authentication using biometrics
TRANSCRIPT
![Page 1: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/1.jpg)
Submitted by:-
Isha Ranjan
12EARIT026
Information Technology
![Page 2: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/2.jpg)
Authentication depends on :-
• What we have :- Smart cards
• What we know :- Passwords
• What we are :- Biometrics
![Page 3: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/3.jpg)
Lets Define !
“A biometric is a physiological
or behavioral characteristic of a
human being that can distinguish
one person from another and that
theoretically can be used for
identification or verification of
identity.”
![Page 4: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/4.jpg)
Why Biometrics?
Identity thefts
Something we know can be
stolen
Predicted or hacked
Reliability on manual
verification
![Page 5: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/5.jpg)
Biometric Authentication Process :-
Two step process:-
• Acquisition• Creation of Master characteristics• Storage of Master characteristics
Comparison of data•Acquisition(s)•Comparison•Decision
Storing of Data
![Page 6: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/6.jpg)
Application Categories :-
Biometric applications available today
are categorized into 2 sectors :-
Psychological :- Iris, Fingerprints,
Hand, Retinal and Face recognition
Behavioral :- Voice, Typing pattern,
Signature
![Page 7: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/7.jpg)
Fingerprint techniques :-
Optical
Capacitive
Ultrasonic
![Page 8: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/8.jpg)
Fingerprint recognition :-
Divides print into loops, whorls and arch
Calculates minutiae points (ridge endings)
Comparisons
Authentication
![Page 9: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/9.jpg)
Storage of Master Characteristics :-
![Page 10: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/10.jpg)
Retinal Scanning :-
User looks straight into retinal reader
Scan using low intensity infrared light
Beam of light traces a standardized path
on the retina
retinal blood vessels absorb light more
readily than the surrounding tissue
The pattern is digitized and stored in
a database
![Page 11: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/11.jpg)
Iris Scanner :-
Iris recognition uses camera technology
with subtle infrared illumination
It acquire images of the detail rich
structures of the iris
Digital templates encoded from these
patterns by mathematical and statistical
algorithms allow unambiguous positive
identification of an individual
![Page 12: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/12.jpg)
Face recognition :-
Facial recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face.
These features are then used to search for other images with matching features.
A probe image is then compared with the face data.
Recognition algorithms can be divided into two main approaches :-
• geometric :- looks at distinguishing features
• photometric :- statistical approach that distils an image into values and compares the values with templates to eliminate variances.
![Page 13: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/13.jpg)
Geometric :-
![Page 14: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/14.jpg)
Photometric :-
Statistical approach
that distils an image
into values and
compares the values
with templates to
eliminate variances.
![Page 15: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/15.jpg)
Behavioral :-
Voice
Signature
Typing pattern
![Page 16: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/16.jpg)
Voice Recognition :-
It is identification of a person
from characteristics of voice.
Characteristics like voice pitch,
speaking style, pauses etc.
Each voice recognition system
has two phases:
• Enrolment
• Verification
![Page 17: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/17.jpg)
Enrolment :-
The speaker's voice is recorded.
A number of features are extracted
to form a voice print.
Verification :-
A speech sample or "utterance" is
compared against a previously
created voice print
![Page 18: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/18.jpg)
Signature Recognition :-
Signature verification analyzes the way a user signs her name.
Signature measures (dynamic)
Speed
Pressure
Handwriting Style
![Page 19: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/19.jpg)
Two types of digital handwritten
signature authentication :-
Static :- Comparison between one scanned
signature and another scanned signature, or
a scanned signature against an ink signature
using advance algorithms.
Dynamic :- Data is captured along with the
X,Y,T and P Coordinates of the signor from
the signing device. To create a biometric
template from which dynamic signatures can
be authenticated
![Page 20: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/20.jpg)
Current applications :-
Banks
Mobile Phones
Attendance System
Forensic Science Department
Immigration facilities across
countries
![Page 21: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/21.jpg)
Conclusion :-
While biometrics technology provides a strong user authentication solution, there are other variables to be considered in the authentication protocol. When a high level of security is needed, it is recommended that you combine other authentication factors with biometrics. When you combine what you know, what you have, and what you are, you will have achieved the highest level of security across multiple applications and systems. According to information made available by the International Biometrics Group, “there is no one right biometrics technology for every application.”
![Page 22: Authentication using Biometrics](https://reader033.vdocuments.us/reader033/viewer/2022051503/5a6cfce87f8b9a16428b48cd/html5/thumbnails/22.jpg)