a study on biometric authentication techniques

Post on 06-May-2015

6.982 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

This Slide will describe briefly 5 different Biometric Techniques and compare them.

TRANSCRIPT

Preparedd BySubhash BasishthaSaptarshi BoruahM.Tech Scholar.

BIOMETRIC AUTHENTICATION TECHNIQUES

Presentation outlines What is Authentication ? Types of Authentication What is Biometric? Why Biometric? Characteristics of Biometric Mode of Biometric system Working of Biometrics System Different Biometric techniques Comparison Between Different Techniques Performance Metrics Applications of Biometric Authentication Limitations of Biometric System Conclusion References

What is Authentication

Authentication is the act of confirming something what it claims to be.

It is the process of giving someone identity so that he or she can access that particular application or data.

For e.g.: giving identity-card to a student of an institute.

Main types of authentication

By using passwords, PIN

By using smart card or swipe card

By using Biometric

What Is Biometric ?

Biometric is a combination of two Greek words Bio(Life) and Metric(To Measure).

It actually measures and analyzes the biological traits of a human being.

Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical characteristics.

Contd..

Biometric based authentication systems are able to provide high security against confidential financial transactions and personal data privacy.

“something that you are”

Why Biometric?

Identity theft is not possible password remembrance problem does

not exist Cannot be predicted or hacked Cannot be shared Perceived as more secure

Characteristics of BiometricAutomated method of recognizing an individual is

based on two main characteristics :

Physical characteristics are related to physical shape of the body. For e.g.: fingerprint ,face recognition, hand geometry, iris recognition etc.

Behavioral characteristics are related to the behavior of a person. For e.g.: voice pitch, speaking style, typing rhythm, signature etc.

Biometric Technique Classification

[3]

Mode of Biometric SystemIdentification One-to-many comparison It search for a sample against a database of templates It identifies an unknown individual. For e.g.: who is “x”?

Verification One-to-one comparison It compares a sample against a single stored template It verifies that the individual is who he claims to be For e.g.: is this “x”?

Working of biometric system

Steps: Capturing Pre-processing Feature extraction Template matching Matcher/Comparison Application Device

[3]

Working process

Enrollment: In this stage, the information captured from the subject by the sensing device is stored in a database for later comparison. When someone uses biometric for the first time then the stage is called enrollment.

Contd…

Authentication: In this stage, the registered biometric sample during the enrollment process are matched against newly capturing biometric sample.

Biometric devices consist of

A scanning device A software which converts scanned

information into digital forms and compares on some matching points

A database that stores biometric features for further comparison

Different biometric technique

Fingerprint technology: It is the oldest and most widely used

method. It needs a fingerprint reader. Registered points are located and compared. Optical sensors are used for scanning

purpose. It can be used for many applications like pc

login security, voting system, attendance system etc.

[12]

Contd.. Uses the ridge endings and bifurcation's on a

persons finger to plot points known as Minutiae The number and locations of the minutiae vary

from finger to finger in any particular person, and from person to person for any particular finger

Finger Image + MinutiaeFinger Image Minutiae

Face recognition technology: Face Recognition is a biometric technique for

automatic identification or verification of a person from a digital image.

These include the position/size/shape of the eyes, nose, cheekbones and jaw line.

Contd..

Iris Recognition Technology: It measures the iris pattern of the eye i.e.

the colored part of the eye that surrounds the pupil.

The iris canner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.

Iris pattern is not changed over years or by glasses, contact lens

Contd..

Hand Geometry Technology This method uses hand images for person

identification or verification. Person identification using hand geometry

utilizes hand images to extract a number of features such as finger length, width, thickness, finger area etc.

Measures the digits of the hand and compares to those collected at the time of enrollment.

Contd..

Places hand on the system, which takes the three dimensional image of the hand.

Contd..

[6]

Speaker recognition technology: Voice Recognition or Speaker Recognition is a

biometric process of validating a user's claimed identity using characteristics extracted from their voices.

It uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes.

A telephone or microphone can act as a sensor.

Contd..

During the enrollment phase, the spoken words are converted from analog to digital format, and the distinctive vocal characteristics such as pitch, frequency, and tone, are extracted, and a speaker model is established.

A template is then generated and stored for future comparisons.

Speaker recognition is often used where voice is the only available biometric identifier, such as telephone.

Contd..

Comparison Between Different Technique

[3]

Performance Metrics

FAR(False Acceptance Rate) : It is a measure of the percent of invalid inputs that are incorrectly accepted.

FRR(False Reject Rate) : It is a measure of the percent of valid inputs that are incorrectly rejected.

CER(Crossover Error Rate) : The rate at which both the accept and reject errors are equal.

- a lower value of the CER is more accurate for Biometric System.

Performance Metrics Curve

[4]

Applications of Biometric System

Criminal identification Internet banking Attendance system Airport, Bank security PC login security Prevents unauthorized access to private

data Financial transaction management

Limitations of Biometric System

Presence of noise in the sensed data Variations in the enrolled data Non-universality It is an expensive security solution

Conclusion

The development of e-commerce or e-government sites can be achieved through the utilization of this strong authentication process.

The greatest strength of the biometric system is that they does not change over time so it is much more efficient than other traditional security mechanism.

REFERENCES1. Emanuele Maiorana, Chiara Ercole, Secure

Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography.

2. Fernando L. Podio and Jeffrey S. Dunn.Biometric Authentication Technology: From the Movies to Your Desktop.

3. Fahad Al-harby, Rami Qahwaji, and Mumtaz Kamala. Secure Biometrics Authentication: A brief review of the Literature.

4. Dr. NatarajanMeghanathan. Biometrics for Information Security.

REFERENCES5. Anil K. Jain, AjayKumar,

Biometrics of Next Generation: An Overview. SPRINGER, 2010.

6. Debnath Bhattacharyya, Rahul Ranjan, Farkhod Alisherov A.,and Minkyu Choi. Biometric Authentication: A Review, International Journal of u- and e- Service, Science and Technology ,Vol. 2, No. 3, September, 2009.

7. Dr. JK Schneider. BIOMETRICS, SMARTPHONES AND THE E-WALLET.2011.

8. Zdenek Ríha, Václav Matyáš. Biometric Authentication Systems. FIMU Report Series.

REFERENCES9. Phalguni Gupta, Ajita Rattani, Hunny Mehrotra,

Anil Kumar Kaushik. Multimodal Biometrics System for Efficient Human Recognition.

10. Debnath Bhattacharyya,Rahul Ranjan,Poulami Das,Tai Hoon Kim, Samir Kumar Bandyopadhyay, Biometric Authentication Technique and Its Future probabilities. IEEE Trans Int. conf. On Computer and Electrical Engineering,pp. 652-655, 2009.

11. A. K. Jain, A. Ross and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125 –143, June 2006.

12. http://en.wikipedia.org/wiki/Biometric_authentication

top related