Biometrics = bios + metron. Bios means life and metron
means measure.
In the terms of computer security, biometrics refers to
authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified .
A Biometrics System is a system for the automated
recognition of individuals based on their behaviour and
biological characteristics. Also called
BEHAVIOMETRICS.
Biometric-based solutions are able to provide for
confidential financial transactions and personal data
privacy
There two types of biometrics
1. Physiological biometrics
2. Behavioral biometrics
Depending on the context, in a biometrics system, there are two
different ways to resolve a person’s identity
I. Verification
II. Identification
VERIFICATION
Comparing a sample against a single stored template is called
verification.
IDENTIFICATION
Search a sample against a database of templates.
1) Physiological biometrics :
Physiological are related to the shape of the body.
EXAMPLES :-
Handprint
Fingerprint
Retina
Face
2) Behavioral biometrics:
Behavioral are related to the behavior of a person.
EXAMPLES :-
Voice/Speech
Handwriting/Signature
Movement Patterns(i.e. typing, walking, etc.)
1) Physiological Biometrics
2) Behavioral Biometrics
Everybody has unique handprints.
A handprint Biometric Systems
scans hand and finger sand the
data is compared with the
specimen stored for you in the
system. The user is allowed or
denied based on the result of this
verification.
Fingerprints are used in forensic
and identification for long time.
Fingerprint Biometric Systems
examine the unique
characteristics of your
fingerprints and use that
information to determine
whether or not you should be
Retina Pattern Biometric system
uses an infrared beam to scan
your retina. Retina pattern
biometric systems examine the
unique characteristics of user’s
retina and compare that
information with stored pattern
to determine whether user should
be allowed access.
A facial recognisation system is a
computer application for
automatically identifying or
verifying a person from a digital
image or a video frame from a
video source.
Voice Patterns Biometric
Systems can also be used for
user authentication. Voice
Patterns Biometric Systems
examine the unique
characteristics of user’s voice.
Signature recognition is a
behavioral biometric. The
dynamics is measured as a
means of the pressure,
direction, acceleration and
the length of the strokes,
dynamics number of strokes
and their duration.
Keystroke Biometric Systems
examine the unique
characteristics of user’s
keystrokes and use that
information to determine
whether the user should be
allowed access.
• Criminal identification
• Prison security
• ATM and other Financial
Transactions
• PC/LAN Login
• Database access
• Border crossing controls
Biometrics
• Costly
• Facial imaging can also hinder
accurate identifications.
• Missing body part problem.
• False acceptances and rejections.
• The amount of comfort.
Security
Authentication
E-commerce and E-
governments
Secure Banking and Financial
Transaction
Digital Rights Management
Healthcare Application
Crime Investigation
Social Services
Time Clocks or Biometric time and attendance systems, which
are being increasingly used in various organizations to control
employee timekeeping.
Biometric safes and biometric locks, provides security to the
homeowners.
Biometric access control systems, providing strong security at
entrances.
Biometric systems are also developed for securing access to pc's
and providing single logon facilities.
Biometrics airport security devices are also deployed at some of
the world's famous airports to enhance the security standards.
Biometrics is a very interesting and exciting field that has be growing
exponentially in recent years (especially 2001).
While Biometric authentication can offer a high degree of security,
they are far from perfect solution.
The influences of biometric technology on society and the risks to
privacy and threat to identify will require meditation through
legislation.
The wide variety of physically unique traits our bodies give us will
soon allow us to live in a very secure password-less world.
QUESTIONS

Ppt on use of biomatrix in secure e trasaction

  • 2.
    Biometrics = bios+ metron. Bios means life and metron means measure. In the terms of computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified . A Biometrics System is a system for the automated recognition of individuals based on their behaviour and biological characteristics. Also called BEHAVIOMETRICS. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy
  • 3.
    There two typesof biometrics 1. Physiological biometrics 2. Behavioral biometrics Depending on the context, in a biometrics system, there are two different ways to resolve a person’s identity I. Verification II. Identification VERIFICATION Comparing a sample against a single stored template is called verification. IDENTIFICATION Search a sample against a database of templates.
  • 4.
    1) Physiological biometrics: Physiological are related to the shape of the body. EXAMPLES :- Handprint Fingerprint Retina Face 2) Behavioral biometrics: Behavioral are related to the behavior of a person. EXAMPLES :- Voice/Speech Handwriting/Signature Movement Patterns(i.e. typing, walking, etc.) 1) Physiological Biometrics 2) Behavioral Biometrics
  • 6.
    Everybody has uniquehandprints. A handprint Biometric Systems scans hand and finger sand the data is compared with the specimen stored for you in the system. The user is allowed or denied based on the result of this verification. Fingerprints are used in forensic and identification for long time. Fingerprint Biometric Systems examine the unique characteristics of your fingerprints and use that information to determine whether or not you should be
  • 8.
    Retina Pattern Biometricsystem uses an infrared beam to scan your retina. Retina pattern biometric systems examine the unique characteristics of user’s retina and compare that information with stored pattern to determine whether user should be allowed access. A facial recognisation system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.
  • 9.
    Voice Patterns Biometric Systemscan also be used for user authentication. Voice Patterns Biometric Systems examine the unique characteristics of user’s voice. Signature recognition is a behavioral biometric. The dynamics is measured as a means of the pressure, direction, acceleration and the length of the strokes, dynamics number of strokes and their duration.
  • 10.
    Keystroke Biometric Systems examinethe unique characteristics of user’s keystrokes and use that information to determine whether the user should be allowed access.
  • 11.
    • Criminal identification •Prison security • ATM and other Financial Transactions • PC/LAN Login • Database access • Border crossing controls Biometrics • Costly • Facial imaging can also hinder accurate identifications. • Missing body part problem. • False acceptances and rejections. • The amount of comfort.
  • 12.
    Security Authentication E-commerce and E- governments SecureBanking and Financial Transaction Digital Rights Management Healthcare Application Crime Investigation Social Services
  • 13.
    Time Clocks orBiometric time and attendance systems, which are being increasingly used in various organizations to control employee timekeeping. Biometric safes and biometric locks, provides security to the homeowners. Biometric access control systems, providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities. Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards.
  • 14.
    Biometrics is avery interesting and exciting field that has be growing exponentially in recent years (especially 2001). While Biometric authentication can offer a high degree of security, they are far from perfect solution. The influences of biometric technology on society and the risks to privacy and threat to identify will require meditation through legislation. The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world.
  • 15.