Accuracy of biometrics pw

9
ACCURACY OF BIOMETRICS ACCURACY OF BIOMETRICS Submitted by Submitted by B.SAI KRISHNA B.SAI KRISHNA

Transcript of Accuracy of biometrics pw

Page 1: Accuracy of biometrics pw

ACCURACY OF ACCURACY OF BIOMETRICSBIOMETRICS

Submitted by Submitted by B.SAI KRISHNAB.SAI KRISHNA

Page 2: Accuracy of biometrics pw

ABSTRACTABSTRACT At one end, there is a continuous and At one end, there is a continuous and

tremendous improvement in the lifestyle of tremendous improvement in the lifestyle of Humans while at the other end; the technological Humans while at the other end; the technological crimes are increasing rapidly. crimes are increasing rapidly.

Technologies capable of identifying each person Technologies capable of identifying each person uniquely need to be developed. The only powerful uniquely need to be developed. The only powerful solution for the problem of illegal authentication solution for the problem of illegal authentication is Biometrics.is Biometrics.

Biometrics is a means of using the physiological Biometrics is a means of using the physiological or behavioral characteristics of a person as a or behavioral characteristics of a person as a kind of permanent password.kind of permanent password.

Page 3: Accuracy of biometrics pw

CONTENTSCONTENTS

INTRODUCTIONINTRODUCTION THE BIOMETRIC MODELTHE BIOMETRIC MODEL MULTIMODAL MULTIMODAL

BIOMETRICSBIOMETRICS APPLICATIONSAPPLICATIONS CONCLUSIONCONCLUSION

Page 4: Accuracy of biometrics pw

INTRODUCTIONINTRODUCTION Biometrics is an automated method of recognizing a Biometrics is an automated method of recognizing a

person based on a physiological or behavioral person based on a physiological or behavioral characteristic. characteristic.

Biometric technologies are becoming the foundation Biometric technologies are becoming the foundation of an extensive array of highly secure identification of an extensive array of highly secure identification and personal verification solutions. and personal verification solutions.

Most systems make use of a personal identification Most systems make use of a personal identification code in order to authenticate the user. code in order to authenticate the user.

Page 5: Accuracy of biometrics pw

THE BIOMETRIC MODELTHE BIOMETRIC MODEL

The biometric authentication system consists of the The biometric authentication system consists of the following partsfollowing partsUser interface or the biometric readerUser interface or the biometric readerCommunication SubsystemCommunication SubsystemThe Controlling softwareThe Controlling software

Data storageData storage

Page 6: Accuracy of biometrics pw

APPLICATIONSAPPLICATIONS

BIOMETRIC BANKING: Banks have been BIOMETRIC BANKING: Banks have been experimenting with keystroke Biometrics for ATM experimenting with keystroke Biometrics for ATM machine use and to counteract the credit card frauds.machine use and to counteract the credit card frauds.

INTERNET SECURITY: If the password is leaked out, INTERNET SECURITY: If the password is leaked out, the computer or the web server will not be able to the computer or the web server will not be able to identify whether the original user is operating the identify whether the original user is operating the computer.computer.

BIOMETRIC SMARTCARDS:BIOMETRIC SMARTCARDS: Biometric technologies Biometric technologies are used with smart cards for ID systems applications are used with smart cards for ID systems applications specifically due to their ability to identify people with specifically due to their ability to identify people with minimal ambiguity. minimal ambiguity.

Page 7: Accuracy of biometrics pw

BIOMETRIC CAPTURE

IMAGEPROCESS

101001101101

BIOMETRIC MATCHING

TEMPLATE EXTRACT

101001101101

98%

IMAGE LIVE UPDATE

MATCHING SCORE STOREDTEMPLATE

STORAGE DEVICE

Page 8: Accuracy of biometrics pw

CONCLUSIONCONCLUSION Keystroke Biometrics offers a valuable Keystroke Biometrics offers a valuable

approach to current security technologies that approach to current security technologies that make it far harder for fraud to take place by make it far harder for fraud to take place by preventing ready impersonation of the preventing ready impersonation of the authorized user.authorized user.

Even if the unauthorized user discovers the Even if the unauthorized user discovers the access code, he cannot get access to the system access code, he cannot get access to the system until and unless he also knows the rhythm.until and unless he also knows the rhythm.

Also, the typing rhythm can be self-tuned by Also, the typing rhythm can be self-tuned by the user to suit his needs. As the keyboard has the user to suit his needs. As the keyboard has duplicate keys, the typing rhythm also depends duplicate keys, the typing rhythm also depends whether the user is a left-handed person or a whether the user is a left-handed person or a right-handed person. Positively Keystroke right-handed person. Positively Keystroke Biometrics will replace the entire traditional Biometrics will replace the entire traditional security systems in the future.security systems in the future.

Page 9: Accuracy of biometrics pw

Thank youThank you