biometrics
TRANSCRIPT
![Page 1: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/1.jpg)
BIOMETRICS
PRESENTED BY
VISHWAJEET & ADOTHU RAMBABU
ROLL NO – 467/11 & 537/11
NATIONAL INSTITUTE OF TECHNOLOGYJAMSHEDPUR, INDIA – 831014
![Page 2: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/2.jpg)
INTRODUCTION Biometrics refers to the automatic identification of a
person based on his or her physiological or behavioral characteristics.
Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity.
![Page 3: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/3.jpg)
PHYSIOLOGICAL AND/OR BEHAVIORAL CHARACTERISTICS
Behavioral: Voice Keystroke Signature
Physiological: Fingerprint Hand Eyes (Iris , Retina) DNA Face
![Page 4: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/4.jpg)
BIOMETRICS
![Page 5: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/5.jpg)
BIOMETRICS: WHY?
Eliminate memorization – ◦ Users don’t have to memorize features of their voice, face, eyes, or fingerprints
Eliminate misplaced tokens – ◦ Users won’t forget to bring fingerprints to work
Can’t be delegated – ◦ Users can’t lend fingers or faces to someone else
Often unique – ◦ Save money and maintain database integrity by eliminating duplicate enrollments
![Page 6: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/6.jpg)
WORKING OF BIOMETRICS TECHNOLOGY
ALL BIOMETRIC SYSTEMS WORKS IN A FOUR-STAGE PROCESS THAT CONSISTS OF THE FOLLOWING STEPS:
• CAPTURE : A Biometric system collects the sample of biometric features like fingerprint, voice etc of the person who wants to login to the system.
• EXTRACTION: The data extraction is done uniquely from the sample and a template is created. Unique features are then extracted by the system and converted into a digital biometric code. This sample is then stored as the biometric template for that individual.
• COMPARISON: The template is then compared with a new sample. The biometric data are then stored as the biometric template or template or reference template for that person.
• MATCH/NON-MATCH: The system then decides whether the features extracted from the new sample are a match or a non-match with the template.
![Page 7: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/7.jpg)
SIGNATURE SCAN
Measures speed, pressure, stroke order an image of signature.
Non-repudiation
Mainly used for verification
# PROBLEMS:
Forgers could reproduce
![Page 8: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/8.jpg)
VOICE VERIFICATION
Measures the sound waves of human speech.
pitch, intensity, quality and duration.
user talks to a microphone a passphrase.
voice print is compare to a previous one.
#PROBLEMS:
include background noise
![Page 9: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/9.jpg)
KEYSTROKE SCAN
Measures the time between strokes and duration of key pressed.
Most commonly used in systems where
keyboard is already being used.
![Page 10: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/10.jpg)
FINGER PRINT RECOGNITION
Fingerprint verify the authenticity of the individual.
Among all the biometric techniques, fingerprint-based identification is the oldest
method that has been successfully used in numerous applications.
Everyone is known to have unique, immutable
fingerprints. A fingerprint is made of a series of
ridges and furrows on the surface of the finger.
# Advantage:
Low storage space required compared to other ones.
![Page 11: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/11.jpg)
RETINA RECOGNITION
Scan the retina to authenticate the identity of a person.
Unique to each person.
Unique to each eye.
Highly reliable because no two people have
the same retinal pattern.
# Problems:
1. It has extremely low acceptance rate .
2. Measurement accuracy can be affected by a disease
3. Not very user friendly
![Page 12: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/12.jpg)
FACIAL RECOGNITION
Location and position of facial features.
Distance between the eyes.
Distance between the eyes and nose ridge.
Angle of a cheek.
Slope of the nose.
Facial temperatures.
![Page 13: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/13.jpg)
HAND SCAN
Typical systems measure 90 different features: Overall hand and finger width Distance between joints Bone structure
Primarily for access control: Machine rooms Olympics
Strengths: No negative connotations – non-intrusive Reasonably robust systems
Weaknesses: Accuracy is limited; can only be used for 1-to-1 verification Bulky scanner
![Page 14: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/14.jpg)
TEMPLATE SIZE
Biometric Approx. Template Size
Voice 70k – 80k
Face 84 bytes – 2k
Signature 500 bytes – 1000 bytes
Fingerprint 256 bytes – 1.2k
Hand Geometry 9 bytes
Iris 256 bytes – 512 bytes
Retina 96 bytes
![Page 15: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/15.jpg)
Advantages : Biometric attributes are unique and these can’t be faked or interchanged so,
this uniqueness imparts a high level security to these systems.
There is no need for remembering passwords, pin’s etc.
Disadvantages :
Biometric template data consume more space than the conventional user
id/password combinations.
Advantages & Disadvantages
![Page 16: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/16.jpg)
APPLICATIONS
Commercial
Computer login
Electronic payment
ATMS
Government
Passport control
Forensic
Missing persons
Criminal investigations
![Page 17: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/17.jpg)
BIOMETRIC MARKET SHARE
![Page 18: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/18.jpg)
References Biometrics.gov.
http://www.biometrics.gov/ReferenceRoom/Introduction.aspx Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition."
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1 (2004): 4-20. IEEE Xplore.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027 Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer.
http://libcat.clemson.edu/record=b2478857 Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction
Evaluating Biometric Systems." Computer 33.2 (2000): 56-63. IEEE Xplore. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=820040
http://bprl.cs.clemson.edu/about.html http://bprl.cs.clemson.edu/projects.html
![Page 19: Biometrics](https://reader034.vdocuments.us/reader034/viewer/2022051616/555b607ad8b42a932e8b4d28/html5/thumbnails/19.jpg)
Thank you