SlideShare ist ein Scribd-Unternehmen logo
1 von 33
- MAJ PRAVEEN TRIPATHI
A -SYN
AIM
TO ACQUAINT THE CLASS WITH THE
CONCEPT AND APPLICATION OF
BIOMETRICS.
PHASES
PHASE I INTRODUCTION
PHASE II HISTORY OF BIOMETRICS
PHASE III CATEGORIES OF BIOMETRICS
PHASE IV VARIOUS BIOMETRIC SYSTEMS
PHASE V FUTURE TRENDS
PHASE I
INTRODUCTION
 WHAT IS BIOMETRICS?
GREEK “BIO” AND “METRICS”
 BIOMETRICS IS A TECHNOLOGY THAT INVOLVES
AUTHENTICATION TECHNIQUES OF INDIVIDUALS
 BASED ON THEIR PERSONAL OR PHYSICAL ATTRIBUTES.
 STRONG OR TWO-FACTOR AUTHENTICATION IS
BECOMING A DE FACTO STANDARD IN SECURE
COMPUTING ENVIRONMENT.
 STRONG AUTHENTICATION CAN BE COUPLED WITH
PIN , PASSWORD OR A SMART CARD.
 BY REPLACING PINs , BIOMETRIC TECHNIQUES CAN
PREVENT UNAUTHORIZED ACCESS TO :
 ATMs
 CELL PHONES
 SMART CARDS
 DESKTOP PCs
 WORKSTATIONS
PHASE II
HISTORY OF BIOMETRICS
 14TH CENTURY : MERCHANTS IN CHINA USED
CHILDREN’S PALM AND FOOTPRINTS TO DISTINGUISH
THEM FROM ONE ANOTHER.
 19TH CENTURY : ALPHOSE BERTILLON A POLICE CLERK
IN PARIS INVENTED ANTHROPOMETRY . THE SYSTEM
WAS CALLED BERTILLONAGE.
 LATE 19TH CENTURY: FINGERPRINTING STARTED BY
ANTHROPOLOGIST SIR FRANCIS GALTON.
 LATE 20TH CENTURY : AUTOMATED BIOMETRIC
TECHNIQUES STARTED
1993 - FIRST IRIS IDENTIFICATION SYSTEM.
1994 - FIRST IRIS RECOGNITION ALGORITHM WAS
PATENTED
PHASE III
CATEGORIES OF BIOMETRICS
 TWO MODES OF BIOMETRIC SYSTEMS:
VERIFICATION MODE – ONE-TO-ONE COMPARISON OF
CAPTURED BIOMETRIC WITH THE SPECIFIC
TEMPLATE.
IDENTIFICATION MODE – ONE-TO-MANY
COMPARISON AGAINST A BIOMETRIC DATABASE TO
ESTABLISH THE IDENTITY OF AN UNKNOWN
INDIVIDUAL.
 POSITIVE AND NEGATIVE RECOGNITION : NEGATIVE
RECOGNITION USED GENERALLY IN FORENSICS.
BIOMETRIC SYSTEM: BASIC BLOCK DIAGRAM
 ENROLLMENT WHEN SYSTEM IS USED FOR THE FIRST
TIME.
 SENSOR THE INTERFACE BETWEEN THE REAL WORLD &
SYSTEM.
 PRE-PROCESSING ENHANCES THE INPUT BY REMOVING
BACKGROUND NOISE, REMOVING ARTIFACTS FROM THE
SENSOR.
 TEMPLATE GENERATOR GENERATES A TEMPLATE FROM
THE SOURCE.
 MATCHER USES MATCHING ALGORITHM TO COMPARE
TEMPLATES.
PERFORMANCE METRICS
 EXTREMELY SENSITIVE – MAY CAUSE FALSE POSITIVES &
FALSE NEGATIVES.
 SHOULD BE CALIBRATED TO ENSURE ACCURACY.
 FALSE ACCEPT RATE OR FALSE MATCH RATE (FAR/FMR)
PROBABILITY OF INCORRECTLY MATCHING THE INPUT
PATTERN TO NON-MATCHING TEMPLATE IN DATABASE.
TYPE II ERRORS MOST DANGEROUS
 FALSE REJECT RATE OR FALSE NON-MATCH
RATE(FRR/FNMR) PROBABILITY OF FAILING TO MATCH
BETWEEN THE INPUT PATTERN & A MATCHING TEMPLATE
IN DATABASE.
TYPE I ERRORS
 RELATIVE OPERATING CHARACTERISTIC(ROC) CURVE IS
A VIRTUAL CHARACTERIZATION BETWEEN THE FAR &
FRR.
 MATCHING ALGORITCISION GIVES DECISION BASED ON A
THRESHOLD.
 THRESHOLD DIRECTLY PROPORTIONAL TO FRR &
INVERSELY PROPORTIONAL TO FAR.
 CROSSOVER ERROR RATE(CER)
-RATE AT WHICH BOTH ERRORS ARE EQUAL.
-OBTAINED BY ROC CURVE.
-DEVICE WITH LOWEST CER IS THE MOST ACCURATE.
 FAILURE TO ENROLL RATE(FTR) RATE AT WHICH
ATTEMPTS TO CREATE A TEMPLATE FROM AN INPUT ARE
UNSUCCESSFUL.
 FAILURE TO CAPTURE RATE(FTC) PROBABILITY THAT THE
SYSTEM FAILS TO DETECT A BIOMETRIC INPUT.
 TEMPLATE CAPACITY MAX NUMBER OF SETS OF DATA
WHICH CAN BE STORED IN THE SYSTEM.
PHASE IV
VARIOUS BIOMETRIC SYSTEMS
FINGERPRINT
 HUMAN FINGERPRINTS ARE
MADE UP OF RIDGE ENDINGS
& BIFURCATIONS & OTHER
DETAILED CHARACTERISTICS
CALLED MINUTIAE.
 HAS AN EDGE OVER OTHER
ELECTRONIC ACCESS
CONTROL DEVICES.
 BEING INCORPORATED IN DAY TO DAY LIFE LIKE
LAPTOPS, CELL PHONES, CARS & HOUSE/HOTEL
SECURITY.
 BIOMETRIC FINGERPRINTING IS DIFFERENT FROM THAT
OF FORENSICS AS IT ONLY EXTRACTS SPECIFIC
FEATURES FOR LESSER HARD DRIVE SPACE &
QUICKER DATABASE LOOKUPS.
PALM SCAN
 PALM SCANNER RECOGNITION SYSTEMS MEASURE &
ANALYZE THE OVERALL STRUCTURE, SHAPE &
PROPORTIONS OF THE HAND.
 IT INCLUDES THE FIVE FINGERPRINTS ALSO.
 CHARACTERISTICS OF SKIN SURFACE.
HAND GEOMETRY
 SHAPE OF A PERSON’S HAND DEFINES HAND GEOMETRY.
 PERSON PLACES HAND ON A DEVICE THAT HAS
GROOVES FOR EACH FINGER.
 SYSTEM COMPARES THE GEOMETRY OF EACH FINGER &
THE HAND AS A WHOLE TO THE INFORMATION IN A
REFERENCE FILE TO VERIFY THE PERSONS IDENTITY.
RETINA SCAN
 DUE TO COMPLEX STRUCTURE OF BLOOD SUPPLYING
CAPILLARIES, EACH PERSONS RETINA IS UNIQUE.
 RETINA REMAINS UNCHANGED FROM BIRTH TILL DEATH.
 THE BLOOD VESSELS WITHIN RETINA ABSORB LIGHT
MORE READILY THAN THE SURROUNDING TISSUE & ARE
EASILY IDENTIFIED WITH APPROPRIATE LIGHTING.
IRIS SCAN
 AUTOMATED METHOD OF BIOMETRIC IDENTIFICATION THAT
USES MATHEMATICAL PATTERN- RECOGNITION TECHNIQUES
ON VIDEO IMAGES OF THE IRISES OF AN INDIVIDUAL’S EYES.
 UNLIKE RETINAL SCAN,
IRIS RECOGNITION USES
CAMERA TECHNOLOGY
WITH INFRARED ILLUM
TO ACQUIRE IMAGES OF
THE DETAIL RICH, INTRICATE
STRUCTURES OF THE IRIS.
 DIGITAL TEMPLATES ENCODED FROM THESE PATTERNS BY
MATHEMATICAL & STATISTICAL ALGORITHMS ALLOW
UNAMBIGUOUS POSITIVE IDENTIFICATION OF AN INDIVIDUAL.
 THE KEY ADVANTAGE OF IRIS RECOGNITION IS THE STABILITY OF
THE IRIS AS AN INTERNAL , PROTECTED, YET EXTERNALLY VISIBLE
ORGAN OF THE EYE.
 THE CORE ALGORITHMS THAT UNDERLIE IRIS RECOGNITION WERE
DEVELOPED IN THE 1990s BY PROF JOHN DOUGMAN AT UNIVERSITY
OF CAMBRIDGE COMPUTER LAB.
 AS OF 2008, DAUGMAN`S ALGORITHMS ARE THE BASIS OF ALL
COMMERCIALLY DEVELOPED IRIS RECOG SYSTEMS.
FACIAL SCAN
 THIS TECH LOOKS AT SPECIFIC
PARTS OF THE FACE THAT DO NOT
CHANGE SIGNIFICANTLY OVER TIME,
SUCH AS
- UPPER SECTION OF EYE SOCKETS
- AREA SURROUNDING CHEEK
BONES.
- SIDES OF MOUTH.
- DISTANCE BETWEEN THE EYES.
 A COLLECTION OF FACE IMAGES IS USED TO GENERATE
A 2D GRAY-SCALE IMAGE TO PRODUCE A BIOMETRIC
TEMPLATE.
 HIGHLY SENSITIVE SECURITY ENVIRONMENT , SEVERAL
CAMERAS AT DIFFERENT ANGLES SHOULD BE USED TO
PRODUCE AN EXACT SAMPLE.
 TEST FOR LIVENESS- BLINKING OF EYES.
 FACIAL RECOGNITION IS GENERALLY SUBJECT TO
LARGER MARGINS OF ERROR THAN MORE ESTABLISHED
BIOMETRICS SUCH AS FINGERPRINT RECOG.
SIGNATURE DYNAMICS
 DYNAMIC SIGNATURE CAPTURES DISTINCT
BEHAVIOURAL CHARACTERISTICS OF AN INDIVIDUAL`S
SIGNATURE.
 INCL SHAPE, SPEED, STROKE, PEN PRESSURE & TIMING
INFORMATION.
 CONSISTS OF A PEN & A SPECIALIZED WRITING TABLET &
ARE CONNECTED TO A LOCAL OR CENTRAL COMPUTER
FOR TEMPLATE PROCESSING & VERIFICATION.
 INDL MUST SIGN THEIR NAME MULTIPLE TIMES ON THE
TABLET.
 SYSTEM EXTRACTS UNIQUE FEATURES FROM IT LIKE
THE TIME UTILIZED, PRESSURE APPLIED FROM THE PEN,
THE SPEED, OVERALL SIZE & VARIOUS DIRECTIONS OF
STROKES IN THE SIGNATURE.
KEYSTROKE DYANAMICS
 THE KEYSTROKE RHYTHMS OF A USER ARE MEASURED
TO DEVELOPED A UNIQUE BIOMETRIC TEMPLATE OF THE
USERS TYPING PATTERN FOR FUTURE AUTHENTICATION.
 SYSTEM DETERMINES DWELL TIME (THE TIME A KEY
PRESSED) & FLIGHT TIME (TIME BETWEEN KEY UP & THE
NEXT KEY DOWN)
 THE RECORDED KEYSTROKE TIMING DATA IS THEN
PROCESSED THROUGH A UNIQUE ALGORITHM, WHICH
DETERMINES A PRIMARY PATTERN FOR FUTURE
COMPARISON.
VOICE PRINT
 OUR VOICE IS UNIQUE BECAUSE OF THE SHAPE OF OUR
VOCAL CAVITIES & WAY WE MOVE OUR MOUTH WHILE
SPEAKING.
 TO ENROLL IN A VOICE PRINT SYS ONE SHOULD SAY THE
EXACT WORDS AND PHRASES THAT IT REQUIRES.
 DATA USED IN A VOICE PRINT IS A SOUND
SPECTROGRAM.
 A SPECTROGRAM IS BASICALLY A GRAPH THAT SHOWS A
SOUND’S FREQUENCY ON THE VERTICAL AXIS & TIME ON
THE HORIZONTAL AXIS.
 DIFFERENT SPEECH SOUNDS CREATE DIFFERENT
SHAPES WITHIN THE GRAPH.
 SPECTROGRAMS ALSO USE COLORS OR SHADES TO
REPRESENT THE ACOUSTICAL QUALITIES OF SOUND.
PHASE V
FUTURE TRENDS
 THE FUTURE OF BIOMETRICS HOLDS GREAT PROMISE
FOR LAW ENFORCEMENT APPLICATIONS.
 IT IS QUICKLY BECOMING RECOGNIZED AS THE MOST
ACCURATE IDENTIFICATION TECHNOLOGY IN THE
MARKET.
 ACCESS CONTROL FACIAL RECOGNITION
BIOMETRIC TECHNOLOGIES WILL PERMIT AUTH USERS
ENTRY TO A PROPERTY .
IN FUTURE THE SUBJECT WILL NOT HAVE TO STAND
NEAR THE SURVEILLANCE CAMERAS.
 FACIAL RECOGNITION PASSIVE SURVEILLANCE HIDDEN
SURVEILLANCE CAMS WILL BE SET TO MONITOR AN AREA
TO ACCURATELY IDENTIFY A SUSPECT AGAINST A
DATABASE OF MILLIONS IN A SECOND.
 ALERT MANAGEMENT THIS IS A FULLY CUSTOMISABLE
COMMAND CENTER TO GUARD AGAINST POTENTIAL
SECURITY BREECHES.
 CENTER USES REAL-TIME TECHNOLOGIES TO DELIVER
SECURITY ALERTS TO MULTIPLE LOCATIONS THROUGH
PDA AND OTHER MOBILE TECHNOLOGIES.
 FOR BIOMETRICS FIELD TO GROW INDUSTRY
STANDARDS MUST EXIST SO THAT THERE IS THE
GREATEST COMPATIBILITY BETWEEN APPLICATIONS AND
HARDWARE.
CONCLUSION
BIOMETRICS IS THOUGH EXPENSIVE IS A
TECHNOLOGY THAT CAN SIMPLIFY THE PROCESS
OF AUTHENTICTION. THE WIDE VARIETY OF
PHYSICALLY UNIQUE TRAITS GOD HAS GIVEN US
WILL SOON ALLOW US TO LIVE IN A VERY SECURE
PASSWORD-LESS WORLD.
ANY QUESTIONS ???

Weitere ähnliche Inhalte

Ähnlich wie Biometrics ... by maj praveen tripathi

Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
I0363068074
I0363068074I0363068074
I0363068074theijes
 
Palm Authentication using Biometrics system
Palm Authentication using Biometrics systemPalm Authentication using Biometrics system
Palm Authentication using Biometrics systemDarshan Parate
 
Mohs Scale of Hardness
Mohs Scale of HardnessMohs Scale of Hardness
Mohs Scale of HardnessMarisha Gupta
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Shannon weaver modell
Shannon weaver modellShannon weaver modell
Shannon weaver modellcsereijudit
 
blockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptxblockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptxanupamas0191
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEArab Federation for Digital Economy
 
The Application of Emerging Technologies to Saving Lives at Sea
The Application of Emerging Technologies to Saving Lives at SeaThe Application of Emerging Technologies to Saving Lives at Sea
The Application of Emerging Technologies to Saving Lives at SeaLloyd's Register
 

Ähnlich wie Biometrics ... by maj praveen tripathi (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
I0363068074
I0363068074I0363068074
I0363068074
 
Palm Authentication using Biometrics system
Palm Authentication using Biometrics systemPalm Authentication using Biometrics system
Palm Authentication using Biometrics system
 
Mohs Scale of Hardness
Mohs Scale of HardnessMohs Scale of Hardness
Mohs Scale of Hardness
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Shannon weaver modell
Shannon weaver modellShannon weaver modell
Shannon weaver modell
 
Steganography
SteganographySteganography
Steganography
 
Biometrics
BiometricsBiometrics
Biometrics
 
blockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptxblockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptx
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
LIVING MACHINES
LIVING MACHINESLIVING MACHINES
LIVING MACHINES
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAE
 
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
 
The Application of Emerging Technologies to Saving Lives at Sea
The Application of Emerging Technologies to Saving Lives at SeaThe Application of Emerging Technologies to Saving Lives at Sea
The Application of Emerging Technologies to Saving Lives at Sea
 
Brainwave seminar
Brainwave seminarBrainwave seminar
Brainwave seminar
 
Biometrics
BiometricsBiometrics
Biometrics
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Biometrics ... by maj praveen tripathi

  • 1. - MAJ PRAVEEN TRIPATHI A -SYN
  • 2. AIM TO ACQUAINT THE CLASS WITH THE CONCEPT AND APPLICATION OF BIOMETRICS.
  • 3. PHASES PHASE I INTRODUCTION PHASE II HISTORY OF BIOMETRICS PHASE III CATEGORIES OF BIOMETRICS PHASE IV VARIOUS BIOMETRIC SYSTEMS PHASE V FUTURE TRENDS
  • 5.  WHAT IS BIOMETRICS? GREEK “BIO” AND “METRICS”  BIOMETRICS IS A TECHNOLOGY THAT INVOLVES AUTHENTICATION TECHNIQUES OF INDIVIDUALS  BASED ON THEIR PERSONAL OR PHYSICAL ATTRIBUTES.  STRONG OR TWO-FACTOR AUTHENTICATION IS BECOMING A DE FACTO STANDARD IN SECURE COMPUTING ENVIRONMENT.
  • 6.  STRONG AUTHENTICATION CAN BE COUPLED WITH PIN , PASSWORD OR A SMART CARD.  BY REPLACING PINs , BIOMETRIC TECHNIQUES CAN PREVENT UNAUTHORIZED ACCESS TO :  ATMs  CELL PHONES  SMART CARDS  DESKTOP PCs  WORKSTATIONS
  • 7. PHASE II HISTORY OF BIOMETRICS
  • 8.  14TH CENTURY : MERCHANTS IN CHINA USED CHILDREN’S PALM AND FOOTPRINTS TO DISTINGUISH THEM FROM ONE ANOTHER.  19TH CENTURY : ALPHOSE BERTILLON A POLICE CLERK IN PARIS INVENTED ANTHROPOMETRY . THE SYSTEM WAS CALLED BERTILLONAGE.  LATE 19TH CENTURY: FINGERPRINTING STARTED BY ANTHROPOLOGIST SIR FRANCIS GALTON.  LATE 20TH CENTURY : AUTOMATED BIOMETRIC TECHNIQUES STARTED 1993 - FIRST IRIS IDENTIFICATION SYSTEM. 1994 - FIRST IRIS RECOGNITION ALGORITHM WAS PATENTED
  • 10.
  • 11.  TWO MODES OF BIOMETRIC SYSTEMS: VERIFICATION MODE – ONE-TO-ONE COMPARISON OF CAPTURED BIOMETRIC WITH THE SPECIFIC TEMPLATE. IDENTIFICATION MODE – ONE-TO-MANY COMPARISON AGAINST A BIOMETRIC DATABASE TO ESTABLISH THE IDENTITY OF AN UNKNOWN INDIVIDUAL.  POSITIVE AND NEGATIVE RECOGNITION : NEGATIVE RECOGNITION USED GENERALLY IN FORENSICS.
  • 12. BIOMETRIC SYSTEM: BASIC BLOCK DIAGRAM
  • 13.  ENROLLMENT WHEN SYSTEM IS USED FOR THE FIRST TIME.  SENSOR THE INTERFACE BETWEEN THE REAL WORLD & SYSTEM.  PRE-PROCESSING ENHANCES THE INPUT BY REMOVING BACKGROUND NOISE, REMOVING ARTIFACTS FROM THE SENSOR.  TEMPLATE GENERATOR GENERATES A TEMPLATE FROM THE SOURCE.  MATCHER USES MATCHING ALGORITHM TO COMPARE TEMPLATES.
  • 14. PERFORMANCE METRICS  EXTREMELY SENSITIVE – MAY CAUSE FALSE POSITIVES & FALSE NEGATIVES.  SHOULD BE CALIBRATED TO ENSURE ACCURACY.  FALSE ACCEPT RATE OR FALSE MATCH RATE (FAR/FMR) PROBABILITY OF INCORRECTLY MATCHING THE INPUT PATTERN TO NON-MATCHING TEMPLATE IN DATABASE. TYPE II ERRORS MOST DANGEROUS  FALSE REJECT RATE OR FALSE NON-MATCH RATE(FRR/FNMR) PROBABILITY OF FAILING TO MATCH BETWEEN THE INPUT PATTERN & A MATCHING TEMPLATE IN DATABASE. TYPE I ERRORS
  • 15.  RELATIVE OPERATING CHARACTERISTIC(ROC) CURVE IS A VIRTUAL CHARACTERIZATION BETWEEN THE FAR & FRR.  MATCHING ALGORITCISION GIVES DECISION BASED ON A THRESHOLD.  THRESHOLD DIRECTLY PROPORTIONAL TO FRR & INVERSELY PROPORTIONAL TO FAR.  CROSSOVER ERROR RATE(CER) -RATE AT WHICH BOTH ERRORS ARE EQUAL. -OBTAINED BY ROC CURVE. -DEVICE WITH LOWEST CER IS THE MOST ACCURATE.
  • 16.  FAILURE TO ENROLL RATE(FTR) RATE AT WHICH ATTEMPTS TO CREATE A TEMPLATE FROM AN INPUT ARE UNSUCCESSFUL.  FAILURE TO CAPTURE RATE(FTC) PROBABILITY THAT THE SYSTEM FAILS TO DETECT A BIOMETRIC INPUT.  TEMPLATE CAPACITY MAX NUMBER OF SETS OF DATA WHICH CAN BE STORED IN THE SYSTEM.
  • 18. FINGERPRINT  HUMAN FINGERPRINTS ARE MADE UP OF RIDGE ENDINGS & BIFURCATIONS & OTHER DETAILED CHARACTERISTICS CALLED MINUTIAE.  HAS AN EDGE OVER OTHER ELECTRONIC ACCESS CONTROL DEVICES.  BEING INCORPORATED IN DAY TO DAY LIFE LIKE LAPTOPS, CELL PHONES, CARS & HOUSE/HOTEL SECURITY.
  • 19.  BIOMETRIC FINGERPRINTING IS DIFFERENT FROM THAT OF FORENSICS AS IT ONLY EXTRACTS SPECIFIC FEATURES FOR LESSER HARD DRIVE SPACE & QUICKER DATABASE LOOKUPS. PALM SCAN  PALM SCANNER RECOGNITION SYSTEMS MEASURE & ANALYZE THE OVERALL STRUCTURE, SHAPE & PROPORTIONS OF THE HAND.  IT INCLUDES THE FIVE FINGERPRINTS ALSO.  CHARACTERISTICS OF SKIN SURFACE.
  • 20. HAND GEOMETRY  SHAPE OF A PERSON’S HAND DEFINES HAND GEOMETRY.  PERSON PLACES HAND ON A DEVICE THAT HAS GROOVES FOR EACH FINGER.  SYSTEM COMPARES THE GEOMETRY OF EACH FINGER & THE HAND AS A WHOLE TO THE INFORMATION IN A REFERENCE FILE TO VERIFY THE PERSONS IDENTITY.
  • 21. RETINA SCAN  DUE TO COMPLEX STRUCTURE OF BLOOD SUPPLYING CAPILLARIES, EACH PERSONS RETINA IS UNIQUE.  RETINA REMAINS UNCHANGED FROM BIRTH TILL DEATH.  THE BLOOD VESSELS WITHIN RETINA ABSORB LIGHT MORE READILY THAN THE SURROUNDING TISSUE & ARE EASILY IDENTIFIED WITH APPROPRIATE LIGHTING.
  • 22. IRIS SCAN  AUTOMATED METHOD OF BIOMETRIC IDENTIFICATION THAT USES MATHEMATICAL PATTERN- RECOGNITION TECHNIQUES ON VIDEO IMAGES OF THE IRISES OF AN INDIVIDUAL’S EYES.  UNLIKE RETINAL SCAN, IRIS RECOGNITION USES CAMERA TECHNOLOGY WITH INFRARED ILLUM TO ACQUIRE IMAGES OF THE DETAIL RICH, INTRICATE STRUCTURES OF THE IRIS.  DIGITAL TEMPLATES ENCODED FROM THESE PATTERNS BY MATHEMATICAL & STATISTICAL ALGORITHMS ALLOW UNAMBIGUOUS POSITIVE IDENTIFICATION OF AN INDIVIDUAL.
  • 23.  THE KEY ADVANTAGE OF IRIS RECOGNITION IS THE STABILITY OF THE IRIS AS AN INTERNAL , PROTECTED, YET EXTERNALLY VISIBLE ORGAN OF THE EYE.  THE CORE ALGORITHMS THAT UNDERLIE IRIS RECOGNITION WERE DEVELOPED IN THE 1990s BY PROF JOHN DOUGMAN AT UNIVERSITY OF CAMBRIDGE COMPUTER LAB.  AS OF 2008, DAUGMAN`S ALGORITHMS ARE THE BASIS OF ALL COMMERCIALLY DEVELOPED IRIS RECOG SYSTEMS.
  • 24. FACIAL SCAN  THIS TECH LOOKS AT SPECIFIC PARTS OF THE FACE THAT DO NOT CHANGE SIGNIFICANTLY OVER TIME, SUCH AS - UPPER SECTION OF EYE SOCKETS - AREA SURROUNDING CHEEK BONES. - SIDES OF MOUTH. - DISTANCE BETWEEN THE EYES.  A COLLECTION OF FACE IMAGES IS USED TO GENERATE A 2D GRAY-SCALE IMAGE TO PRODUCE A BIOMETRIC TEMPLATE.
  • 25.  HIGHLY SENSITIVE SECURITY ENVIRONMENT , SEVERAL CAMERAS AT DIFFERENT ANGLES SHOULD BE USED TO PRODUCE AN EXACT SAMPLE.  TEST FOR LIVENESS- BLINKING OF EYES.  FACIAL RECOGNITION IS GENERALLY SUBJECT TO LARGER MARGINS OF ERROR THAN MORE ESTABLISHED BIOMETRICS SUCH AS FINGERPRINT RECOG.
  • 26. SIGNATURE DYNAMICS  DYNAMIC SIGNATURE CAPTURES DISTINCT BEHAVIOURAL CHARACTERISTICS OF AN INDIVIDUAL`S SIGNATURE.  INCL SHAPE, SPEED, STROKE, PEN PRESSURE & TIMING INFORMATION.  CONSISTS OF A PEN & A SPECIALIZED WRITING TABLET & ARE CONNECTED TO A LOCAL OR CENTRAL COMPUTER FOR TEMPLATE PROCESSING & VERIFICATION.  INDL MUST SIGN THEIR NAME MULTIPLE TIMES ON THE TABLET.  SYSTEM EXTRACTS UNIQUE FEATURES FROM IT LIKE THE TIME UTILIZED, PRESSURE APPLIED FROM THE PEN, THE SPEED, OVERALL SIZE & VARIOUS DIRECTIONS OF STROKES IN THE SIGNATURE.
  • 27. KEYSTROKE DYANAMICS  THE KEYSTROKE RHYTHMS OF A USER ARE MEASURED TO DEVELOPED A UNIQUE BIOMETRIC TEMPLATE OF THE USERS TYPING PATTERN FOR FUTURE AUTHENTICATION.  SYSTEM DETERMINES DWELL TIME (THE TIME A KEY PRESSED) & FLIGHT TIME (TIME BETWEEN KEY UP & THE NEXT KEY DOWN)  THE RECORDED KEYSTROKE TIMING DATA IS THEN PROCESSED THROUGH A UNIQUE ALGORITHM, WHICH DETERMINES A PRIMARY PATTERN FOR FUTURE COMPARISON.
  • 28. VOICE PRINT  OUR VOICE IS UNIQUE BECAUSE OF THE SHAPE OF OUR VOCAL CAVITIES & WAY WE MOVE OUR MOUTH WHILE SPEAKING.  TO ENROLL IN A VOICE PRINT SYS ONE SHOULD SAY THE EXACT WORDS AND PHRASES THAT IT REQUIRES.  DATA USED IN A VOICE PRINT IS A SOUND SPECTROGRAM.  A SPECTROGRAM IS BASICALLY A GRAPH THAT SHOWS A SOUND’S FREQUENCY ON THE VERTICAL AXIS & TIME ON THE HORIZONTAL AXIS.  DIFFERENT SPEECH SOUNDS CREATE DIFFERENT SHAPES WITHIN THE GRAPH.  SPECTROGRAMS ALSO USE COLORS OR SHADES TO REPRESENT THE ACOUSTICAL QUALITIES OF SOUND.
  • 30.  THE FUTURE OF BIOMETRICS HOLDS GREAT PROMISE FOR LAW ENFORCEMENT APPLICATIONS.  IT IS QUICKLY BECOMING RECOGNIZED AS THE MOST ACCURATE IDENTIFICATION TECHNOLOGY IN THE MARKET.  ACCESS CONTROL FACIAL RECOGNITION BIOMETRIC TECHNOLOGIES WILL PERMIT AUTH USERS ENTRY TO A PROPERTY . IN FUTURE THE SUBJECT WILL NOT HAVE TO STAND NEAR THE SURVEILLANCE CAMERAS.  FACIAL RECOGNITION PASSIVE SURVEILLANCE HIDDEN SURVEILLANCE CAMS WILL BE SET TO MONITOR AN AREA TO ACCURATELY IDENTIFY A SUSPECT AGAINST A DATABASE OF MILLIONS IN A SECOND.
  • 31.  ALERT MANAGEMENT THIS IS A FULLY CUSTOMISABLE COMMAND CENTER TO GUARD AGAINST POTENTIAL SECURITY BREECHES.  CENTER USES REAL-TIME TECHNOLOGIES TO DELIVER SECURITY ALERTS TO MULTIPLE LOCATIONS THROUGH PDA AND OTHER MOBILE TECHNOLOGIES.  FOR BIOMETRICS FIELD TO GROW INDUSTRY STANDARDS MUST EXIST SO THAT THERE IS THE GREATEST COMPATIBILITY BETWEEN APPLICATIONS AND HARDWARE.
  • 32. CONCLUSION BIOMETRICS IS THOUGH EXPENSIVE IS A TECHNOLOGY THAT CAN SIMPLIFY THE PROCESS OF AUTHENTICTION. THE WIDE VARIETY OF PHYSICALLY UNIQUE TRAITS GOD HAS GIVEN US WILL SOON ALLOW US TO LIVE IN A VERY SECURE PASSWORD-LESS WORLD.