Академический Документы
Профессиональный Документы
Культура Документы
Introduction to Biometrics Essential of Biometric what, why, how system model Biometric authentication methods Application domain of Biometric Future research Summary Conclusion
2
Aim
Objectives
Literature survey on Biometrics Understanding the essentials of Biometrics and safety concerns Importance of various Biometrics to minimize the security hazards in various applications.
4
Introducing
Way back in Japan, Henry Faulds studied the prints left behind by craftsmen on ancient clay fragments. He then came up with a convincing theory that each individual had unique finger prints.
A little later, a fellow worker was arrested by the police for a petty crime. Faulds exonerated the man by showing that the finger prints on the crime scene did not match with his friend Thus in the 1880s, began the journey of the most promising science of identification and recognition: BIOMETRICS.
5
Definition
What..?
Physiological traits Are the stable physical characteristics, such as palm prints and iris patterns.
Why BIOMETRICS?
The question always been; Isnt the 16-digit password or token good enough? But these Passwords or Tokens are
Breakable
Anyone with basic knowledge of computers can crack passwords Myriad free programs available on the Internet
The concept of Biometric is simple. As defined, a biometric system is a real-time identification system which identifies a person by measuring a particular physical or behavioral characteristic. The system has some pre-stored data. You approach the system, the trait or characteristic is scanned and matched with a record of prints already in its database. Only when it finds a match, access is granted. Comparing to a library of characteristics belonging to many people is important as it is necessary to adjust to the threshold and identify specific points of data as match points of a each persons library data.
9
Biometric Processes
contd..
Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic.
Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person.
10
Match score
Application
11
AUTHENTICATION METHODS
Physical Biometrics
Finger print DNA Iris Retina Face Hand geometry
Behavioral biometrics
Voice Signature Keystroke dynamics
12
Finger printing
Face recognition
14
DNA sample
Voice sample
15
16
Signature recognition
17
Iris authentication
18
Retina authentication
19
Reliability Security Performance Cost User acceptance Liveness detection Size of sensor
20
Application domains
Access control
To devices To local services To remote services
Future Research
With Biometrics, an automated biometricsbased identification / verification system. Research is intense on authentication methods such as Vein pattern , Ear shape , Body odor , Body salinity (salt). The next few years all will see just about every thing come with biometric protection. Mobile phones, MP3 players, cars, laptops, building access, locker access.
22
Summary
Safety Management aims at minimizing the chances of risks, threats or hazards to confidential information. With the rise of fraud, threats & thefts in and around our world, the importance of
The safety of vital information, Protection of information or data and Security measures are increasing, leading to growing relevance of skills in securing anything of importance. In other words, Rise & expansion of Biometrics.
23
Conclusion
Biometrics is a very interesting and exciting field that has be growing exponentially in recent years. The wide variety of physically unique traits our body gives us will soon allow us to live in a very secure password-less world. As the demands for high-performance and highly reliable biometrics-based identification/verification systems increase, more hybrid biometrics-based systems are expected to be developed to meet the ever-increasing needs for automated personal identification The goal is to provide a more secure working environment in a cost effective and user friendly way 24
A quote Uncertainty is the only certainty there is, and knowing how to live with insecurity is the only security.
John Allen Paulos quotes.
25
From now
BIOMETRICS
will be the door way to all accessible information
Thank you
26
Bibliography
www.biometricsinfo.org, retrieved on 6-3-2010 www.bioenabletech.com, retrieved on 7-3-2010 www.biometrix.at, retrieved on 7-3-2010 http://www.scribd.com/doc/23575097/Biometrics, retrieved on 73-2010 http://www.scribd.com/doc/21451971/IT-in-BusinessOrganisation, retrieved on 8-3-2010 http://www.scribd.com/doc/18797148/A-Turning-Point-forBiometrics, retrieved on 8-3-2010 http://www.scribd.com/doc/25087632/Business-Organisation, retrieved on 9-3-2010 Management Information system by Waman S Jawadekar Management Information system by Dharminder Kumar & Sangeeta Gupta 27