SlideShare a Scribd company logo
Submitted by : Zaki Anwer
Submitted to: Mr. Shiv Kumar
(Assistant Professor)
Enrolment No: MUR1800949
Course: B.Tech (CSE) 6th Semester
CONTENT
Introduction
Biometrics Identifier
Fingerprint Recognition
Face Recognition
Voice Recognition
Iris Recognition
Hand Geometry
DNA
Retina
INTRODUCTION
Refers to the identification of humans bytheir
characteristics or traits.
Many different aspects of human physiology,
chemistry or behavior can be used forbiometric
identification and authentication.
Rapid!
Know
Be Have
31,000
years
old are
surround
Prehistoric handprint
IN GENERAL
Biometrics can be sorted into two classes:
Physiological
Examples: face, fingerprint, hand
geometry and iris recognition
Behavioral
Examples: signature and voice
BLOCK DIAGRAM OF A BIOMETRIC DEVICE
BIOMETRIC IDENTIFIERS
Common:
Fingerprint Recognition
Face Recognition
Speaker Recognition
Iris Recognition
Hand Geometry
Signature verification
Others:
DNA
Retina recognition
Thermograms
Ear recognition
Skin reflection
Lip motion
Body odor
Brain Wave Pattern
Footprint and Foot
Dynamics
1. FINGERPRINT RECOGNITION
An extremely useful biometricstechnology
since fingerprints have long been
recognized as a primary and accurate
identification method.
Acquisition Devices
 Ink & paper – the oldest way
Ink-less Methods - sense the
ridges on a finger
“Livescan” fingerprint scanners
 Optical methods (FTIR)
 CMOS capacitance
 Thermal sensing
 Ultrasound sensing
APPLICATIONS
Identification, or 1-to-Many:
identifies a person from the entire
enrolled population.
Authentication, or 1-to-1: matches a
person's claimed identity to his/her
biometric and one or more other security
technologies (password, PIN, Token).
(See http://www.biometrics.dod.mil/bio101/index.aspx )
MINUTIAE
 Uses the ridge endings and bifurcation's on a
persons finger to plot points known as Minutiae
 The number and locations of the minutiae varyfrom
finger to finger in any particular person, and from
person to person for any particularfinger
Minutiae
Finger Image +
Minutiae
Finger Image
MATCHING APPROACHES
• Hybrid techniques (with improved accuracy)
Two basic classes of matching techniques:
Image techniques
Use both optical and numerical imagecorrelation
techniques
• Feature techniques
Extracts features and develop representations
from these features
Combining the above two techniques:
2. FACE RECOGNITION
•Uses an image or series of images either
from a camera or photograph to recognize a
person.
•Principle: analysis of the unique shape,
pattern and positioning of facial features.
FEATURES
Passive biometrics and does not require a
persons cooperation
Highly complex technology and largely
software based.
Primary advantage is that the biometric
system is able to operate “hands-free” and
a user’s identity is confirmed by simply
staring at the screen.
DETAILS
Source of data: Single image, video
sequence, 3Dimage and Near Infrared
Models: weak models of the human face
that model face shape in terms of facial
texture
 Face appearance
 Face geometry
EXAMPLES
Vision and Modeling Group
Face Recognition Demo
3. VOICE RECOGNITION
Voice recognition is not the same asspeech
recognition, it is speaker recognition
Considered both physiological and behavioral
Popular and low-cost, but less accurateand
sometimes lengthy enrollment
APPLICATION CATEGORIES
Fixedtext
T
extdependent
T
extindependent
Conversational
FEATURES
Advantage
Less requirements for users, such that they do not have to go
through a separate process for verification
 Very little hardware is required, and ideally suited to telephone-
based system for a remote identification
• Disadvantage
Acoustic features : 1. Misspoken or misread phrases; 2. The
human voice's tremendous variability, due to colds, aging, and
simple tiredness
 Can be captured surreptitiously by a third party and replayed
4. IRIS RECOGNITION
Analysis of the iris of the eye, which is the colored ring of tissue
that surrounds the pupil of the eye.
Based on visible features.
Widely regarded as the most safe, accurate biometrics technology
high speeds, High accuracy.
Example Iris Images
APPLICATIONS
Iris recognition is a highly
mature technology with a
proven track record in a
number of application areas.
Used very effectively all
over the world.
Heathrow Airport (London) - Iris
5.HAND GEOMETRY
• Hand geometry systems are commonly
available in two main forms. Full hand
geometry systems take an image of the entire
hand for comparison while Two Finger
readers only image two fingers of the hand.
• Hand recognition technology is currently one
of the most deployed biometrics disciplines
world wide
APPLICATIONS
BenGurion Airport - Hand Geometry INSPASS - Hand Geometry
see INS Passenger
Accelerated Service System
6. SIGNATURE VERIFICATION
Static/Off-line: the conventional way
Dynamic/On-line: using electronically instrumented
device
Principle: the movement of the pen during the signing
process rather than the static image of the signature.
Many aspects of the signature in motion can be studied,
such as pen pressure, the sound the pen makes
Applications
Examples of Commercial products:
• Cyber-SIGN PenOp
•CIC Communication Intelligence
Corp.
"The power to sign online"
For more technical information:
• IBM online signature verification
DNA
DNA has been called the “ultimate identifier”
Identify information from every cell in the body in a
digital form
Not yet fully automated, not fast and expensive
Theoretical limitation: Identical twins have the same
DNA
Privacy issue – DNA contains information about race,
paternity, and medical conditions for certain disease
COMPARISON CHART
DNA Conventional Biometrics
Requires an actual
physical sample
Uses an impression, image, or
recording
Not done in real-time; not
all stages of comparison
are automated
Done in real-time; automated
process
Does a comparison of
actual samples
Uses templates or feature extraction
II. RETINA RECOGNITION
The pattern of blood vessels that comes from
the optic nerve and disperse throughout the
retina depends on individuals and never
changes.
No two retinas are the same, evenin
identical twins.
Commercial products: RetinalTechnologies
THANK YOU

More Related Content

Similar to Zaki_Anwer Seminar PPT.pptx

Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
jackofhearty1
 
Biometric
BiometricBiometric
Biometric
NikhilKumar1203
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
Presentaionslive.blogspot.com
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
scg121433
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
SureshKumarMaurya5
 
Biometrics
BiometricsBiometrics
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
Kalyanam Kiran
 
Biometrics
BiometricsBiometrics
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
Swapnil Bangera
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
Ravi Kumar
 

Similar to Zaki_Anwer Seminar PPT.pptx (20)

Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometric
BiometricBiometric
Biometric
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Biometrics
BiometricsBiometrics
Biometrics
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 

More from Mewar University

Ekramul Haque AnsariMUR1800849.pdf
Ekramul Haque AnsariMUR1800849.pdfEkramul Haque AnsariMUR1800849.pdf
Ekramul Haque AnsariMUR1800849.pdf
Mewar University
 
CNC MILLING ^0 TURNING MACHINE.pptx
CNC MILLING ^0 TURNING MACHINE.pptxCNC MILLING ^0 TURNING MACHINE.pptx
CNC MILLING ^0 TURNING MACHINE.pptx
Mewar University
 
13Jaundice.pptx
13Jaundice.pptx13Jaundice.pptx
13Jaundice.pptx
Mewar University
 
Chest Physiotherapy.pptx
Chest Physiotherapy.pptxChest Physiotherapy.pptx
Chest Physiotherapy.pptx
Mewar University
 
coating ppt-1 Md Aman Raeen.pptx
coating ppt-1 Md Aman Raeen.pptxcoating ppt-1 Md Aman Raeen.pptx
coating ppt-1 Md Aman Raeen.pptx
Mewar University
 
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptxASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
Mewar University
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptx
Mewar University
 
Biometrics & Finger print Technology
Biometrics & Finger print Technology Biometrics & Finger print Technology
Biometrics & Finger print Technology
Mewar University
 

More from Mewar University (8)

Ekramul Haque AnsariMUR1800849.pdf
Ekramul Haque AnsariMUR1800849.pdfEkramul Haque AnsariMUR1800849.pdf
Ekramul Haque AnsariMUR1800849.pdf
 
CNC MILLING ^0 TURNING MACHINE.pptx
CNC MILLING ^0 TURNING MACHINE.pptxCNC MILLING ^0 TURNING MACHINE.pptx
CNC MILLING ^0 TURNING MACHINE.pptx
 
13Jaundice.pptx
13Jaundice.pptx13Jaundice.pptx
13Jaundice.pptx
 
Chest Physiotherapy.pptx
Chest Physiotherapy.pptxChest Physiotherapy.pptx
Chest Physiotherapy.pptx
 
coating ppt-1 Md Aman Raeen.pptx
coating ppt-1 Md Aman Raeen.pptxcoating ppt-1 Md Aman Raeen.pptx
coating ppt-1 Md Aman Raeen.pptx
 
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptxASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
ASAD REZA INDUSTRIAL TRAINING PRESENTATION (2).pptx
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptx
 
Biometrics & Finger print Technology
Biometrics & Finger print Technology Biometrics & Finger print Technology
Biometrics & Finger print Technology
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Zaki_Anwer Seminar PPT.pptx

  • 1. Submitted by : Zaki Anwer Submitted to: Mr. Shiv Kumar (Assistant Professor) Enrolment No: MUR1800949 Course: B.Tech (CSE) 6th Semester
  • 2. CONTENT Introduction Biometrics Identifier Fingerprint Recognition Face Recognition Voice Recognition Iris Recognition Hand Geometry DNA Retina
  • 3. INTRODUCTION Refers to the identification of humans bytheir characteristics or traits. Many different aspects of human physiology, chemistry or behavior can be used forbiometric identification and authentication. Rapid! Know Be Have
  • 5. IN GENERAL Biometrics can be sorted into two classes: Physiological Examples: face, fingerprint, hand geometry and iris recognition Behavioral Examples: signature and voice
  • 6. BLOCK DIAGRAM OF A BIOMETRIC DEVICE
  • 7. BIOMETRIC IDENTIFIERS Common: Fingerprint Recognition Face Recognition Speaker Recognition Iris Recognition Hand Geometry Signature verification Others: DNA Retina recognition Thermograms Ear recognition Skin reflection Lip motion Body odor Brain Wave Pattern Footprint and Foot Dynamics
  • 8. 1. FINGERPRINT RECOGNITION An extremely useful biometricstechnology since fingerprints have long been recognized as a primary and accurate identification method.
  • 9. Acquisition Devices  Ink & paper – the oldest way Ink-less Methods - sense the ridges on a finger “Livescan” fingerprint scanners  Optical methods (FTIR)  CMOS capacitance  Thermal sensing  Ultrasound sensing
  • 10. APPLICATIONS Identification, or 1-to-Many: identifies a person from the entire enrolled population. Authentication, or 1-to-1: matches a person's claimed identity to his/her biometric and one or more other security technologies (password, PIN, Token). (See http://www.biometrics.dod.mil/bio101/index.aspx )
  • 11. MINUTIAE  Uses the ridge endings and bifurcation's on a persons finger to plot points known as Minutiae  The number and locations of the minutiae varyfrom finger to finger in any particular person, and from person to person for any particularfinger Minutiae Finger Image + Minutiae Finger Image
  • 12. MATCHING APPROACHES • Hybrid techniques (with improved accuracy) Two basic classes of matching techniques: Image techniques Use both optical and numerical imagecorrelation techniques • Feature techniques Extracts features and develop representations from these features Combining the above two techniques:
  • 13. 2. FACE RECOGNITION •Uses an image or series of images either from a camera or photograph to recognize a person. •Principle: analysis of the unique shape, pattern and positioning of facial features.
  • 14. FEATURES Passive biometrics and does not require a persons cooperation Highly complex technology and largely software based. Primary advantage is that the biometric system is able to operate “hands-free” and a user’s identity is confirmed by simply staring at the screen.
  • 15. DETAILS Source of data: Single image, video sequence, 3Dimage and Near Infrared Models: weak models of the human face that model face shape in terms of facial texture  Face appearance  Face geometry
  • 16. EXAMPLES Vision and Modeling Group Face Recognition Demo
  • 17. 3. VOICE RECOGNITION Voice recognition is not the same asspeech recognition, it is speaker recognition Considered both physiological and behavioral Popular and low-cost, but less accurateand sometimes lengthy enrollment
  • 19. FEATURES Advantage Less requirements for users, such that they do not have to go through a separate process for verification  Very little hardware is required, and ideally suited to telephone- based system for a remote identification • Disadvantage Acoustic features : 1. Misspoken or misread phrases; 2. The human voice's tremendous variability, due to colds, aging, and simple tiredness  Can be captured surreptitiously by a third party and replayed
  • 20. 4. IRIS RECOGNITION Analysis of the iris of the eye, which is the colored ring of tissue that surrounds the pupil of the eye. Based on visible features. Widely regarded as the most safe, accurate biometrics technology high speeds, High accuracy.
  • 22. APPLICATIONS Iris recognition is a highly mature technology with a proven track record in a number of application areas. Used very effectively all over the world. Heathrow Airport (London) - Iris
  • 23. 5.HAND GEOMETRY • Hand geometry systems are commonly available in two main forms. Full hand geometry systems take an image of the entire hand for comparison while Two Finger readers only image two fingers of the hand. • Hand recognition technology is currently one of the most deployed biometrics disciplines world wide
  • 24. APPLICATIONS BenGurion Airport - Hand Geometry INSPASS - Hand Geometry see INS Passenger Accelerated Service System
  • 25. 6. SIGNATURE VERIFICATION Static/Off-line: the conventional way Dynamic/On-line: using electronically instrumented device Principle: the movement of the pen during the signing process rather than the static image of the signature. Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes
  • 26. Applications Examples of Commercial products: • Cyber-SIGN PenOp •CIC Communication Intelligence Corp. "The power to sign online" For more technical information: • IBM online signature verification
  • 27. DNA DNA has been called the “ultimate identifier” Identify information from every cell in the body in a digital form Not yet fully automated, not fast and expensive Theoretical limitation: Identical twins have the same DNA Privacy issue – DNA contains information about race, paternity, and medical conditions for certain disease
  • 28. COMPARISON CHART DNA Conventional Biometrics Requires an actual physical sample Uses an impression, image, or recording Not done in real-time; not all stages of comparison are automated Done in real-time; automated process Does a comparison of actual samples Uses templates or feature extraction
  • 29. II. RETINA RECOGNITION The pattern of blood vessels that comes from the optic nerve and disperse throughout the retina depends on individuals and never changes. No two retinas are the same, evenin identical twins. Commercial products: RetinalTechnologies