Presentation is loading. Please wait.

Presentation is loading. Please wait.

Asst. Prof. Arvind Selwal, CUJ,Jammu

Similar presentations


Presentation on theme: "Asst. Prof. Arvind Selwal, CUJ,Jammu"— Presentation transcript:

1 Asst. Prof. Arvind Selwal, CUJ,Jammu
What is Biometrics? Biometrics–Science, which deals with the automated recognition of individuals based on biological and behavioral characteristics. Biometry– mathematical and statistical aspects of biology Biometric system –essentially an automatic pattern recognition system that recognizes a person by determining the authenticity of a specific biological and/or behavioral characteristic (biometric) possessed by that person Asst. Prof. Arvind Selwal, CUJ,Jammu

2 Asst. Prof. Arvind Selwal, CUJ,Jammu
Biometric Technology Biometric Technology is concerned with representation, storage, matching, synthesis and visualization of biometric information. Tremendous advancements has been achieved over the last few years in both fundamental theoretical development, matching and synthesis, as well as biometric hardware and software products. Asst. Prof. Arvind Selwal, CUJ,Jammu

3 Traditional identification
Traditional means of automatic identification: –Possession-based (credit card, smart card) Use “something that you have” –Knowledge-based (password, PIN) Use “something that you know” –Biometrics-based (biometric identifier) Use something that relies on “what you are” Asst. Prof. Arvind Selwal, CUJ,Jammu

4 Traditional identification Vs Latest Biometrics
Asst. Prof. Arvind Selwal, CUJ,Jammu

5 Problems with traditional approach
Tokens may be lost, stolen or forgotten Passwords or PINs may be forgotten or guessed by the imposters –25% of people seem to write their PIN on their ATM card Estimates of annual identity fraud damages: –$1 billion in credit card transactions –$1 billion in fraudulent cellular phone use –$3 billion in ATM withdrawals The traditional approaches are unable to differentiate between an authorized person and an impostor (person pretending to be somebody he/she is not) Asst. Prof. Arvind Selwal, CUJ,Jammu

6 Asst. Prof. Arvind Selwal, CUJ,Jammu
BIOMETRICS EVOLUTION Henry Faulds, William Herschel and Sir Francis Galton proposed quantitative identification through fingerprint and facial measurements in the 1880s. Edmond Locard introduced using biometrics in forensic identification in 1920s. Asst. Prof. Arvind Selwal, CUJ,Jammu

7 Asst. Prof. Arvind Selwal, CUJ,Jammu
BIOMETRICS EVOLUTION The development of digital signal processing techniques in the 1960s led to work in automatic human identification. Speaker and fingerprint recognition systems were among the first to be explored. The potential for application of this technology to high-security access control, personal locks and financial transactions were recognized in the early 1960s. The 1970s saw development and deployment of hand geometry systems, the start of large-scale testing and increasing interest in government use of these "automated personal identification" technologies. There are currently 180 readers used by about 18,000 enrolled users. Retinal and signature verification systems came in the 1980s, followed by the face systems. Iris recognition systems were developed in the 1990s. Asst. Prof. Arvind Selwal, CUJ,Jammu

8 Requirements to biometrics
1. Universality: everyone should have it 2. Uniqueness: small probability that two persons are the same in terms of this characteristic 3. Permanence: invariance with the time 4. Collectability: can be measured quantitatively 5. Performance: high identification accuracy 6. Acceptability: acceptance by people 7. Circumvention: how easy to fool the system by fraudulent technique Asst. Prof. Arvind Selwal, CUJ,Jammu

9 Asst. Prof. Arvind Selwal, CUJ,Jammu
Biometrics System Sensor module: A suitable biometric reader or scanner is required to acquire the raw biometric data of an individual. Quality assessment and feature extraction module: The quality of the biometric data acquired by the sensor is first assessed in order to determine its suitability for further processing. The biometric data is then processed and a set of salient discriminatory features extracted to represent the underlying trait. Matching and decision-making module: The extracted features are compared against the stored templates to generate match scores System database module: During the enrolment process, the feature set extracted from the raw biometric sample (i.e., the template) is stored in the database (possibly) along with some biographic information (such as name, Personal Identification Number (PIN), address, etc.) characterizing the user. Asst. Prof. Arvind Selwal, CUJ,Jammu

10 Asst. Prof. Arvind Selwal, CUJ,Jammu

11 Verification versus identification
In the verification mode, the system validates a person’s identity by comparing the captured biometric data with his/her own biometric template(s) stored in the system database. The system conducts a one-to-one comparison to determine whether the claim is true or not. In the identification mode, the system recognizes an individual by searching the templates of all the users in the database for a match. Therefore, the system conducts a one-to-many comparison to establish an individual’s identity (or fails if the subject is not enrolled in the system database) without the subject having to claim an identity (e.g., “Whose biometric data is this?”). Asst. Prof. Arvind Selwal, CUJ,Jammu

12 Verification versus identification (Con’d)
Asst. Prof. Arvind Selwal, CUJ,Jammu

13 Applications of biometrics
1. Commercial applications such as computer network login, electronic data security, e-commerce, Internet access, ATM or credit card use, physical access control, mobile phone, PDA, medical records management, distance learning, etc. 2. Government applications such as national ID card, managing inmates in a correctional facility, driver’s license, social security, welfare-disbursement, border control, passport control, etc. 3. Forensic applications such as corpse identification, criminal investigation, parenthood determination, etc. National Security: using Biometric system for border Level Tourism Management: Management of Gathering and monitoring ARVIND SELWAL ,Central Jammu of Jammu

14 Accepted biometrical traits
Asst. Prof. Arvind Selwal, CUJ,Jammu

15 ARVIND SELWAL ,Central Jammu of Jammu
Hand Geometry System ARVIND SELWAL ,Central Jammu of Jammu

16 ARVIND SELWAL ,Central Jammu of Jammu
Hand Geometry System ARVIND SELWAL ,Central Jammu of Jammu

17 Fingerprint Recognition
ARVIND SELWAL ,Central Jammu of Jammu

18 ARVIND SELWAL ,Central Jammu of Jammu
Iris Recognition ARVIND SELWAL ,Central Jammu of Jammu

19 ARVIND SELWAL ,Central Jammu of Jammu
Face Recognition ARVIND SELWAL ,Central Jammu of Jammu

20 Face Recognition(Elastic Bunch Graph Matching (EBGM)
ARVIND SELWAL ,Central Jammu of Jammu

21 Challenges to Biometrics System
Large number of classes (~ 6 billion faces) Large intra-class variability Small inter-class variability Segmentation Noisy and distorted images Population coverage & scalability System performance (error rate, speed, cost) Attacks on the biometric system Every biometric characteristic has some limitations Asst. Prof. Arvind Selwal, CUJ,Jammu


Download ppt "Asst. Prof. Arvind Selwal, CUJ,Jammu"

Similar presentations


Ads by Google