SlideShare ist ein Scribd-Unternehmen logo
1 von 29
By
Sukanta Bhattacharyya
Registration # 1651210007
• Forget passwords ...
• Forget pin numbers ...
• Forget all your security concerns ...Just stay cool
Why ?????????????????????
Because here comes BIOMETRICS……
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 2
Introduction:
The nuisance of forgotten passwords and ID codes is over as
biometrics-based authentication is here. Our fingerprints, iris
pattern, and voice will verify our identity at ATMs, airports, etc.
We can unlock our house or withdraw money from our bank with
just a blink of an eye, a tap of our finger or just showing you face
BIOMETRICS is a means of using parts of the human body as a
kind of permanent password.
Just as your fingerprints are unlike those of any other person, your
eyes, ears, hands, voice, and face are also unique. Technology has
advanced to the point where computer systems can record and
recognize the patterns, hand shapes, ear lobe contours, and a host
of other physical characteristics. Using these biometrics, laptop
and other portable devices can be empowered with the ability to
instantly verify your identity and deny access to everybody else.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 3
Biometrics ?
The automated measurement of physiological and behavioral
characteristics to determine or authenticate identity is termed as
biometrics. Automated means no human involvement. Physiological
traits include fingerprint, hand, eyes, face while behavior traits
include actions performed by humans such as ‘user speaks, types on
a keyboard’ etc. These combine to recognize the identity of the user
and also to authenticate the particular user for the particular job.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 4
Why Biometrics ?
• Traditional methods involving passwords and PIN numbers
• Biometrics highest level of security
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 5
Biometric System
Data Collection
Transmission
Signal Processing
Data Storage
Decision
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 6
A generic biometric model or system consists of five subsystems
namely data collection, transmission, signal processing, decision
making and data storage. Data collection involves use of sensors
to detect and measure an individual’s physiological or behavioral
characteristics. Data collection stage consists of a number of
sensing elements such as sensors.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 7
Biometric Process:
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 8
Explanation:
The basic block diagram of a biometric system is studied in the
following two modes namely verification and identification.
In verification mode the system performs a one-to-one comparison of a
captured biometric with a specific template stored in a biometric
database in order to verify the individual is the person they claim to be.
Three steps involved in person verification. In the first step, reference
models for all the users are generated and stored in the model database.
In the second step, some samples are matched with reference models to
generate the genuine and impostor scores and calculate the threshold.
Third step is the testing step.
In identification mode the system performs a one-to-many comparison
against a biometric database in attempt to establish the identity of an
unknown individual. The system will succeed in identifying the
individual if the comparison of the biometric sample to a template in
the database falls within a previously set threshold.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 9
In short
The hardware captures the salient human characteristics and the
software interprets the resulting data and determines acceptability.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 10
Characteristics used as input data:
Fingerprints
Voiceprints
Facial features
Writing patterns
Iris patterns
Hand geometry
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 11
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 12
Fingerprint recognition system
One of the oldest form of biometrics which is highly reliable and
uses distinctive finger features for the purpose of identification
and verification.
Process: The process is similar to the working of a general
biometrics system. The process is carried out in the following
steps
 A fingerprint image is read from a captured device
 Features are extracted from the image
 A template is created for comparison
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 13
Detailed process of finger recognition biometrics
Three steps are required for the process. They are
 Fingerprint Scanning: It’s the acquisition and recognition of a
person’s fingerprint characteristics for identification purposes
 Fingerprint Matching: It involves the matching of the new
enrollment with the pre-captured database
 Identification: Finally identifies the person or subject based on
the above steps.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 14
Fingerprint scanning or image acquisition: Finger imprint image
is taken by different techniques
• Optical
• Thermal
• Capacitance
• Ultra Sound
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 15
Feature Extraction process:
This is followed by image acquisition stage. The different
features are extracted from the acquired image. These features are
called global features.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 16
Fingerprint matching (template matching) which is followed
by feature extraction process.
Matching is done between the acquired image and the already
available image in the database.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 17
Coding: Computation of coding is done along with the template
matching technique.
Bridge coding Spur Coding
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 18
Overall process of fingerprint recognition:
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 19
Applications of fingerprint recognition
system:
Logical access control-PC lock system
Physical access control-Door lock system
Lockers
Time and attendance systems at educational institutes and firms
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 20
Other biometric systems:
Iris recognition system
Face recognition system
Speech /voice recognition system
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 21
Applications of Biometrics in use:
 Banks nowadays scan the fingerprints of its customers, instead of using a
personal identification number (PIN), when they wish to withdraw cash.
 Basically, the biometrics security technique acts as a front end to a system that
requires precise identification before it can be accessed or used. The system
could be a sliding door with electronic locking mechanisms, an operating
system (OS), or an application where individual users have their own rights and
permissions.
 A biometric chip reader incorporated into a PC can facilitate secure Internet-
based online transactions. Applications that are being developed to accept
biometric data include computer networks, cars, cellular phones, and hoards of
other types of embedded systems. Biometrics could authenticate e-mail and
other documents transmitted via computer networks. In hospitals, biometric
techniques could replace ID bracelets to establish patients identities for
instance during blood administration.
 With existing voice-transmission technology, voice recognition biometric
techniques can function over long distances using the ordinary telephone. A
well conceived and properly implemented voice-based security system could
provide a greater safety to financial transaction conducted over the telephone.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 22
Other applications:
• Criminal identification
• Prison security
• ATM
• Aviation security
• Border crossing controls
• Database access
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 23
Benefits:
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 24
Limitations:
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 25
Future projects of biometrics:
 Smell recognition system
 Ear Shape
 Finger nail bed
 Facial 3D
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 26
Conclusion:
There are always concerns about adapting to new technologies.
This study shows that some people are reluctant to accept
biometrics because it profoundly affects personal privacy and
safety, even though they are well aware of its benefits.
Furthermore, since biometrics involves personal
characteristics, many are concerned that privacy should be
protected, and that both government and business must maintain
the public’s trust.
The future of biometrics looks increasingly bright with the
demand for security rising daily.
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 27
References:
www.google.com
Google images
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 28
Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 29

Weitere ähnliche Inhalte

Andere mochten auch

Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharShivnaresh Likhar
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAHEMANTA SAHU
 
Smart door lock
Smart door lockSmart door lock
Smart door lockaswin5432
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking systemVISHAL NAGAR
 
Electronic code lock device
Electronic code lock deviceElectronic code lock device
Electronic code lock deviceAmitoj Kaur
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking systemArjun Singh
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 

Andere mochten auch (8)

Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likhar
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
Password based door locksystem
Password  based door locksystemPassword  based door locksystem
Password based door locksystem
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
 
Electronic code lock device
Electronic code lock deviceElectronic code lock device
Electronic code lock device
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 

Ähnlich wie Biometrics-Sukanta Bhattacharyya

BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYsumitgupta575
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET Journal
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPIRJET Journal
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)mounika117
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMFinger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMIOSR Journals
 
Biometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureBiometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureMichael James
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTIRJET Journal
 

Ähnlich wie Biometrics-Sukanta Bhattacharyya (20)

BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGY
 
IRJET- Biometric Voting Machine
IRJET- Biometric Voting MachineIRJET- Biometric Voting Machine
IRJET- Biometric Voting Machine
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Io t with biometrics
Io t with biometricsIo t with biometrics
Io t with biometrics
 
D0351022026
D0351022026D0351022026
D0351022026
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Smart ecg
Smart ecgSmart ecg
Smart ecg
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMFinger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSM
 
Biometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureBiometrics - Then, Now and the Future
Biometrics - Then, Now and the Future
 
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoTSECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
SECURED EVM USING BIOMETRIC WITH UNIQUE ID AND IoT
 

Kürzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

Biometrics-Sukanta Bhattacharyya

  • 2. • Forget passwords ... • Forget pin numbers ... • Forget all your security concerns ...Just stay cool Why ????????????????????? Because here comes BIOMETRICS…… Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 2
  • 3. Introduction: The nuisance of forgotten passwords and ID codes is over as biometrics-based authentication is here. Our fingerprints, iris pattern, and voice will verify our identity at ATMs, airports, etc. We can unlock our house or withdraw money from our bank with just a blink of an eye, a tap of our finger or just showing you face BIOMETRICS is a means of using parts of the human body as a kind of permanent password. Just as your fingerprints are unlike those of any other person, your eyes, ears, hands, voice, and face are also unique. Technology has advanced to the point where computer systems can record and recognize the patterns, hand shapes, ear lobe contours, and a host of other physical characteristics. Using these biometrics, laptop and other portable devices can be empowered with the ability to instantly verify your identity and deny access to everybody else. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 3
  • 4. Biometrics ? The automated measurement of physiological and behavioral characteristics to determine or authenticate identity is termed as biometrics. Automated means no human involvement. Physiological traits include fingerprint, hand, eyes, face while behavior traits include actions performed by humans such as ‘user speaks, types on a keyboard’ etc. These combine to recognize the identity of the user and also to authenticate the particular user for the particular job. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 4
  • 5. Why Biometrics ? • Traditional methods involving passwords and PIN numbers • Biometrics highest level of security Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 5
  • 6. Biometric System Data Collection Transmission Signal Processing Data Storage Decision Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 6
  • 7. A generic biometric model or system consists of five subsystems namely data collection, transmission, signal processing, decision making and data storage. Data collection involves use of sensors to detect and measure an individual’s physiological or behavioral characteristics. Data collection stage consists of a number of sensing elements such as sensors. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 7
  • 8. Biometric Process: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 8
  • 9. Explanation: The basic block diagram of a biometric system is studied in the following two modes namely verification and identification. In verification mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps involved in person verification. In the first step, reference models for all the users are generated and stored in the model database. In the second step, some samples are matched with reference models to generate the genuine and impostor scores and calculate the threshold. Third step is the testing step. In identification mode the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 9
  • 10. In short The hardware captures the salient human characteristics and the software interprets the resulting data and determines acceptability. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 10
  • 11. Characteristics used as input data: Fingerprints Voiceprints Facial features Writing patterns Iris patterns Hand geometry Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 11
  • 12. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 12 Fingerprint recognition system One of the oldest form of biometrics which is highly reliable and uses distinctive finger features for the purpose of identification and verification. Process: The process is similar to the working of a general biometrics system. The process is carried out in the following steps  A fingerprint image is read from a captured device  Features are extracted from the image  A template is created for comparison
  • 13. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 13
  • 14. Detailed process of finger recognition biometrics Three steps are required for the process. They are  Fingerprint Scanning: It’s the acquisition and recognition of a person’s fingerprint characteristics for identification purposes  Fingerprint Matching: It involves the matching of the new enrollment with the pre-captured database  Identification: Finally identifies the person or subject based on the above steps. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 14
  • 15. Fingerprint scanning or image acquisition: Finger imprint image is taken by different techniques • Optical • Thermal • Capacitance • Ultra Sound Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 15
  • 16. Feature Extraction process: This is followed by image acquisition stage. The different features are extracted from the acquired image. These features are called global features. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 16
  • 17. Fingerprint matching (template matching) which is followed by feature extraction process. Matching is done between the acquired image and the already available image in the database. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 17
  • 18. Coding: Computation of coding is done along with the template matching technique. Bridge coding Spur Coding Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 18
  • 19. Overall process of fingerprint recognition: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 19
  • 20. Applications of fingerprint recognition system: Logical access control-PC lock system Physical access control-Door lock system Lockers Time and attendance systems at educational institutes and firms Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 20
  • 21. Other biometric systems: Iris recognition system Face recognition system Speech /voice recognition system Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 21
  • 22. Applications of Biometrics in use:  Banks nowadays scan the fingerprints of its customers, instead of using a personal identification number (PIN), when they wish to withdraw cash.  Basically, the biometrics security technique acts as a front end to a system that requires precise identification before it can be accessed or used. The system could be a sliding door with electronic locking mechanisms, an operating system (OS), or an application where individual users have their own rights and permissions.  A biometric chip reader incorporated into a PC can facilitate secure Internet- based online transactions. Applications that are being developed to accept biometric data include computer networks, cars, cellular phones, and hoards of other types of embedded systems. Biometrics could authenticate e-mail and other documents transmitted via computer networks. In hospitals, biometric techniques could replace ID bracelets to establish patients identities for instance during blood administration.  With existing voice-transmission technology, voice recognition biometric techniques can function over long distances using the ordinary telephone. A well conceived and properly implemented voice-based security system could provide a greater safety to financial transaction conducted over the telephone. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 22
  • 23. Other applications: • Criminal identification • Prison security • ATM • Aviation security • Border crossing controls • Database access Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 23
  • 24. Benefits: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 24
  • 25. Limitations: Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 25
  • 26. Future projects of biometrics:  Smell recognition system  Ear Shape  Finger nail bed  Facial 3D Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 26
  • 27. Conclusion: There are always concerns about adapting to new technologies. This study shows that some people are reluctant to accept biometrics because it profoundly affects personal privacy and safety, even though they are well aware of its benefits. Furthermore, since biometrics involves personal characteristics, many are concerned that privacy should be protected, and that both government and business must maintain the public’s trust. The future of biometrics looks increasingly bright with the demand for security rising daily. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 27
  • 28. References: www.google.com Google images Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 28
  • 29. Sunday, August 18, 2013 Sukanta Bhattacharyya (Reg #1651210007) 29