SlideShare ist ein Scribd-Unternehmen logo
1 von 19
BIOMETRICS
PRESENTED BY
VISHWAJEET & ADOTHU RAMBABU
ROLL NO – 467/11 & 537/11
NATIONAL INSTITUTE OF TECHNOLOGY
JAMSHEDPUR, INDIA – 831014
INTRODUCTION
 Biometrics refers to the automatic identification of a
person based on his or her physiological or behavioral
characteristics.
 Biometrics is an accurate method of authentication that
uses the physiological and biological traits of a person to
verify and establish their identity.
PHYSIOLOGICAL AND/OR BEHAVIORAL
CHARACTERISTICS
 Behavioral:
 Voice
 Keystroke
 Signature
 Physiological:
 Fingerprint
 Hand
 Eyes (Iris , Retina)
 DNA
 Face
BIOMETRICS
BIOMETRICS: WHY?
 Eliminate memorization –
◦ Users don’t have to memorize features of their voice, face, eyes, or fingerprints
 Eliminate misplaced tokens –
◦ Users won’t forget to bring fingerprints to work
 Can’t be delegated –
◦ Users can’t lend fingers or faces to someone else
 Often unique –
◦ Save money and maintain database integrity by eliminating duplicate enrollments
WORKING OF BIOMETRICS TECHNOLOGY
ALL BIOMETRIC SYSTEMS WORKS IN A FOUR-STAGE PROCESS THAT CONSISTS OF
THE FOLLOWING STEPS:
• CAPTURE : A Biometric system collects the sample of biometric features like
fingerprint, voice etc of the person who wants to login to the system.
• EXTRACTION: The data extraction is done uniquely from the sample and a template is
created. Unique features are then extracted by the system and converted into a digital
biometric code. This sample is then stored as the biometric template for that individual.
• COMPARISON: The template is then compared with a new sample. The biometric data
are then stored as the biometric template or template or reference template for that
person.
• MATCH/NON-MATCH: The system then decides whether the features extracted from the
new sample are a match or a non-match with the template.
SIGNATURE SCAN
 Measures speed, pressure, stroke order an image of signature.
 Non-repudiation
 Mainly used for verification
# PROBLEMS:
 Forgers could reproduce
VOICE VERIFICATION
Measures the sound waves of human speech.
 pitch, intensity, quality and duration.
 user talks to a microphone a passphrase.
 voice print is compare to a previous one.
#PROBLEMS:
 include background noise
KEYSTROKE SCAN
Measures the time between strokes and duration of key pressed.
 Most commonly used in systems where
keyboard is already being used.
FINGER PRINT RECOGNITION
Fingerprint verify the authenticity of the individual.
Among all the biometric techniques, fingerprint-based identification is the oldest
method that has been successfully used in numerous applications.
Everyone is known to have unique, immutable
fingerprints. A fingerprint is made of a series of
ridges and furrows on the surface of the finger.
# Advantage:
Low storage space required compared to
other ones.
RETINA RECOGNITION
 Scan the retina to authenticate the identity of a person.
 Unique to each person.
 Unique to each eye.
 Highly reliable because no two people have
the same retinal pattern.
# Problems:
1. It has extremely low acceptance rate .
2. Measurement accuracy can be affected by a disease
3. Not very user friendly
FACIAL RECOGNITION
 Location and position of facial features.
 Distance between the eyes.
 Distance between the eyes and nose ridge.
 Angle of a cheek.
 Slope of the nose.
 Facial temperatures.
HAND SCAN
Typical systems measure 90 different features:
 Overall hand and finger width
 Distance between joints
 Bone structure
Primarily for access control:
 Machine rooms
 Olympics
Strengths:
 No negative connotations – non-intrusive
 Reasonably robust systems
Weaknesses:
 Accuracy is limited; can only be used for 1-to-1 verification
 Bulky scanner
TEMPLATE SIZE
Biometric Approx. Template Size
Voice 70k – 80k
Face 84 bytes – 2k
Signature 500 bytes – 1000 bytes
Fingerprint 256 bytes – 1.2k
Hand Geometry 9 bytes
Iris 256 bytes – 512 bytes
Retina 96 bytes
Advantages :
 Biometric attributes are unique and these can’t be faked or interchanged so,
this uniqueness imparts a high level security to these systems.
 There is no need for remembering passwords, pin’s etc.
Disadvantages :
 Biometric template data consume more space than the conventional user
id/password combinations.
Advantages & Disadvantages
APPLICATIONS
Commercial
 Computer login
 Electronic payment
 ATMS
Government
 Passport control
Forensic
 Missing persons
 Criminal investigations
BIOMETRIC MARKET SHARE
References
 Biometrics.gov.
http://www.biometrics.gov/ReferenceRoom/Introduction.aspx
 Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition."
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1
(2004): 4-20. IEEE Xplore.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027
 Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer.
http://libcat.clemson.edu/record=b2478857
 Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction
Evaluating Biometric Systems." Computer 33.2 (2000): 56-63. IEEE Xplore.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=820040
 http://bprl.cs.clemson.edu/about.html
 http://bprl.cs.clemson.edu/projects.html
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsAbhishek Mishra
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 

Was ist angesagt? (20)

Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 

Ähnlich wie Biometrics

Ähnlich wie Biometrics (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptxBiometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Access Control
Access ControlAccess Control
Access Control
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
biometrics
biometricsbiometrics
biometrics
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Biometrics

  • 1. BIOMETRICS PRESENTED BY VISHWAJEET & ADOTHU RAMBABU ROLL NO – 467/11 & 537/11 NATIONAL INSTITUTE OF TECHNOLOGY JAMSHEDPUR, INDIA – 831014
  • 2. INTRODUCTION  Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics.  Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity.
  • 3. PHYSIOLOGICAL AND/OR BEHAVIORAL CHARACTERISTICS  Behavioral:  Voice  Keystroke  Signature  Physiological:  Fingerprint  Hand  Eyes (Iris , Retina)  DNA  Face
  • 5. BIOMETRICS: WHY?  Eliminate memorization – ◦ Users don’t have to memorize features of their voice, face, eyes, or fingerprints  Eliminate misplaced tokens – ◦ Users won’t forget to bring fingerprints to work  Can’t be delegated – ◦ Users can’t lend fingers or faces to someone else  Often unique – ◦ Save money and maintain database integrity by eliminating duplicate enrollments
  • 6. WORKING OF BIOMETRICS TECHNOLOGY ALL BIOMETRIC SYSTEMS WORKS IN A FOUR-STAGE PROCESS THAT CONSISTS OF THE FOLLOWING STEPS: • CAPTURE : A Biometric system collects the sample of biometric features like fingerprint, voice etc of the person who wants to login to the system. • EXTRACTION: The data extraction is done uniquely from the sample and a template is created. Unique features are then extracted by the system and converted into a digital biometric code. This sample is then stored as the biometric template for that individual. • COMPARISON: The template is then compared with a new sample. The biometric data are then stored as the biometric template or template or reference template for that person. • MATCH/NON-MATCH: The system then decides whether the features extracted from the new sample are a match or a non-match with the template.
  • 7. SIGNATURE SCAN  Measures speed, pressure, stroke order an image of signature.  Non-repudiation  Mainly used for verification # PROBLEMS:  Forgers could reproduce
  • 8. VOICE VERIFICATION Measures the sound waves of human speech.  pitch, intensity, quality and duration.  user talks to a microphone a passphrase.  voice print is compare to a previous one. #PROBLEMS:  include background noise
  • 9. KEYSTROKE SCAN Measures the time between strokes and duration of key pressed.  Most commonly used in systems where keyboard is already being used.
  • 10. FINGER PRINT RECOGNITION Fingerprint verify the authenticity of the individual. Among all the biometric techniques, fingerprint-based identification is the oldest method that has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. # Advantage: Low storage space required compared to other ones.
  • 11. RETINA RECOGNITION  Scan the retina to authenticate the identity of a person.  Unique to each person.  Unique to each eye.  Highly reliable because no two people have the same retinal pattern. # Problems: 1. It has extremely low acceptance rate . 2. Measurement accuracy can be affected by a disease 3. Not very user friendly
  • 12. FACIAL RECOGNITION  Location and position of facial features.  Distance between the eyes.  Distance between the eyes and nose ridge.  Angle of a cheek.  Slope of the nose.  Facial temperatures.
  • 13. HAND SCAN Typical systems measure 90 different features:  Overall hand and finger width  Distance between joints  Bone structure Primarily for access control:  Machine rooms  Olympics Strengths:  No negative connotations – non-intrusive  Reasonably robust systems Weaknesses:  Accuracy is limited; can only be used for 1-to-1 verification  Bulky scanner
  • 14. TEMPLATE SIZE Biometric Approx. Template Size Voice 70k – 80k Face 84 bytes – 2k Signature 500 bytes – 1000 bytes Fingerprint 256 bytes – 1.2k Hand Geometry 9 bytes Iris 256 bytes – 512 bytes Retina 96 bytes
  • 15. Advantages :  Biometric attributes are unique and these can’t be faked or interchanged so, this uniqueness imparts a high level security to these systems.  There is no need for remembering passwords, pin’s etc. Disadvantages :  Biometric template data consume more space than the conventional user id/password combinations. Advantages & Disadvantages
  • 16. APPLICATIONS Commercial  Computer login  Electronic payment  ATMS Government  Passport control Forensic  Missing persons  Criminal investigations
  • 18. References  Biometrics.gov. http://www.biometrics.gov/ReferenceRoom/Introduction.aspx  Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition." IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1 (2004): 4-20. IEEE Xplore. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027  Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer. http://libcat.clemson.edu/record=b2478857  Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction Evaluating Biometric Systems." Computer 33.2 (2000): 56-63. IEEE Xplore. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=820040  http://bprl.cs.clemson.edu/about.html  http://bprl.cs.clemson.edu/projects.html