BIOMETRICS Presented By Sapin.M.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
BIOMETRICS.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Challenge/Response Authentication
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
A Seminar Report On Face Recognition Technology
Authentication.
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

BIOMETRICS Presented By Sapin.M

What is BIOMETRICS ?? automatic identification of a person based on his/her physiological or behavioural characteristics such as finger scan, retina, iris, voice scan, signature scan etc. preferred over traditional methods involving passwords and PIN numbers. It is pattern recognition system, which makes a personal identification by determining the authenticity of a specific physiological, or behavioural characteristics possessed by the user.

stored patterns for identification. can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. allows determination and verification of one's identity through physical characteristics such as face recognition, voice recognition etc. have sensors that pick up a physical characteristic, convert it into a digital pattern and compare it to stored patterns for identification. .

IDENTIFICATION AND VERIFICATION identifying a person from all biometric measurements collected in a database and this involves a one-to-many match also referred to as a ‘cold search’. verification involves authenticating a person’s claimed identity from his or her previously enrolled pattern and this involves a one-to-one match. verification requires comparing a person’s fingerprint to one that pass previously recorded in the system database. identification involves many more comparisons and may require differentiating among several database fingerprints that are similar to the objects.

A biometric system is a combined hardware/software system for biometric identification or verification.It • Receive biometric samples from a candidate • Extract biometric featured from the sample • Compare the sample of the candidate with stored templates from individuals •Indicate identification or verification upon the result of the previous comparison. Biometric accuracy is the system’s ability of separating legitimate matches from imposters.

IRIS RECOGNITION based on research and patents held by Dr. John Daugman. leverages the unique features of the human iris to provide an unmatched identification technology. addresses the FTE (failure to enroll) problems, which lessen the effectiveness of other biometrics. Iris recognition is based on visible (via regular and/or infrared light) qualities of the iris. converts the visible characteristics into a 512 byte IrisCode(tm), a template stored for future verification attempts.

visible characteristic is the trabecular meshwork (permanently formed by the 8th month of gestation), a tissue that gives the appearance of dividing the iris in a radial fashion. Iris recognition is based on visible (via regular and/or infrared light) qualities of the iris. The first step is location of the iris by a dedicated camera no more than 3 feetfrom the eye. After the camera situates the eye, the algorithm narrows in from the rightand left of the iris to locate its outer edge. This horizontal approach accounts for obstruction caused by the eyelids. It simultaneously locates the inner edge of the iris (at the pupil), excluding the lower 90 degrees because of inherent moisture and lighting.

The monochrome camera uses both visible and infrared light it provides exceptional detail, well beyond what any pictorial or point-based representation could provide. The Iris Code provides a tremendous wealth of data that iris recognition offers levels of accuracy orders of magnitude higher than other biometrics. Iris recognition can also account for those ongoing changes to the eye and iris, which are defining aspects of living tissue.

Iris recognition can account for : detection of papillary (pupil) changes; reflections from the cornea; detection of contact lenses atop the cornea; and use of infrared illumination to determine the state of the sample eye tissue. Iris identification technology is a tremendously accurate biometric. Only retinal scan can offer nearly the security that iris scan offers, and the interface for retina scan is thought by many to be more challenging and intrusive.

FINGERPRINT VERIFICATION FINGERSCAN is an authentication terminal, which verifies a person’s identity from their finger image. When a user places their finger on the terminals scanner the image is electronically read, analyzed, and compared with a previously recorded image of the same finger, which has been stored in the FINGERSCAN database. FINGERSCAN is a biometrics product, which involves using some unique biological characteristic or physical property of an individual to verify that persons claimed identity.

The imaging process is based on digital holography, using an electro-optical scanner about the size of a thumbprint. The scanner reads three-dimensional data from the finger such as skin undulations, and ridges and valleys, to create a unique pattern, which is composed into a template file and recorded in the FINGERSCAN database. The pattern is not a fingerprint and a fingerprint cannot in any way be created from the template. A template can only be compared with a newly presented live finger image and not with other templates.

The major FINGERSCAN functions are: Enrolment Verification Time zones Door access Template management FINGERSCAN provides an audit trail of the date and time a user accessed the unit, the reason for access, and the result. FINGERSCAN provides a level of security, which cannot be achieved by any other biometric.

VOICE SCAN The speaker-specific characteristics of speech are due to differences in physiological and behavioural aspects of the speech production system in humans. The main physiological aspect of the human speech production system is the vocal tract shape. The vocal tract is generally considered as the speech production organ above the vocal folds. The pattern matching process involves the comparison of a given set of input feature vectors against the speaker model for the claimed identity and computing a matching score.

RETINA SCANNING Retina scan is an exceptionally accurate biometric technology having been established as an effective solution for every demanding authentication scenarios An established technology where the unique patterns of the retina are scanned by a low intensity light source via an optical coupler. Retinal scanning has proved to be quite accurate in use but does require user to look in to a receptacle and focus on a given point. This is not particularly convenient if you are a spectacle wearer or have some intimate contact with the reading device.

FACE RECOGNITION Specialized recognition software coupled with video camera allows these systems to recognize people’s faces. There are various methods by which facial scan technology recognize peoples. Some commonalities, are emphasizing those sections of the face which are less susceptible to alteration, including the upper outlines of the eye sockets, the areas surrounding one’s cheekbones, and the sides of the mouth.

Facial scan Process Flow-defined by Sample capture, Feature extraction, Template comparison, and Matching The user claims an identity such as a login name or a PIN, stands or sits in front of the camera for a few seconds, and is either verified or rejected. This comparison is based on the similarity of the newly created“live” template against the template or templates on file.

MULTIMODE BIOMETRIC SYSTEM

We introduce a multimode biometric system, which integrates face recognition, fingerprint verification, and speaker verification in making a personal identification. This system takes advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics.

FUTURE APPLICATIONS !! ATM machine use. Workstation and network access. Travel and tourism. Internet transactions. Telephone transactions. Public identity cards.

CONCLUSION The ultimate form of electronic verification of a person’s identity is biometrics; using a physical attribute of the person to make a positive identification. The challenge has been to turn these into electronic processes that are inexpensive and easy to use. Biometrics, when properly implemented, not only increase security but also often are easier to use and less costly to administer than the less secure alternatives.

Banks and others who have tested biometric-based security on their clientele,however, say consumers overwhelmingly have a pragmatic response to the technology. Biometrics can’t be forgotten or left at home and they don’t have to be changed periodically like passwords.

THANK YOU….