bio-metrics authentication technique

21
Presented By Rekha Yadav M.Sc.(Maths with Computer Application) Biometric Authentication Technique

Upload: rekha-yadav

Post on 06-May-2015

3.182 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Bio-metrics Authentication Technique

Presented ByRekha Yadav

M.Sc.(Maths with Computer

Application)

Biometric Authentication Technique

Page 2: Bio-metrics Authentication Technique

Authentication is the act of confirming something what it claims to be.

It is the process of giving someone identity so that he or she can access that particular application or data.

For e.g.: giving identity-card to a student of an institute.

What is Authentication?

Page 3: Bio-metrics Authentication Technique

• something you know, like a password, PIN, or code. • Can be easily forgotten

• something you have, like a swipe card, smart card, token, or key.

• Can be easily stolen

• something you are, which is biometrics.

• Secure, convenient & unique

Three main types of Authentication available today are:

Page 4: Bio-metrics Authentication Technique

What is Biometrics?

BIO ► Life

METRIC ► To Measure

Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical

characteristics.

Biometric based authentication systems are able to provide high security against confidential financial transactions and

personal data privacy.

“something that you are”

Page 5: Bio-metrics Authentication Technique

The common Physical characteristics are: Fingerprint Face Iris Vein pattern, and Hand and finger geometry

Behavioral characteristics are: Keystroke dynamics Voice Gait, and Signature dynamics

Biometric Characteristics

Page 6: Bio-metrics Authentication Technique

Uniqueness : Distinction between individuals

Permanence : Resistance to ageing

Collectability : Ease to obtain a biometric for measurement.

Performance : Accuracy, speed, robustness of the biometric system.

Acceptability :Degree of approval of a technology.

Circumvention : Anomalies in the authentication system.

Principle & Standards Of Biometrics

“Everyone in the world is unique, and this uniqueness can

be used for identity verification.”

Page 7: Bio-metrics Authentication Technique

Biometric systems uses three steps:

Enrollment: The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait.

Storage: most of the systems don't store the complete image or recording. They instead analyze your trait and translate it into a code or graph. Some systems also record this data onto a smart card that you carry with you.

Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be.

Working of Biometrics

Page 8: Bio-metrics Authentication Technique

Enrollment & Verification in Biometric System

Page 9: Bio-metrics Authentication Technique

Systems uses three components:

A sensor that detects the characteristic being used for identification.

A computer that reads and stores the information.

Software that analyzes the characteristic, translates it into a graph or code and performs the actual comparisons.

Biometric security systems, like the fingerprint scanner available on the IBM ThinkPad T43, is becoming more common for home use.

Components of Biometric System

Page 10: Bio-metrics Authentication Technique

1) Fingerprint Recognition

2) Face Recognition

3) Iris Recognition

4) Voice Recognition

5) Signature Recognition

Biometric ModalitiesBiometric Modalities

Page 11: Bio-metrics Authentication Technique

Fingerprint Recognition is one of the most used and familiar biometric methods.

1) Finger Printings1) Finger Printings

Database

Page 12: Bio-metrics Authentication Technique

2) Face Recognition2) Face Recognition

Database

Input face imageExtraction of face

imageExtraction of face

features

Positive

Negative

Page 13: Bio-metrics Authentication Technique

3) Iris Recognition3) Iris Recognition

Database

Input of face image Detection of eye regions Put iris in focus

Recognition of iris pattern

Accept

Reject

Page 14: Bio-metrics Authentication Technique

It is the Identification using the acoustic features of speech that have been found to differ between individuals

4) Voice Recognition4) Voice Recognition

Database

Construct voice reference template

Page 15: Bio-metrics Authentication Technique

Signature identification: is the analyses of the way a user signs his or her name.

The process used by a biometric system to verify a signature is called dynamic signature verification (DSV).

4) Signature Identification4) Signature Identification

Biometric Traits for Signature Verification•The angle at which the pen is held•The number of times the pen is lifted, •The time it takes to write the entire signature, •The pressure exerted by the person while signing, •The variations in the speed with which different parts of the signature are written.

Profile

Database

Page 16: Bio-metrics Authentication Technique

The applications of biometrics can be divided into the following three main groups. Commercial applications

computer network login (Fingerprint verification system) electronic data security e-commerce Internet access ATM (face recognition) credit card medical records management, and distance learning (hand geometry systems)

Government applications national ID card driver’s license social security border control, and passport control.

Forensic applications corpse identification criminal investigation terrorist identification parenthood determination, and missing children.

Application of Biometrics Application of Biometrics

Page 17: Bio-metrics Authentication Technique

directly authenticates the person

difficult to steal; thereby making biometrics authentication very

strong.

portable, and is unlikely to be lost.

user cannot share or forget his retina or fingerprint, while a password

and username are easily forgotten.

User friendliness

Comfort

Accuracy

Advantages Of Biometric System Advantages Of Biometric System

Page 18: Bio-metrics Authentication Technique

Disadvantages of Biometrics Costly

Facial imaging can also hinder accurate identifications.

Missing body part problem

False acceptances and rejections.

The scanning of eye is fearful.

Ethical issuesPersonal data used for something other than its advertised purpose.

Privacy issuesWho can access dataMisuse of personal data

Page 19: Bio-metrics Authentication Technique

Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are:

1. Ear shape identification.

2. Body odor identification.

3. Body salinity identification.

4. EEG Fingerprint

5. DNA matching

Future ProspectsFuture Prospects

Page 20: Bio-metrics Authentication Technique

Conclusion

Not perfect yet.

Successful applications.

Decreasing costs and increasing convenience.

Increasing both privacy and identity security.

The field of biometrics is evolving.

Benefit from this technology .

ConclusionConclusion

Page 21: Bio-metrics Authentication Technique

Thank You!