Biometrics Security System Presentation

Published on May 2016 | Categories: Types, School Work | Downloads: 44 | Comments: 0 | Views: 338
of 25
Download PDF   Embed   Report

Explains the importance of Biometrics Security System into security.Methods of Biometric

Comments

Content

A
SEMINAR ON
BIOMETRICS SECURITY SYSTEM

Presented By:GAZAL GUPTA
VIII-SEM
IT

SEMINAR
 INTRODUCTION
 Biometrics is a rapidly evolving technology
 Facilitates the automatic identification based on
physical or behavioral characteristics
 Eliminates the need to memorize a password or
carry some form of token

SEMINAR
 WHAT IS A BIOMETRIC ?
 Science and technology of measuring and

statistically analyzing biological data that is represented
in human by patterns unique to
every individual

Biometrics is a science of measuring the unique physical
characteristics of a person such as voice, a face or a
fingerprint. These personal features are analyzed and
stored as bioprints in a reference database, on a smart
card

SEMINAR
Figure describing the process involved in
using the biometric system

SEMINAR
 SUBSYSTEMS OF BIOMETRIC MODEL
 DATA COLLECTION
 TRANSMISSION(compression, transmission, expansion)
 SIGNAL PROCESSING(pattern matching, quality control ,features extraction)
 DECISION MAKING
 DATA STORAGE(Database, smart card,)

SEMINAR
 TYPES OF BIOMETRIC SYSTEM
 Fingerprint Verification
 Hand Geometry
 Retinal Scanning
 Iris Scanning
 Facial Recognition
 Signature Verification
 Voice Verification

SEMINAR
 DETAIL ANALYSIS OF IRIS SCANNING
 Iris scan takes about 30sec & 2sec for verification
 A camera located at about 3 feet focuses on & scans iris from one side
 This scan is converted into a template
 Only phase information is used for recognizing iris as amplitude information is depends on
extraneous factors

SEMINAR

A IRISCODE Sample

SEMINAR

Iris scanning enabled Atm

Authenticam used for iris scanning

SEMINAR
 ADVANTAGES OF IRIS SCANNING
 Iris pattern posses high degree of randomness,variability & uniqueness
 Patterns are apparently stable throughout life
 Encoding & decision making are tractable
 Image analysis & encoding time : 1sec
 Search period : 100000 iris codes/sec

SEMINAR
 DISADVANTAGES OF IRIS SCANNING
 Small target (1cm) to acquire from a distance (1m)
 Located behind a curved, wet, reflecting surface
 Obscured by eyelashes,lenses,reflections
 Partially occluded by eyelids, often dropping
 Illumination should not be visible or bright

Fingerprint Authentication
• a fingerprint impression is acquired
• The next step is to locate these features in the fingerprint
image, using an automatic feature extraction algorithm.

How does fingerprint identification
work?
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 The first step in fingerprint identification is collecting the fingerprint,
named enrollment.
 In this step, the applicant acquires the reference fingerprint for later
authentication.
 The reference fingerprint is called the template of the fingerprint
 After the capture of the template, it can be stored in a database, on a
token with 2D barcode, or in a smart card
 At this point, the applicant is registered and the next stage is to compare
the fingerprint with the template to the fingerprint read by the sensor.
 After reading the fingerprint, the authentication system extracts the
minutiae in the same way as it did during the enrollment process
 Since the fingerprint is never captured in the same position, the
verification algorithm must perform rotation and translation of the
captured fingerprint in order to adjust the fingerprint minutiae with the
template minutiae.

Components Of a Fingerprint System

SEMINAR
 CHARACTERICTICS FOR SELECTING
A BIOMETRIC TECHNOLOGY
 Accuracy
 Ease of use
 Error incidence
 Cost
 User acceptance
 Required security level
 Long term stability

SEMINAR
Character
istic

Finger
Print

Hand
Geometry

Retina

Iris

Face

Signature

Voice

Ease of
use

High

High

Low

Medium

Medium

High

High

Error
Incidence

Dryness,
Dirt,Age

Hand
Injury,Ag
e

Glasses

Poor
Lighting

Lighting,
Age,Glas
ses

Changing
Signature
s

Noise,Co
lds,Weath
er

Accuracy

High

High

Very
High

Very
High

High

High

High

Cost

*

*

*

*

*

*

*

User
Acceptan
ce

Medium

Medium

Medium

Medium

Medium

Medium

High

Required
Security

High

Medium

High

Very
High

Medium

Medium

High

LTS

High

Medium

High

High

Medium

Medium

Medium

SEMINAR
 METHODS TO RATE BIOMETRICS
ACCURACY
FALSE- ACCEPTANCE RATE (FAR)
FALSE- REJECTION RATE (FRR)

SEMINAR
 The plot of FAR Vs FRR representing
crossover error rate

SEMINAR
 COST

ANALYSYS FOR BIOMETRICS

 Hardware
Back-end processing power to maintain database
Research & testing of the system
User education
Exception processing
System maintenance

SEMINAR
 BIOMETRICS APPLICATIONS
 Indian Initiatives





Bioenable Technology, Pune
Siemens Information System Ltd., Banglore
Axis Software, Pune
Jaypeetex ,Mumbai

 Global Developments





Internet Security : Litronix, Usa
Windows Biometrics : Microsoft
Net Nanny Software International
Biometric Smart Cards : Polarid & Atmel

SEMINAR
 FUTURE OF BIOMETRICS
 ATM Machine Use
 Travel & Tourism
 Public Identity Card

SEMINAR
 CONCLUSION
 Your fingerprints, iris pattern, and voice will verify your identity
 You can unlock your house or withdraw money from your bank with
just a blink of eye, a tap of your finger, or by just showing your face

SEMINAR
 BIBLIOGRAPHY








Biometrics : Journal of International Biometric Society
The Biometrics Constrium ……………..May 2002
Electronics For You ……………………June 2002
www.biometric.com
www.bioventric.com
http://homepage.ntlworld.com/avanti
http://www.ibia.org

SEMINAR

SEMINAR

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close