TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Department of Labor HSPD-12
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Chapter 10: Authentication Guide to Computer Network Security.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
A Seminar Report On Face Recognition Technology
Face Recognition 1.
Summary Physical Access & Time and Attendance PC/Network Access
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presentation transcript:

TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION

BIOMETRICS OUTLINE  INTRODUCTION  BIOMETRICS :A GENERAL OVERVIEW  LEADING BIOMETRIC TECHNOLOGIES  BIOMETRIC APPLICATION  BIOMETRIC RESEARCH  CONCLUSION

Biometrics WHAT IS BIOMETRICS?  Biometrics is a set of Automated methods to recognize a person based on Physiological and behavioral characteristics.  Depending on application context Biometric system can be either verification or identification.

Biometrics HOW CAN WE USE BIOMETRICS Identification: One to Many match. (1->N). Provides a “username + password “equivalent. Verification:One to One match.(1->1). Provides a “password” equivalent. Verifies whether the user is whom he claims to be.

Biometrics HOW BIOMETRIC MATCHING WORKS  Enrollment and Template Creation  Templates  Biometric Matching

Biometrics BENEFITS OVER TRADITIONAL METHODS  Reduced Cost  Reduced Size  Increased Accuracy  Increased Ease Of Use  Increased security  Increased Accountability.

Biometrics LEADING BIOMETRIC TECHNOLOGIES  Finger Scan  Facial Scan  Iris Scan  Voice Scan  Signature Verification  Voice Verification  Hand Geometry

FINGER SCAN TECHNOLOGY Biometrics There are five stages involved in finger scan verification and identification.  Image Acquisition  Image Processing  Location of Distinctive Characteristics  Template creation  Template Matching

Biometrics FINGER SCAN- STRENGTHS  Mature, Proven core technology, capable of high levels of accuracy.  It employs ergonomic, easy to use devices.  It can be deployed in a range of environments.  Ability to enroll multiple fingers can increase system accuracy and flexibility.

Biometrics LEADING FINGER SCAN TECHNOLOGIES  Optical Technology  Silicon Technology  Ultra Sound Technology.

Biometrics IRIS SCAN TECHNOLOGY There are five stages involved in iris scan identification and verification.  Image Acquisition  Image Processing  Distinctive features  Template Generation  Template Matching

Biometrics IRIS SCAN STRENGTHS Iris Scan technology has been successfully implemented in ATMs and KIOSKS for banking and travel applications.  It has potential for exceptionally high levels of accuracy.  It is capable of reliable identification and verification.  It maintains a stability of characteristics over a life time.

Biometrics BIOMETRIC APPLICATIONS Traditionally biometric applications are divided into three main categories.  Applications providing “logical access” to data or information  Applications providing “physical access” to tangible material or controlled areas.  Applications which verify or identify an individual from a database or token.

Biometrics AREAS OF DEPLOYMENT  Criminal Identification  Retail/ATM/point of sale  E-Commerce /Telephony  PC/network access  Physical access / Time and attendance  Citizen Identification  Surveillance

Biometrics BIOMETRIC RESEARCH  Designing privacy enhancing biometrics  Hybrid Technology : combining biometrics with smart cards and public key infrastructure (PKI).  Need for multidisciplinary convergence of traditional disciplines.

Biometrics  There is great demand for the fast, tremendously accurate authentication biometric systems.  Continued improvements in technology, increased performance at a lower cost, fueling the continued growth in operational systems is always necessary.  The growth will place greater demand on both biometric system developers and they need to work together for better future of biometrics CONCLUSION