Asst. Prof. Arvind Selwal, CUJ,Jammu

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
Biometrics.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Introduction: What we know and don’t know about biometrics.
By: Monika Achury and Shuchita Singh
1 CPSC Historical Perspective M.L. Gavrilova.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometric Systems Adapted from B. Cukic
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Multimodal Biometric Security 1.
Challenge/Response Authentication
Biometric Systems Adapted from B. Cukic
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
A Seminar Report On Face Recognition Technology
Authentication.
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Presented By Sapin.M.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

Asst. Prof. Arvind Selwal, CUJ,Jammu What is Biometrics? Biometrics–Science, which deals with the automated recognition of individuals based on biological and behavioral characteristics. Biometry– mathematical and statistical aspects of biology Biometric system –essentially an automatic pattern recognition system that recognizes a person by determining the authenticity of a specific biological and/or behavioral characteristic (biometric) possessed by that person Asst. Prof. Arvind Selwal, CUJ,Jammu

Asst. Prof. Arvind Selwal, CUJ,Jammu Biometric Technology Biometric Technology is concerned with representation, storage, matching, synthesis and visualization of biometric information. Tremendous advancements has been achieved over the last few years in both fundamental theoretical development, matching and synthesis, as well as biometric hardware and software products. Asst. Prof. Arvind Selwal, CUJ,Jammu

Traditional identification Traditional means of automatic identification: –Possession-based (credit card, smart card) Use “something that you have” –Knowledge-based (password, PIN) Use “something that you know” –Biometrics-based (biometric identifier) Use something that relies on “what you are” Asst. Prof. Arvind Selwal, CUJ,Jammu

Traditional identification Vs Latest Biometrics Asst. Prof. Arvind Selwal, CUJ,Jammu

Problems with traditional approach Tokens may be lost, stolen or forgotten Passwords or PINs may be forgotten or guessed by the imposters –25% of people seem to write their PIN on their ATM card Estimates of annual identity fraud damages: –$1 billion in credit card transactions –$1 billion in fraudulent cellular phone use –$3 billion in ATM withdrawals The traditional approaches are unable to differentiate between an authorized person and an impostor (person pretending to be somebody he/she is not) Asst. Prof. Arvind Selwal, CUJ,Jammu

Asst. Prof. Arvind Selwal, CUJ,Jammu BIOMETRICS EVOLUTION Henry Faulds, William Herschel and Sir Francis Galton proposed quantitative identification through fingerprint and facial measurements in the 1880s. Edmond Locard introduced using biometrics in forensic identification in 1920s. Asst. Prof. Arvind Selwal, CUJ,Jammu

Asst. Prof. Arvind Selwal, CUJ,Jammu BIOMETRICS EVOLUTION The development of digital signal processing techniques in the 1960s led to work in automatic human identification. Speaker and fingerprint recognition systems were among the first to be explored. The potential for application of this technology to high-security access control, personal locks and financial transactions were recognized in the early 1960s. The 1970s saw development and deployment of hand geometry systems, the start of large-scale testing and increasing interest in government use of these "automated personal identification" technologies. There are currently 180 readers used by about 18,000 enrolled users. Retinal and signature verification systems came in the 1980s, followed by the face systems. Iris recognition systems were developed in the 1990s. Asst. Prof. Arvind Selwal, CUJ,Jammu

Requirements to biometrics 1. Universality: everyone should have it 2. Uniqueness: small probability that two persons are the same in terms of this characteristic 3. Permanence: invariance with the time 4. Collectability: can be measured quantitatively 5. Performance: high identification accuracy 6. Acceptability: acceptance by people 7. Circumvention: how easy to fool the system by fraudulent technique Asst. Prof. Arvind Selwal, CUJ,Jammu

Asst. Prof. Arvind Selwal, CUJ,Jammu Biometrics System Sensor module: A suitable biometric reader or scanner is required to acquire the raw biometric data of an individual. Quality assessment and feature extraction module: The quality of the biometric data acquired by the sensor is first assessed in order to determine its suitability for further processing. The biometric data is then processed and a set of salient discriminatory features extracted to represent the underlying trait. Matching and decision-making module: The extracted features are compared against the stored templates to generate match scores System database module: During the enrolment process, the feature set extracted from the raw biometric sample (i.e., the template) is stored in the database (possibly) along with some biographic information (such as name, Personal Identification Number (PIN), address, etc.) characterizing the user. Asst. Prof. Arvind Selwal, CUJ,Jammu

Asst. Prof. Arvind Selwal, CUJ,Jammu

Verification versus identification In the verification mode, the system validates a person’s identity by comparing the captured biometric data with his/her own biometric template(s) stored in the system database. The system conducts a one-to-one comparison to determine whether the claim is true or not. In the identification mode, the system recognizes an individual by searching the templates of all the users in the database for a match. Therefore, the system conducts a one-to-many comparison to establish an individual’s identity (or fails if the subject is not enrolled in the system database) without the subject having to claim an identity (e.g., “Whose biometric data is this?”). Asst. Prof. Arvind Selwal, CUJ,Jammu

Verification versus identification (Con’d) Asst. Prof. Arvind Selwal, CUJ,Jammu

Applications of biometrics 1. Commercial applications such as computer network login, electronic data security, e-commerce, Internet access, ATM or credit card use, physical access control, mobile phone, PDA, medical records management, distance learning, etc. 2. Government applications such as national ID card, managing inmates in a correctional facility, driver’s license, social security, welfare-disbursement, border control, passport control, etc. 3. Forensic applications such as corpse identification, criminal investigation, parenthood determination, etc. National Security: using Biometric system for border Level Tourism Management: Management of Gathering and monitoring ARVIND SELWAL ,Central Jammu of Jammu

Accepted biometrical traits Asst. Prof. Arvind Selwal, CUJ,Jammu

ARVIND SELWAL ,Central Jammu of Jammu Hand Geometry System ARVIND SELWAL ,Central Jammu of Jammu

ARVIND SELWAL ,Central Jammu of Jammu Hand Geometry System ARVIND SELWAL ,Central Jammu of Jammu

Fingerprint Recognition ARVIND SELWAL ,Central Jammu of Jammu

ARVIND SELWAL ,Central Jammu of Jammu Iris Recognition ARVIND SELWAL ,Central Jammu of Jammu

ARVIND SELWAL ,Central Jammu of Jammu Face Recognition ARVIND SELWAL ,Central Jammu of Jammu

Face Recognition(Elastic Bunch Graph Matching (EBGM) ARVIND SELWAL ,Central Jammu of Jammu

Challenges to Biometrics System Large number of classes (~ 6 billion faces) Large intra-class variability Small inter-class variability Segmentation Noisy and distorted images Population coverage & scalability System performance (error rate, speed, cost) Attacks on the biometric system Every biometric characteristic has some limitations Asst. Prof. Arvind Selwal, CUJ,Jammu