Faculty of Science IT Department Lecturer: Raz Dara MA.

Slides:



Advertisements
Similar presentations
© Copyright 2008 FingerTec Worldwide. All Rights Reserved. Model: M2/R2
Advertisements

Model: TA
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Overview of Computer Vision CS491E/791E. What is Computer Vision? Deals with the development of the theoretical and algorithmic basis by which useful.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Identity Verification in a Networked World
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Introduction to Biometric Systems
Information Security for Managers (Master MIS)
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
G53SEC 1 Authentication and Identification Who? What? Where?
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
G53SEC 1 Authentication and Identification Who? What? Where?
BIOMETRICS THE MAN MACHINE INTERFACE
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Access Control / Authenticity Michael Sheppard 11/10/10.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Access control techniques
A Seminar Report On Face Recognition Technology
Authentication.
Face Recognition 1.
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Biometrics.
ABSTRACT FACE RECOGNITION RESULTS
© Copyright 2008 FingerTec Worldwide. All Rights Reserved.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Exercise: Password Auditing
Ones Technology Products & Solutions
Presentation transcript:

Faculty of Science IT Department Lecturer: Raz Dara MA. Biometrics Faculty of Science IT Department Lecturer: Raz Dara MA.

Definition Biometrics from the worlds “Bio” and “metrics”. Bio means living things. Metrics means measure. Currently, Biometrics stands for measuring human’s features for personal identification Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.

Physical vs. Behavioral (Passive) (Active)

Traditional Methods Traditional means of automatic identification Knowledge-based Use “something that you know” Examples: Password, pin Token-based Use “something that you have” Examples: Credit card, Smart card, keys

Traditional Methods Problem Problems that may occur: Forgot your password!!! Cards can be lost or stolen PINs can be guessed

Solution: Biometrics Identify the rightful owner of token/knowledge User convenience Eliminate rejection claims Difficult to copy or forge Enhanced security Cannot be Lost, forgotten or transferred

Biometrics Examples

Biometrics Classifications Biometrics Data:

Biometrics Classifications Biometrics Features:

Biometrics Classifications Biometrics Characteristics:

Biometric Operation Modes

Feature Extraction The issue of choosing the features to be: carry unique information about the object easy to compute in order for the approach to be feasible

Feature Extraction Feature selection for classification of Orange and Apple

𝑋= 𝑥1 𝑥2 𝑥3 Feature Extraction Extracted Features: The color x1 𝑋= 𝑥1 𝑥2 𝑥3 The color x1 The shape x2 The surface smoothness x3 High Dimension Low Dimension 256 x 256 1 x 3 vector

Feature Extraction Extraction of the features requires the appropriate algorithm to be applied. Depending on the application, many algorithms had been proposed Feature Extraction process is very crucial for the overall performance of any pattern recognition system

Feature Extraction Some of the popular feature extraction algorithms: PCA (Principal Component Analysis) LDA (Linear Discriminant Analysis) ICA (Independent Component Analysis) LBP (Local Binary Pattern) DWT (Discrete Wavelet Transform) SIFT (Scale Invariant Feature Transform) SURF (Speeded Up Robust Features) CWT (Complex Wavelet Transform) …

Biometric Authentication Identification “Who am I?” Establish a person’s identity (1:N Matching) Compare biometric template to all records in a database Verification “Am I who I claim I am?” Confirm or deny claimed identity (1:1 Matching) Biometric template in combination with a smart card, username or ID number

Biometric Authentication Comparison of Authentication Protocols Combination of different methods can give stronger authentication

Biometric Authentication Selection of biometrics technology is Application dependent Two kinds of criteria

Biometrics Applications Access (Cooperative, known subject) Logical Access (Access to computer networks, systems, or files) Physical Access (access to physical places or resources) Transaction Logging Surveillance (Non-cooperative, known subject) Forensics (Non-cooperative or unknown subject)