Вы находитесь на странице: 1из 18

 The advancement of science and technology is directly

proportional to the advancement of time.


 As we are swimming in the current of time we are
gradually getting or experiencing more and more
advanced form of technologies .
 These technologies are greatly affecting not only to the
living beings but also almost all non living forms available
throughout the world and making the world to change
accordingly compelling the living forms to demand more
and more to adapt with the changing corporate world.
 Here we will discuss about some form of technologies.
 The word biometrics has come from two Greek words
 Bios-life and meteron-to measure. So biometrics is the
measurement of biological data.
 Biometrics is the science and technology of
measuring and analyzing biological data.
 Biometrics is the technologies used to establish
a person’s identity, accurately, reliably and
safely.
 In IT, biometrics refers to the technologies that
measure and analyze human body
characteristics such as fingerprints, eye retinas
and iris, voice patterns, facial reorganization.
 Biometrics is based on a very simple principle
that every organism or individual existing in this
world are unique.
 Even if in case of twins we can not say that they
are exactly same. So to prove this biometrics is
a useful technology .
 Biometrics is based on exactly that principle.
First the technology registers an individual.
 When that individual wants to enter a system,
the system needs the sample. If the sample is
matched, the person user is authenticated and
granted to access.
 A sensor that collects the data and converts them into
a digital format.
 Signal processing algorithm performs quality control
activities and develop the biometric template.
 A data storage component keeps the information that
new biometrics templates will be compared to.
 A matching algorithm compares the new biometric
templates to data in storage.
 A decision process uses the results from the matching
algorithm to make a system level decision.
 These are biometrics which use a physical trait,
such as a fingerprint, iris, hand or face for
recognition.

 This involves the use of a behavior trait or


pattern, such as a voice, signature or key stroke.
These traits are stored in a similar way to the
physiological traits except they are updated
regularly to cope with the ever changing patterns
in the trait.
Cognitive biometrics
Cognitive biometrics is based on specific
responses of the brain to stimuli which could be
used to trigger a computer database search.
Currently, cognitive biometrics systems are being
developed to
use brain response to odor stimuli, facial
perception and mental performance for search at
ports and high security areas.
 This is when the device/networked server hold a database
of the registered users and the presented trait is
authorized by searching that database to establish a
match. In theory the device is asking “Do I know you?”.
This method of identification is called one to many (1: N).

•The theory to this is that the device is asking “Are you who
you claim to be?” By presenting an user id number or a
Smartcard (containing the biometric algorithm) you announce
who you claim to be. In order to prove that this id number or
Smartcard belongs to you, you are asked to prove this
identity by presenting the biometric trait directly to the device.
You are authorized if they match. This method is called one to
one (1:1).
•Performance measure—concept of FRR and FAR.
MODE HOW IT WORKS
Face Recognition A camera captures the image of a face. Features and discrete
areas of his face are analyzed.

Fingerprint scan Converts the image of a fingerprint into a mathematical template


of the print's minutiae points

Iris Recognition A video camera shoots an image of the eye. The patterns of the
iris are converted into digitized code. The code is compared with
a database of iris codes.

Keystroke Dynamics The system analyses the characteristics rhythm of a


person's typing.

Hand Geometry A picture of the hand is taken and salient features are examined.
These include 3D shape, length, width of fingers and shape of
knuckles.

Retinal scan User's position their eye in proximity to a retinal reader and focus
their sight on an illuminated target inside the reader. An image of the
retina's blood vessel pattern is saved in a file.

Voice verification The user states a pass phrase into a microphone or


telephone handset.
 What is a fingerprint?
Finger skin is made of friction ridges, with pores (sweat
glands).
Endings -The points at which a ridge
stops.
Dots - Very small ridges.
Bifurcation-The point at which the ridge is
divided into two.
Islands-- Ridges slightly longer than dots.
Ponds—Empty spaces between two
temporarily divergent ridges.
Crossover—two ridges which cross each
other.
Core –The inner point where the loop
starts.
Deltas—these are the points at the lower
left and right hand of a fingerprint
 While the overall appearances of monozygotic
(identical) twins' fingerprints is often similar (a and c),
they differ in the fine details (the locations of ridge
starting and stopping); in addition, they are no more
similar to each other than to some prints of unrelated
individuals (b).
 Among all the biometric techniques, fingerprint-based
identification is the oldest method which has been
successfully used in numerous applications. Everyone is
known to have unique, immutable fingerprints.
 The classified fingerprints are of five classes,
namely, whorl, right loop, left loop, arch, and
tented arch. The algorithm separates the number
of ridges present in four directions (0 degree, 45
degree, 90 degree, and 135 degree) by filtering
the central part of a fingerprint with a bank of
Gabor filters.
 A critical step in automatic fingerprint matching is to automatically
and reliably extract minutiae from the input fingerprint images.
 The algorithm have developed a fast fingerprint enhancement
algorithm, which can adaptively improve the clarity of ridge and
furrow structures of input fingerprint images based on the
estimated local ridge orientation and frequency.
 Biometrics directly authenticates  In Iris recognition, it is relatively
the person, not indirectly through expensive; requires large amount
a password or token. of computer storage; may not be
 Biometrics features are difficult generally accepted by public.
to steal; thereby making  In Voice verification Works well
biometrics authentication very over the telephone but requires
strong. large amount of computer
 The Biometrics feature is storage; people's voices can
eminently portable, and is change; background noises can
unlikely to be lost. interfere.
 Another advantage of biometrics  When the data collected from the
authentication systems is user user passes through the system,
cannot forget his retina or the data is not encrypted at all.
fingerprint, while a password and
username are easily forgotten.
•Biometrics technology is really playing a great
roll in today’s world in providing security to
computers and various networks, thus
creating a message of reliability among the
computer systems and networks as well as for
the whole corporate world.

Вам также может понравиться