The document discusses different types of scanning devices used for biometric identification. It describes fingerprint, voice, face, eye retina, and hand scanners. Fingerprint scanners identify individuals by their unique fingerprint patterns. Voice scanners analyze a person's voice mathematically. Face scanners take measurements of a person's face. Eye retina scanners identify people by scanning the iris or retina of their eyes. All biometric scanners capture a sample, extract unique data, compare to stored templates, and determine a match or non-match.
6. Types Of Scanning Devices.
Finger Or Biometric Scanner.
Voice Scanner.
Face Scanner.
Eye Retina Scanner.
Hand Scanner.
7. Fingerprint Biometric.
- A biometric finger
scanner identifies the
person by their
finger Print.
First used in China in 700 AD.First used in China in 700 AD.
Proposed in Europe in 1858,Proposed in Europe in 1858,
implemented in Germany in 1903.implemented in Germany in 1903.
Unique – So far no two prints fromUnique – So far no two prints from
different fingers have been founddifferent fingers have been found
that are identical.that are identical.
8. Fingerprint Biometric Characteristics
Fingerprint is the representation of the epidermis of a
finger
Set of (almost/often) parallel ridge lines
Ridges produce local patterns
9. Fingerprint Sensing
Two stages
1. Capture Fingerprint image
2. Process image and extract features
3. Store data for comparison or compare with
stored templates
10. Voice Scanner.?
- A voice analysis
scanner
mathematically
break down a
person's voice to
identify them. These
scanners help to
improve security.
11. Where can it be used?
- Dictation
- System control/navigation
- Commercial/Industrial applications
- Voice dialing
12. How might computers do it?
Acoustic waveform
Acoustic signal
Speech recognition
Digitization.
Acoustic analysis of the
speech signal.
Linguistic interpretation.
13. Face Scanner.
Biometric face
scanners identify a
person by taking
measurements of a
person face.
These types of scanners can be very
secure assuming they are smart enough
to distinguish between a picture of a
person and a real person.
14. All identification or authentication technologies operate
using the following four stages:
Capture: A physical or behavioural sample is captured
by the system during Enrollment and also in
identification or verification process.
Extraction: unique data is extracted from the sample
and a template is created.
Comparison: the template is then compared with a
new sample.
Match/non-match: the system decides if the features
extracted from the new Samples are a match or a non
match.
Contd…
15. Facial-scan technology
can acquire faces from
almost any static camera
or video system that
generates images of
sufficient quality
and resolution.
Image Acquisition
16. Eye Retina Scanner.
A biometric retina or
iris scanner
identifies a person
by scanning the iris
or retina of their
eyes.
17. Importance Of Iris Technology.
Highly Protected
Internal Organ Of The
Eye.
Externally Visible
Patterns Imaged
From A Distance.
Pattern Apparently
Stable Throughout
The Life.
Image Analysis And
Encoding Time: 1
Seconds.