Authentication using Biometrics

Post on 28-Jan-2018

84 views 0 download

Transcript of Authentication using Biometrics

Submitted by:-

Isha Ranjan

12EARIT026

Information Technology

Authentication depends on :-

• What we have :- Smart cards

• What we know :- Passwords

• What we are :- Biometrics

Lets Define !

“A biometric is a physiological

or behavioral characteristic of a

human being that can distinguish

one person from another and that

theoretically can be used for

identification or verification of

identity.”

Why Biometrics?

Identity thefts

Something we know can be

stolen

Predicted or hacked

Reliability on manual

verification

Biometric Authentication Process :-

Two step process:-

• Acquisition• Creation of Master characteristics• Storage of Master characteristics

Comparison of data•Acquisition(s)•Comparison•Decision

Storing of Data

Application Categories :-

Biometric applications available today

are categorized into 2 sectors :-

Psychological :- Iris, Fingerprints,

Hand, Retinal and Face recognition

Behavioral :- Voice, Typing pattern,

Signature

Fingerprint techniques :-

Optical

Capacitive

Ultrasonic

Fingerprint recognition :-

Divides print into loops, whorls and arch

Calculates minutiae points (ridge endings)

Comparisons

Authentication

Storage of Master Characteristics :-

Retinal Scanning :-

User looks straight into retinal reader

Scan using low intensity infrared light

Beam of light traces a standardized path

on the retina

retinal blood vessels absorb light more

readily than the surrounding tissue

The pattern is digitized and stored in

a database

Iris Scanner :-

Iris recognition uses camera technology

with subtle infrared illumination

It acquire images of the detail rich

structures of the iris

Digital templates encoded from these

patterns by mathematical and statistical

algorithms allow unambiguous positive

identification of an individual

Face recognition :-

Facial recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face.

These features are then used to search for other images with matching features.

A probe image is then compared with the face data.

Recognition algorithms can be divided into two main approaches :-

• geometric :- looks at distinguishing features

• photometric :- statistical approach that distils an image into values and compares the values with templates to eliminate variances.

Geometric :-

Photometric :-

Statistical approach

that distils an image

into values and

compares the values

with templates to

eliminate variances.

Behavioral :-

Voice

Signature

Typing pattern

Voice Recognition :-

It is identification of a person

from characteristics of voice.

Characteristics like voice pitch,

speaking style, pauses etc.

Each voice recognition system

has two phases:

• Enrolment

• Verification

Enrolment :-

The speaker's voice is recorded.

A number of features are extracted

to form a voice print.

Verification :-

A speech sample or "utterance" is

compared against a previously

created voice print

Signature Recognition :-

Signature verification analyzes the way a user signs her name.

Signature measures (dynamic)

Speed

Pressure

Handwriting Style

Two types of digital handwritten

signature authentication :-

Static :- Comparison between one scanned

signature and another scanned signature, or

a scanned signature against an ink signature

using advance algorithms.

Dynamic :- Data is captured along with the

X,Y,T and P Coordinates of the signor from

the signing device. To create a biometric

template from which dynamic signatures can

be authenticated

Current applications :-

Banks

Mobile Phones

Attendance System

Forensic Science Department

Immigration facilities across

countries

Conclusion :-

While biometrics technology provides a strong user authentication solution, there are other variables to be considered in the authentication protocol. When a high level of security is needed, it is recommended that you combine other authentication factors with biometrics. When you combine what you know, what you have, and what you are, you will have achieved the highest level of security across multiple applications and systems. According to information made available by the International Biometrics Group, “there is no one right biometrics technology for every application.”