BIOMETRICS THE MAN MACHINE INTERFACE

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

Face Recognition and Biometric Systems Elastic Bunch Graph Matching.
Face Recognition By Sunny Tang.
Face Recognition Method of OpenCV
Face Recognition and Biometric Systems
As applied to face recognition.  Detection vs. Recognition.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
BIOMETRICS. SCOPE Biometrics – Still an Evolving Technology Biometrics – Past and Present How It Works? Machines for Bio Measurements Future Aspects Benefits.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Biometrics: Faces and Identity Verification in a Networked World
Face Recognition Committee Machine Presented by Sunny Tang.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Biometrics & Security Tutorial 6. 1 (a) Understand why use face (P7: 3-4) and face recognition system (P7: 5-10)
Oral Defense by Sunny Tang 15 Aug 2003
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
PCA & LDA for Face Recognition
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Access Control Via Face Recognition Progress Review.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
1 ISO/IEC JTC1/SC37 Standards A presentation of the family of biometric standards October 2008.
Biometrics.
Review of Chapters 1, 2, and 3 Motion diagrams – both physical and pictorial representations Difference between instantaneous and average velocities Meaning.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
3D Face Recognition Using Range Images
U of HCOSC 6397 – Lecture 2 #1 U of HCOSC 6397 Lecture 2: Introduction to Biometrics (II) Prof. Ioannis Pavlidis.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Technical Devices for Security Management Kathryn Hockman COSC 481.
Facial Recognition By Lisa Tomko.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
3D Password.
Multimodal Biometric Security 1.
Diane DiLorenzo Cosc 101 section 7
Authentication.
Multimodal Biometric Security
PRESENTED BY Yang Jiao Timo Ahonen, Matti Pietikainen
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Facial Recognition in Biometrics
Biometric technology.
Sfax University, Tunisia
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

BIOMETRICS THE MAN MACHINE INTERFACE

INTRODUCTION BIOMETRICS – definition. Biometric system comprised of Integrated components like : Sensor. Signal processing algorithms. Data storage. Matching algorithm. Decision process.

BIOMETRIC MODALITIES Biometric modalities include fingerprint, face, iris, voice, signature and hand geometry etc.. Implementing a biometric device including location, security risks etc..

DYNAMIC SIGNATURE Various measurements are observed and processed for comparison. Dynamic Signature Depiction: As an Individual signs the contact sensitive tablet.

APPROACH TO DYNAMIC SIGNATURE Graphic Depiction of Dynamic Signature Characteristic.

FACE RECOGNITION Predominant Approaches : Principal Components Analysis (PCA). Linear Discriminant Analysis (LDA). Elastic Bunch Graph Matching (EBGM).

PCA: Principal Components Analysis Standard Eigenfaces: Feature vectors are derived using Eigenfaces.

LDA: Linear Discriminant Analysis Example of Six Classes Using LDA.

EBGM: Elastic Bunch Graph Matching Elastic Bunch Map Graphing.

IRIS RECOGNITION Iris Diagram. Iris Structure.

APPROACH TO IRIS RECOGNITION White outlines indicate the localization of the iris and eyelid boundaries. Pictorial Representation of Iris Code.

Iris vs. Retina Recognition Structure of the Eye.

CONCLUSION Biometrics provides high security and reduces the incidence of unauthorized access in sensitive areas. Biometrics cannot be lost, stolen or forgotten. More secure than a long password.

REFERENCES www.biometrics.dod.mil/ www.ifpo.org/articlebank/biometrics.html www.questbiometrics.com www.toodoc.com/biometrics-ppt.html

QUERIES…???