
biometric, would enable them to participate in various frequent
flyer and border control systems as well as paying for their air
ticket, hotel room, hire care etc., all with one convenient token.
 4. Public identity cards
 5. Internet transactions
 6. Telephone transactions
Sumit Gupta 37
Conclusion
 The increased need of privacy and security in our daily
life has given birth to this new area of science. These
devices are here and are present around us everywhere in
the society and are here to stay for a long time to come.
Indeed, it will be interesting to watch the future impact
that they will have on our day-to-day lives ...
Who can tell ??? Only time ...
Sumit Gupta 38

More Related Content

What's hot

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Editor Jacotech
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-pptMohankumar Ramachandran
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET Journal
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...CSCJournals
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AIijtsrd
 
Tracking cancer patients medical history using wireless emerging technology ...
Tracking cancer patients medical history using wireless emerging technology  ...Tracking cancer patients medical history using wireless emerging technology  ...
Tracking cancer patients medical history using wireless emerging technology ...VLSICS Design
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 

What's hot (20)

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
C6524029320
C6524029320C6524029320
C6524029320
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
13_2
13_213_2
13_2
 
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AI
 
Tracking cancer patients medical history using wireless emerging technology ...
Tracking cancer patients medical history using wireless emerging technology  ...Tracking cancer patients medical history using wireless emerging technology  ...
Tracking cancer patients medical history using wireless emerging technology ...
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 

Similar to BIOMETRICS TECHNOLGY

Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical educationArhind Gautam
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docxaulasnilda
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docxRAJU852744
 
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm DatasetDaily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm Datasetijtsrd
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Bhargav Amin
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESvasim hasina
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 

Similar to BIOMETRICS TECHNOLGY (20)

Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
 
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm DatasetDaily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
Daily Human Activity Recognition using Adaboost Classifiers on Wisdm Dataset
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICESFUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
FUSION OF GAIT AND FINGERPRINT FOR USER AUTHENTICATION ON MOBILE DEVICES
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

BIOMETRICS TECHNOLGY

  • 2.  1.Introduction  2. Background ~ How it all Started  3. Basic Technique  4. Verifation Vs Identification  5. Potential and Current Application Areas  6. Fingerprint verification  7. Hand geometry  8. Voice verification  9. Retinal scanning  9. Iris scanning  10. Signature verification  11. Facial recognition  12. Applications ~ The Story so Far  13. Problems  14. Future Applications ~ Some Common Ideas  15. Conclusion Sumit Gupta 2
  • 4.  The terms "Biometrics" and "Biometry" have been used since early in the 20th century to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. Recently, these terms have also been used to refer to the emerging field of information technology devoted to automated identification of individuals using biological traits, such as those based on retinal or iris scanning, voice patterns, dynamic signatures, fingerprints, face recognition, or hand measurements, especially for authentication purposes. Thus biometrics can be defined as the science and technology of measuring and statistically analyzing biological data. They are measurable physiological and / or behavioral characteristics that can be utilized to verify the identity of an individual. For a layman, it could be said that biometrics are the science of measuring physical and/or behavioral characteristics that are unique to each individual and they verify that an individual is who he or she claims to be. Sumit Gupta 4
  • 5.  Often seen in science-fiction action adventure movies, face pattern matchers and body scanners seem about to emerge as replacements for computer passwords. Thus biometric techniques are of interest in any area where it is important to verify the true identity of an individual. Initially, these techniques were employed primarily in specialist high security applications, however we are now seeing their use and proposed use in a much broader range of public facing situations.  Fingerprint, facial, or other biometric data can also be placed on a smart card and users can present both the smart card and their fingerprints or faces to merchants, banks, or telephones for an extra degree of authentication. Sumit Gupta 5
  • 6. Background ~ How it all Started Sumit Gupta 6
  • 7.  The results were not conclusive but the idea of measuring individual physical characteristics seemed to stick and the parallel development of fingerprinting became the international methodology among police forces for identity verification.  But, for many years, a fascination with the possibility of using electronics and the power of microprocessors to automate identity verification had occupied the minds of individuals and organizations both in the military and commercial sectors. Hence, various projects were initiated to look at the potential of biometrics. In the last decade, the biometric industry has matured to a global industry shipping respectable numbers of devices and poised for significant growth as large-scale applications have started to unfold. Sumit Gupta 8
  • 8. Basic Technique  A biometric system is a real-time identification system which identifies a person by measuring a particular physical or behavioral characteristic and later comparing it to a library of characteristics belonging to many people.Fingerprint and other biometric devices consist of a reader or scanning device, software that converts the scanned information into digital form, and wherever the data is to be analyzed, a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data scanned when a user tries to gain access Sumit Gupta 9
  • 9.  Thus biometric devices can be explained with a 3-step procedure. They are- Sumit Gupta 10
  • 10. -  A sensor takes an observation. The type of sensor and its observation depend on the type of biometrics device used. This observation gives us a ABiometric Signature of the individual.  A computer algorithm Anormalizes the biometric signature so that it is in the same format (size, resolution, etc.) as the signatures on the system's database. The normalization of the biometric signature gives us an ANormalized Signature of the individual.  A matcher compares the normalized signature with the set (or sub-set) of normalized signatures on the system's database and provides a Asimilarity score that compares the individual's normalized signature with each signature in the database set (or sub-set). What is then done with the similarity scores depends on the biometric system's application. Sumit Gupta 11
  • 12.  There are two different ways to resolve a person's identity: Verification and Identification. Identification means establishing a person's identity Verification involves confirming or denying a person's claimed identity. Each one of these approaches has it's own complexities and could probably be solved best by a certain biometric system.  The majority of available devices operate in identification mode. This means that an identity is claimed by calling a particular template from storage (by the input of a PIN or presentation of a token) and then presenting a live sample for comparison, resulting in a match or no match according to predefined parameters. Thus a simple one to one match may be performed quickly and generate a binary yes/no result. A few devices claim to offer biometric identification whereby the user submits his live sample and the system attempts to identify him within a database of templates. Sumit Gupta 13
  • 13.  A more complex one to many match may generate a multiple result according to the number and similarity of stored templates. Suppose that a large number of templates (say 750’000) are stored in a database. The user presents his live sample and the database engine starts searching. Depending on how tightly the likeness threshold parameter is defined, the search may result in a large number (say 10000) of possible identities for the user. Now filters may be applied based upon sex, ethnic origin, age and so forth in order to reduce this list to a manageable size, if this information can be captured from the user. But still the list of potential identities may be sizeable. Of course, in a smaller database this becomes less of a problem, but it is precisely with large databases that this functionality is typically sought.  All of this assumes that the system can indeed function as claimed in identification mode. Certain devices have been demonstrated to work well in this manner with small databases of tens of users, but the situation becomes very complicated with databases of even a few hundred. Sumit Gupta 14
  • 14.  The mathematical probability of finding an exact match within such a database is extremely slim (to say the least). A large database, such as might be the case with travelers across borders for example, would be almost impossible to manage in this manner with current technology. This is without considering the time taken to search such a database and the impact of multiple concurrent users. For these and other reasons, one should exercise extreme caution when considering biometric identification systems. Whilst one can readily understand the attraction of this mode of operation, it has to date rarely been successful in practice, except in small scale and carefully controlled situations.  Verification systems on the other hand are straightforward in operation and may easily be deployed within a broad cross section of applications, as indeed has been the case. Sumit Gupta 15
  • 15.  Potential and Current Application Areas: Sumit Gupta 16
  • 16.  PINs (personal identification numbers) were one of the first identifiers to offer automated recognition. However they meant recognition of the PIN and not necessarily recognition of the person who provided it. Card tokens had a similar problem. A biometric however cannot be easily transferred between individuals and represents as unique an identifier. It means that verifying an individual's identity can become both more streamlined (by the user interacting with the biometric reader) and considerably more accurate as biometric devices are not easily fooled.  Reference to a number of biometrics can be seen. Some of these are rather impractical even if technically interesting. The method of identification using biometrics is preferred over traditional methods involving passwords and PIN numbers for various reasons: Sumit Gupta 17
  • 17.  (i) The person to be identified is required to be physically present at the point-of-identification.  ii) Identification based on biometric techniques obviates the need to remember a password or carry a token.  (iii) The critical variable for identification cannot be lost or forged.  Presently, biometrics gravitate around the following methodologies Sumit Gupta 18
  • 19.  There are a variety of approaches to fingerprint verification. Some of them try to emulate the traditional police method of matching minutiae, others are straight pattern matching devices, and some adopt a unique approach all of their own, including ultrasonics. There are a greater variety of fingerprint devices available than other biometric systems at present.  Potentially capable of good accuracy (low instances of false acceptance) fingerprint devices can also suffer from usage errors among insufficiently disciplined users (higher instances of false rejection) such as might be the case with large user bases. Fingerprint verification may be a good choice for in house systems where adequate explanation and training can be provided to users and where the system is operated within a controlled environment. It is not surprising that the workstation access application area seems to be based almost exclusively around fingerprints, due to the relatively low cost, small size (easily integrated into keyboards) and ease of integration. Sumit Gupta 20
  • 20.  Hand geometry - Sumit Gupta 21
  • 21.  Hand geometry is concerned with measuring the physical characteristics of the users hand and fingers, from a three- dimensional perspective. One of the most established methodologies, it offers a good balance of performance characteristics and is relatively easy to use. This methodology may be suitable where we have larger user bases or users who may access the system infrequently and may therefore be less disciplined in their approach to the system. Accuracy can be very high if desired. Hand geometry readers are deployed in a wide range of scenarios, including time and attendance recording where they have proved extremely popular. Ease of integration into other systems and processes, coupled to ease of use makes hand geometry an obvious first step for many biometric projects. Sumit Gupta 22
  • 23.  This is a potentially interesting technique if the amount of voice communication that takes place with regard to everyday business transactions is considered. Some designs have concentrated on wall-mounted readers whilst others have sought to integrate voice verification into conventional telephone handsets. Whilst there have been a number of voice verification products introduced to the market, many of them have suffered in practice due to the variability of both transducers and local acoustics. In addition, the enrolment procedure has often been more complicated than with other biometrics leading to the perception of voice verification as unfriendly in some quarters. However, much work has been and continues to be undertaken in this context and it will be interesting to monitor progress accordingly. Sumit Gupta 24
  • 24.  Retinal scanning - Sumit Gupta 25
  • 25.  This is an established technology where the unique patterns of the retina are scanned by a low intensity light source via an optical coupler. Retinal scanning has proved to be quite accurate in use but does require the user to look into a receptacle and focus on a given point. This is not particularly convenient for spectacle wearers and for those who avoid intimate contact with the source used for the scan and hence this has a few user acceptance problems although the technology itself can work well. It is believed to replace traditional ID methods such as P.I.N. numbers for accessing A.T.M.s and virtually every other electronic device used for conducting business where identification is a requirement and prerequisite. Sumit Gupta 26
  • 26.  Iris scanning - Sumit Gupta 27
  • 27.  Iris scanning is the less intrusive of the eye related biometrics. It utilizes a conventional camera element and requires no intimate contact between user and reader. In also has the potential for higher than average template matching performance. It has been demonstrated to work with spectacles in place and with a variety of ethnic groups and is one of the few devices that can work well in identification mode. However, ease of use and system integration have not traditionally been strong points with the iris scanning devices. Sumit Gupta 28
  • 28.  Signature verification - Sumit Gupta 29
  • 29.  Signature verification enjoys a synergy with existing processes that other biometrics do not as people are used to signatures as a means of transaction related identity verification and mostly see nothing unusual in extending this to encompass biometrics. Signature verification devices have proved to be reasonably accurate in operation and obviously lend themselves to applications where the signature is an accepted identifier. Sumit Gupta 30
  • 30.  Facial recognition - Sumit Gupta 31
  • 31.  Facial recognition devices have been difficult to substantiate in practice and extravagant claims have sometimes been made them. Facial recognition is very attractive from the user perspective and they may eventually become a primary biometric methodology. Sumit Gupta 32
  • 32. Applications ~ The Story so Far:  Most of the biometric applications are related to security and are used extensively for military purposes and other government purposes. The applications in the public domain that are available to common people include:  Prison visitor systems, where visitors to inmates are subject to verification procedures in order that identities may not be swapped during the visit - a familiar occurrence among prisons worldwide.  Driver's licenses, whereby drivers are expected to have multiple licenses or swapped licenses among themselves when crossing state lines or national borders.  Canteen administration, particularly on campus where subsidized meals are available to bona fide students, a system that was being heavily abused in some areas.  Benefit payment systems - In America, several states have saved significant amounts of money by implementing biometric verification procedures. The numbers of individuals claiming benefit has also dropped dramatically in the process, validating the systems as an effective deterrent against multiple claims. Sumit Gupta 33
  • 33.  Border control - A notable example for this is the INSPASS trial in America where travelers were issued with a card enabling them to use the strategically based biometric terminals and bypass long immigration queues. There are other pilot systems operating elsewhere in this respect.  Voting systems, where eligible politicians are required to verify their identity during a voting process. This is intended to stop ‘proxy’ voting where the vote may not go as expected.  Junior school areas where problems are experienced with children being either molested or kidnapped.  In addition there are numerous applications in gold and diamond mines, bullion warehouses and bank vaults as well as the more commonplace physical access control applications in industry. Sumit Gupta 34
  • 34. Problems:  There are significant privacy and civil liberties concerns regarding the use of devices using biometrics that must be addressed before any widespread deployment. Briefly there are six major areas of concern:  Storage. How is the data stored, centrally or dispersed? How should scanned data be retained?  Vulnerability. How vulnerable is the data to theft or abuse?  Confidence. How much of an error factor in the technology's authentication process is acceptable? What are the implications of false positives and false negatives created by a machine?  Authenticity. What constitutes authentic information? Can that information be tampered with?  Linking. Will the data gained from scanning be linked with other information about spending habits, etc.? What limits should be placed on the private use (as contrasted to government use) of such technology?  Ubiquity. What are the implications of having an electronic trail of our every movement if cameras and other devices become commonplace, used on every street corner and every means of transportation? Sumit Gupta 35
  • 35. Future Applications ~ Some Common Ideas:  With the increased use of computers as vehicles of information technology, it is necessary to restrict access to sensitive/personal data. By replacing PINs, biometric techniques can potentially prevent unauthorized access to or fraudulent use of ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. PINs and passwords may be forgotten, and token-based methods of identification like passports and driver's licenses may be forged, stolen, or lost. Thus biometric systems of identification are enjoying a renewed interest. Sumit Gupta 36
  • 36.  There are many views concerning potential biometric applications, some popular examples being -  1. ATM machine use - Most of the leading banks are considering using biometrics for ATM machine and as a general means of combating card fraud.  2. Workstation and network access  3. Travel and tourism - Many people hold the vision for a multi application card for travelers which, incorporating a biometric, would enable them to participate in various frequent flyer and border control systems as well as paying for their air ticket, hotel room, hire care etc., all with one convenient token.  4. Public identity cards  5. Internet transactions  6. Telephone transactions Sumit Gupta 37
  • 37. Conclusion  The increased need of privacy and security in our daily life has given birth to this new area of science. These devices are here and are present around us everywhere in the society and are here to stay for a long time to come. Indeed, it will be interesting to watch the future impact that they will have on our day-to-day lives ... Who can tell ??? Only time ... Sumit Gupta 38