Presented by: k.ramya krishna

Slides:



Advertisements
Similar presentations
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
PALM VEIN TECHNOLOGY.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
WELCOME.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Information about Biometrics and its security By Ridham Bhatt.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
WELCOME TO PALM VEIN TECHNOLOGY M.Sravanthi K.Raga Ranjitha
Biometrics Authentication Technology
PRESENTATION ON BIOMETRICS
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
A BETTER TOMORROW Makenzie Nelson, Savana Canary, and Emily Haimes.
R ETINAL S CANNING by the Man, the Myth, the Legend Justin Thompson.
BIOMETRICS.
Physical Security Secure the room Secure the machine – 6 ways.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Overview of Bio-Tech Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Black Ice Security Services
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometric Security Fujitsu Palm Vein Technology
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometric Security Palm Vein Technology
Seminar Presentation on Biometrics
BSC Biometric Security System
Biometrics.
Margaret Brown 3rd period October 14, 2007
Government Security Seriousness
BSC Biometric Security System
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Pace University IT691/Fall 2015
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Presented by: k.ramya krishna PALM VEIN TECHNOLOGY . Presented by: k.ramya krishna

Biometric Systems

Finger print system Finger prints can be easily copied. The problems with finger print system … Finger prints can be easily copied. Wrong result if the finger is dirty. False positives. If the software is not sufficiently sophisticated concerns over hygiene. Not everyone would like to put their fingers on a sensor touched by others.

Facial Biometrics The problems with facial biometrics system … These are susceptible to environmental changes such as lighting.  With age too, facial recognition deteriorates. Changes in appearance with the use of cosmetics, earrings, hair, etc, can give wrong readings too. It's estimated there's a 5% drop in accuracy per year due to aging.

Iris Scanning The problems with Iris scanning biometrics system … Many commercial Iris scanners can be easily fooled by a high quality image of an iris or face in place of the real thing. The accuracy of scanners can be affected by changes in lighting. Iris scanners are significantly more expensive than some other forms of biometrics. Iris recognition is very difficult to perform at a distance larger than a few meters.

Palm vein authentication device uses blood vessel patterns as a personal identifying factor. Blood vessel patterns are unique to every individual. Even the vein patterns on each hand are different.

Palm vein authentication Sensor emits near infrared beam to the palm Palm has to be positioned 3-8 cm over the sensor Oxygen reduced blood within the veins absorbs the near infrared light The generated template can be stored in either a database The sensors template library SW changes the raw image into template data The sensors wide angular near infrared camera takes a raw image of the palm vein pattern

Why veins are chosen.. When near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, causing it to be visible as black regions to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-infrared light, are invisible to the sensor, hence “VEINS” are chosen.

How Secure is the Technology? How Secure is the Technology? On the basis of testing the technology on more than 70,000 individuals, Fujitsu declared that the new system had a false rejection rate of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access). And a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans). And if you registered your profile as a child, it'll still be recognized as you grow, as an individual's patterns of veins are established in utero (before birth).

Overview of Biometrics Technology + - Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive Sensitive Palm Vein Non-invasive Relatively Cheap Accurate Unfamiliar

accuracy Palm Secure .00008% .01% Fingerprint 1-2% 3% Iris Technology False Acceptance rate False Rejection Rate Palm Secure .00008% .01% Fingerprint 1-2% 3% Iris .0001% - .94% .99% - .2% Voice 2% 10%

comparison

applications

Thank you for paying attention

Any queries