![Page 1: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/1.jpg)
New Security Approaches
Biometric Technologies are Coming of Age
ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY
![Page 2: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/2.jpg)
Traditional Security Approaches
Magnetic cards/PinsHuman guards
Usernames/passwordsLocks & keys
![Page 3: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/3.jpg)
Traditional security systems are highly
secured
Un
![Page 4: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/4.jpg)
Biometrics......
Computerized methods of instantly recognizing people based on unique physical or behavioral characteristics
![Page 5: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/5.jpg)
Tasks of Biometric Technologies: Identification Captures a person’s
biometric information and looks for a match
Answers question “Who are you?”
Answers question “Are you the one we are looking for?”
![Page 6: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/6.jpg)
Types of Biometrics
Biometrics
Behavioral biometrics Physical biometricVoice recognition
Signature verification
Keystroke dynamics
Finger printing
Face recognitionIris scanning
Retina scanning
Hand geometry
![Page 7: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/7.jpg)
1.Behavioral biometrics
Behavioral biometrics basically measures the characteristics which are acquired naturally over a time. It is generally used for verification.
e.g. Voice recognition Signature verification Keystroke dynamics
![Page 8: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/8.jpg)
1.1 Voice recognition
Here voice of person is stored in the database as a password.
When the same voice with same pitch is recognized then a match will occur.
![Page 9: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/9.jpg)
1.2 Signature verification
the signature of the person is stored in the database.
When the same signature is found means a match occurs then that is accepted.
![Page 10: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/10.jpg)
1.3 Keystroke dynamics
Here the speed of typing or writing is measured and stored in a database.
When a perfect match occurs with the typing speed then accepted.
![Page 11: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/11.jpg)
2 Physical biometric
Physical biometrics measures the inherent physical characteristics on an individual .
![Page 12: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/12.jpg)
2.1 Fingerprinting Finger printing takes an image
(either using ink or a digital scan) of a person's fingertips and records its characteristics.
Whorls, arches, and loops are recorded along with the patterns of ridges, furrows, and minutiae. This information may then be processed or stored as an image or as an encoded computer algorithm to be compared with other fingerprint records for finding the match.
Fingerprinting Devices
![Page 13: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/13.jpg)
2.2 Face recognition Facial recognition analyzes the
characteristics of a person's face images input through a digital video camera.
It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges.
These measurements are retained in a database and used as a comparison when a user stands before the camera.
![Page 14: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/14.jpg)
2.3 Iris scanning Iris scans analyze the features that
exist in the colored tissue surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles.
The scans use a regular video camera style and can be done from further away than a retinal scan.
It will work through glasses fine and in fact has the ability to create an accurate enough measurement that it can be used for identification purposes, and not just verification.
![Page 15: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/15.jpg)
2.4Retina scanning Retinal scanning analyses the
layer of blood vessels at the back of the eye.
Scanning involves using a low-intensity light source and an optical coupler and can read the patterns at a great level of accuracy.
It does require the user to remove glasses, place their eye close to the device, and focus on a certain point. Whether the accuracy can outweigh the public discomfort is yet to be seen.
![Page 16: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/16.jpg)
2.5 Hand geometry
Hand goemetry involves the measurement and analysis of the shape of one's hand.
It is a fairly simple procedure and is surprisingly accurate.
Though it requires special hardware to use, it can be easily integrated into other devices or systems.
![Page 17: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/17.jpg)
Biometrics Comparison
CostAccuracy
Intrusiveness
Fingerprinting
Hand geometry
Voice recognition
Iris scanning
Retina scanning
Face recognition
![Page 18: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/18.jpg)
Future Biometrics
Instant DNA testing Brain wave scanning
![Page 19: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/19.jpg)
Instant DNA testing
DNA are the genetic materials which controls the characteristic of every living organism.
DNA test is made for various purposes like crime detection,paternityness.
![Page 20: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/20.jpg)
Brain wave scanning A scanner measures brain
responses to a stimuli. When one is asked a
question which one knows the true answer, that answer comes first to mind automatically. Even if the individual has already prepared and rehearsed a lie, it is still necessary to think past the true answer and access the lie. This extra activity is easily measured on a brain scan..
![Page 21: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/21.jpg)
Advantage of biometrics
Increase security - Provide a convenient and low-cost additional tier of security .
Reduce fraud by employing hard-to-forge technologies and materials. Eliminate problems caused by lost IDs or forgotten passwords by using
physiological attributes . Unequivocally link an individual to transaction Reduce password administration costs. Offer significant cost savings or increasing
![Page 22: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/22.jpg)
When will biometric technologies by available Available now from a
number of vendors Fingerprinting devices sell
for around $75 Iris scanning devices start
at around $200 Face recognition systems
start at around $10,000 Prices expected to continue
falling by as much as 50% by 2012.
![Page 23: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/23.jpg)
Who is involved with biometrics locally? JK paper mill uses finger
printing technology for their engineers .
IBM and lenevo installed fingerprinting for time and attendance monitoring
NASA experiments with using biometrics to allow engineers to control space flights from home computers
Compaq offers several fingerprinting devices
![Page 24: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/24.jpg)
Conclusion…
In the context of ever increasing technology which we apply in our day today life, Security is of outmost importance which can easily and efficiently be solved by the application of biometric technology.
Biometric is a unique and measurable characteristic of a human being used to identify an individual. A key characteristic of a biometric access system is that it must operate in real-time. As Biometrics uses our body parts or our behavior for security purpose.
So we can conclude that “Person’s security exists
As long as person lives”
![Page 25: N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY](https://reader036.vdocuments.us/reader036/viewer/2022062408/56649e6b5503460f94b68d35/html5/thumbnails/25.jpg)
Your questions are welcome!