SlideShare ist ein Scribd-Unternehmen logo
1 von 26
BIOMETRIC SECURITY
SYSTEMS
A FUTURE WITHOUT
PASSWORDS

End of “PASSWORD
OVERLOAD”

WORKPLACE
 DESKTOP
COMPUTER
 CORPORATE
COMPUTER
NETWORK
 INTERNET & E-MAIL
CLASSIFICATION
 PHYSIOLOGICAL

OR

 BEHAVIORAL

 IDENTIFICATION

OR

 VERIFICATION
BIOMETRIC PROCESS
ENROLLMENT
Present
Biometric

Capture

NO MATCH
Process

COMPARE

VERIFICATION
Present
Biometric

Capture

STORE

Process

MATCH
TECHNOLOGIES
BIOMETRICS

IRIS

SIGNATURE
SECURITY
HAND

FINGER
FACE

VOICE
IRIS
RECOGNITION
 Iris patterns are extremely
complex.
 Patterns are individual
 Patterns are formed by six
months after birth, stable
after a year. They remain
the same for life.
 Imitation is almost
impossible.
 Patterns are easy to
capture and encode
RETINA SCANNERS
(continued)

•Main retina features

•Actual photo of retina
IRIS SCANNERS
• High resolution cameras capture image from up to 3 feet
away (usually 10 to 12 inches)
• Converts picture of the distinctive fibers, furrows, flecks,
crypts, rifts, pits and coronas of the iris into a bar-code
like identifier
• Template around 256 Bytes in size
• Human iris is distinct with 250 differentiating features
• The recognition of irises by their IrisCodes is based upon
the failure of a test of statistical independence.
– Any given IrisCode is statistically guaranteed to pass
a test of independence against any IrisCode computed
from a different eye; but it will uniquely fail this same
test against the eye from which it was computed.
FINGER
RECOGNITION

Print showing various types of
Minutiae
HOW IT WORKS
SUBMISSION

FEATURE EXTRACTION

IMAGE ENHANCEMENT

MATCHING
•

FINGER PRINT (continued )

Fingerprint matching techniques can be placed into two categories: minutiaebased and correlation based.
– Minutiae-based techniques first find minutiae points and then map their
relative placement on the finger. However, there are some difficulties
when using this approach.
• It is difficult to extract the minutiae points accurately when the
fingerprint is of low quality.
• Also this method does not take into account the global pattern of
ridges and furrows.
– The correlation-based method is able to overcome some of the difficulties
of the minutiae-based approach. However, it has some of its own
shortcomings.
• Correlation-based techniques (i.e. pattern matching) require the
precise location of a registration point and are affected by image
translation and rotation.
• Larger templates (often 2 – 3 times larger than minutiae-based)
FACE RECOGNITION
•Typical Eigenfaces
•Utilizes two dimensional,
•global grayscale images
•representing distinctive
•characteristics of
•a facial image
•Variations of eigenface are
•frequently used as the basis of other
face recognition methods.
FACIAL (continued)
•

•

Eigenface: "one's own face," a technology patented at MIT that uses 2D
global grayscale images representing distinctive characteristics of a facial
image. Most faces can be reconstructed by combining features of 100-125
eigenfaces. During enrollment, the user's eigenface is mapped to a series of
numbers (coefficients). Upon a 1:1 match, a "live" template is matched
against the enrolled template to obtain a coefficient variation. This
variation either accepts or rejects the user.
Local Feature Analysis (LFA): also a 2D technology, though more capable
of accommodating changes in appearance or facial aspect (e.g., smiling,
frowning). LFA uses dozens of features from different regions of the face;
incorporates the location of these features. Relative distances and angles of
the "building blocks" of the face are measured. LFA can accommodate 25degree angles in the horizontal plane and 15 degrees in the vertical plane.
LFA is a derivative of the eigenface method and was developed by
Visionics, Corp.
FACE RECOGNITION
FACIAL (continued)
• Varying light (i.e. outdoors) can affect accuracy
• Some systems can compensate for minor changes such as
puffiness and water retention
• Smiling, frowning, etc can affect accuracy
• Some systems can be confused by glasses, beards, etc
• Human faces vary dramatically over long term (aging) and
short term (facial hair growth, different hair styles, plastic
surgery)
• Expected high rate of acceptance as people are already used
to being photographed or monitored
• Best method for identification systems (e.g. airports)
VOICE RECOGNITION
• The software
remembers the way
you say each word.
• Voice recognition
possible even though
everyone speaks with
varying accents and
inflection.
• Telephony : the
primary growth area
VOICE VERIFICATION
•A complete signal has an
overall pattern, as well as a
much finer structure, called the
frame. This frame is the
essence of voice verification
technology.
•It is these well-formed, regular
patterns that are unique to
every individual. These
patterns are created from the
size and shape of the physical
structure of a person's vocal
tract. Since no two vocal tracts
are exactly the same, no two
signal patterns can be the
same.
VOICE VERIFICATION
•These unique features
consist of cadence,
pitch, tone, harmonics,
and shape of vocal tract.
•The image at right
shows how
characteristics of voice
actually involve much
more of the body than
just the mouth.
HAND
GEOMETRY
• 32,000-pixel CCD digital
camera .
• The hand-scan device can
process the 3-D images in
less than 5 seconds & the
verification usually takes
less than 1 second.
• U.S INPASS PROGRAM
HAND/FINGER GEOMETRY
(continued)
HAND/FINGER
GEOMETRY READERS
• The first modern biometric device was a hand
geometry reader that measured finger length
• These devices use a 3D or stereo camera to map
images of the hands and/or fingers to measure
size, shape and translucency
• Actual sensor devices are quite large in size
• Templates are typically small (approx 10 Bytes)
• High acceptance rate among users
SIGNATURE
RECOGNITION
How the signature was
made. i.e. changes in
speed, pressure and
timing that occur during
the act of signing
An expert forger may
be able to duplicate what
a signature looks like,
but it is virtually
impossible to duplicate
the timing changes in X,
Y and Z (pressure)

SIGNATURE ANALYSIS
(continued)
•Built-in sensors register the dynamics of the act of writing. These dynamics
include the 3D-forces that are applied, the speed of writing, and the angles in
various directions.

•This signing pattern is unique for each individual, and thus allows for strong
authentication. It also protects against fraud since it is practically impossible to
duplicate "how" someone signs.
• A multimodal
biometric system uses
the integration of
biometric systems in
order to meet stringent
performance
requirements.
•Much more vital to
fraudulent technologies
TOKENS, SMART CARDS &
BIOMETRIC AUTHENTICATION
SCHEMES

 INTEGRATION IS ESSENTIAL
CONCLUSION
Once the exclusive preserve
of sci-fi books and movies,
biometrics now has to be
considered as one of the many
challenges of modern day
management.


Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Face recognition
Face recognitionFace recognition
Face recognition
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 

Andere mochten auch

Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 

Andere mochten auch (10)

Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 

Ähnlich wie Biometric security Presentation

Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsInvestorideas.com
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Comparisons of input modalities and methods
Comparisons of input modalities and methodsComparisons of input modalities and methods
Comparisons of input modalities and methodsyoshiharu sato
 
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptxApplications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptxAhmed Ali
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptxschetan202
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Face Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdfFace Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdfSOMESHJADHWANI
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint RecognitionMirza Baig
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 

Ähnlich wie Biometric security Presentation (20)

Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Comparisons of input modalities and methods
Comparisons of input modalities and methodsComparisons of input modalities and methods
Comparisons of input modalities and methods
 
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptxApplications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
Applications Of Intra- Oral Scanners( IOS) In Crown And Bridge.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Seminar
SeminarSeminar
Seminar
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Face Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdfFace Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdf
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 

Kürzlich hochgeladen

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Kürzlich hochgeladen (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 

Biometric security Presentation

  • 2. A FUTURE WITHOUT PASSWORDS End of “PASSWORD OVERLOAD” WORKPLACE  DESKTOP COMPUTER  CORPORATE COMPUTER NETWORK  INTERNET & E-MAIL
  • 3. CLASSIFICATION  PHYSIOLOGICAL OR  BEHAVIORAL  IDENTIFICATION OR  VERIFICATION
  • 6. IRIS RECOGNITION  Iris patterns are extremely complex.  Patterns are individual  Patterns are formed by six months after birth, stable after a year. They remain the same for life.  Imitation is almost impossible.  Patterns are easy to capture and encode
  • 7. RETINA SCANNERS (continued) •Main retina features •Actual photo of retina
  • 8. IRIS SCANNERS • High resolution cameras capture image from up to 3 feet away (usually 10 to 12 inches) • Converts picture of the distinctive fibers, furrows, flecks, crypts, rifts, pits and coronas of the iris into a bar-code like identifier • Template around 256 Bytes in size • Human iris is distinct with 250 differentiating features • The recognition of irises by their IrisCodes is based upon the failure of a test of statistical independence. – Any given IrisCode is statistically guaranteed to pass a test of independence against any IrisCode computed from a different eye; but it will uniquely fail this same test against the eye from which it was computed.
  • 10. HOW IT WORKS SUBMISSION FEATURE EXTRACTION IMAGE ENHANCEMENT MATCHING
  • 11. • FINGER PRINT (continued ) Fingerprint matching techniques can be placed into two categories: minutiaebased and correlation based. – Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. However, there are some difficulties when using this approach. • It is difficult to extract the minutiae points accurately when the fingerprint is of low quality. • Also this method does not take into account the global pattern of ridges and furrows. – The correlation-based method is able to overcome some of the difficulties of the minutiae-based approach. However, it has some of its own shortcomings. • Correlation-based techniques (i.e. pattern matching) require the precise location of a registration point and are affected by image translation and rotation. • Larger templates (often 2 – 3 times larger than minutiae-based)
  • 12. FACE RECOGNITION •Typical Eigenfaces •Utilizes two dimensional, •global grayscale images •representing distinctive •characteristics of •a facial image •Variations of eigenface are •frequently used as the basis of other face recognition methods.
  • 13. FACIAL (continued) • • Eigenface: "one's own face," a technology patented at MIT that uses 2D global grayscale images representing distinctive characteristics of a facial image. Most faces can be reconstructed by combining features of 100-125 eigenfaces. During enrollment, the user's eigenface is mapped to a series of numbers (coefficients). Upon a 1:1 match, a "live" template is matched against the enrolled template to obtain a coefficient variation. This variation either accepts or rejects the user. Local Feature Analysis (LFA): also a 2D technology, though more capable of accommodating changes in appearance or facial aspect (e.g., smiling, frowning). LFA uses dozens of features from different regions of the face; incorporates the location of these features. Relative distances and angles of the "building blocks" of the face are measured. LFA can accommodate 25degree angles in the horizontal plane and 15 degrees in the vertical plane. LFA is a derivative of the eigenface method and was developed by Visionics, Corp.
  • 15. FACIAL (continued) • Varying light (i.e. outdoors) can affect accuracy • Some systems can compensate for minor changes such as puffiness and water retention • Smiling, frowning, etc can affect accuracy • Some systems can be confused by glasses, beards, etc • Human faces vary dramatically over long term (aging) and short term (facial hair growth, different hair styles, plastic surgery) • Expected high rate of acceptance as people are already used to being photographed or monitored • Best method for identification systems (e.g. airports)
  • 16. VOICE RECOGNITION • The software remembers the way you say each word. • Voice recognition possible even though everyone speaks with varying accents and inflection. • Telephony : the primary growth area
  • 17. VOICE VERIFICATION •A complete signal has an overall pattern, as well as a much finer structure, called the frame. This frame is the essence of voice verification technology. •It is these well-formed, regular patterns that are unique to every individual. These patterns are created from the size and shape of the physical structure of a person's vocal tract. Since no two vocal tracts are exactly the same, no two signal patterns can be the same.
  • 18. VOICE VERIFICATION •These unique features consist of cadence, pitch, tone, harmonics, and shape of vocal tract. •The image at right shows how characteristics of voice actually involve much more of the body than just the mouth.
  • 19. HAND GEOMETRY • 32,000-pixel CCD digital camera . • The hand-scan device can process the 3-D images in less than 5 seconds & the verification usually takes less than 1 second. • U.S INPASS PROGRAM
  • 21. HAND/FINGER GEOMETRY READERS • The first modern biometric device was a hand geometry reader that measured finger length • These devices use a 3D or stereo camera to map images of the hands and/or fingers to measure size, shape and translucency • Actual sensor devices are quite large in size • Templates are typically small (approx 10 Bytes) • High acceptance rate among users
  • 22. SIGNATURE RECOGNITION How the signature was made. i.e. changes in speed, pressure and timing that occur during the act of signing An expert forger may be able to duplicate what a signature looks like, but it is virtually impossible to duplicate the timing changes in X, Y and Z (pressure) 
  • 23. SIGNATURE ANALYSIS (continued) •Built-in sensors register the dynamics of the act of writing. These dynamics include the 3D-forces that are applied, the speed of writing, and the angles in various directions. •This signing pattern is unique for each individual, and thus allows for strong authentication. It also protects against fraud since it is practically impossible to duplicate "how" someone signs.
  • 24. • A multimodal biometric system uses the integration of biometric systems in order to meet stringent performance requirements. •Much more vital to fraudulent technologies
  • 25. TOKENS, SMART CARDS & BIOMETRIC AUTHENTICATION SCHEMES  INTEGRATION IS ESSENTIAL
  • 26. CONCLUSION Once the exclusive preserve of sci-fi books and movies, biometrics now has to be considered as one of the many challenges of modern day management. 