Вы находитесь на странице: 1из 21

by Manikanta. S (C.S.E) Siddhartha. P (C.S.

E)

Introduction Principle How the IDEA took up? Architecture (working) Biometrics Classification Applications of Biometric Systems Limitations Future of Biometrics Conclusion

Definition:

Biometrics is the identification or verification of Human identity through the measurement of repeatable physiological and behavioral characteristics

By using biometrics a person could be identified based on "who she/he is" rather then "what she/he has" (card, token, key) or "what she/he knows"(password, PIN).

Enrollment principle :

A sample of the biometric trait is captured, processed by a computer, and stored for later comparison.
Verification principle :

In this mode biometric system authenticates a persons claimed identity from their previously enrolled pattern.

An Idea is nothing but a spark of intelligence


Tempting of Science-Fiction(SCI-FI) futuristic Technology Joao de Barros Bertillonage Richard Edward Henry

Major components of a biometric system:


Data collection Signal processing Matching Decision Storage Transmission

Raw data Data collection

Extracted features Signal processing

Template Matching Storage

Match score

Application

Decision Authentication decision

It can be sorted into two classes

1. Physiological : They are related to the shape of the body.


Examples- Face, Fingerprints, hand geometry and iris recognition, DNA
Finger Prints

2.Behavoral :
They are related to the behavior of a person. Examples -signature and voice.

Bio-Signature Pen

Physical
Head
Hand

Behavioral
Others (Gesture, gait, Keystroke)

Signature

Voice

Face Iris Others (Ear, Retina, Dental) Finger print Palm print Others (finger)

Hand Geometry

Various Biometrics types:


DNA Fingerprinting Face Recognition Fingerprint Hand & Finger Geometry Iris Scan Retina Scan Signature Verification Voice Recognition

Signature Verification
Physical Activity of Signing: Stroke Order, Pressure applied & Speed measured Used in providing access to Documents, Banking Services, etc

Voice Recognition
Based on Shape & Size of

Vocal Tracts, Mouth,

Nasal Cavity and Lips

Used in Phone Based Applications


Demerits: Sensitive to noise, Not appropriate for large scale application

DNA Fingerprinting
0.1% DNA would be unique for a person Identical Twins do not have same DNA

Used in Forensic Application, Paternity Determination, etc

Iris Scan
Scans over 200 points of the Iris

Used in ID Cards, Passports, Border Control,

Restricted Areas

Hand Scan

Hand-scan reads the top and sides of the hands and fingers, using such metrics as the height of the fingers, distance between joints, and shape of the knuckles.

Fingerprint

A fingerprint image is read from a capture device, features are extracted from the image, and a template is created.

Depends on the application


reliability security performance cost user acceptance liveness detection users that are unsuitable size of sensor

APPLICATION :
Physical access control
To high security areas To public buildings or areas

Time & attendance control Identification


Forensic person investigation Social services applications, e.g. immigration or prevention of welfare fraud Personal documents, e.g. electronic drivers license or ID card

APPLICATION :
Access control
To devices Cellular phones Logging in to computer, laptop, or PDA Cars Guns, gun safes To local services Debitting money from cash dispenser Accessing data on smartcard

Limitations Of Biometric Systems


Noise in Sensed Data Intra-class Variations Distinctiveness Non-universality Spoof Attacks

Plays a Major role in Private Industries There will be a popular tendency which can be regarded as a SCI-FI technology Biometric is a Future of security which leads to the accurate identification It will Further develops to a 3D face Recognitions Technology and handles the visitors management

Biometric technology has great potential


There are many biometric products around, based on different biometric technologies Shortcomings of biometric systems due to manufacturers ignorance of security concerns lack of quality control

Вам также может понравиться