Bio Metrics, RFID, Access Control and Security System Projects
Bio Metrics in Security Technology
-
Upload
er-amar-kumar -
Category
Documents
-
view
230 -
download
0
Transcript of Bio Metrics in Security Technology
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 1/24
ROLE OF BIOMETRICS IN SECURITY
TECHNOLOGY
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 2/24
These are automated methods of recognizing aperson based on its physiological characteristics.
These are foundation of an extensive array of highly secure identification and personal verificationsolutions.
Biometric security technologies are used toaccurately identify individuals on a unique trait.
WHAT IS BIOMETRICS?
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 3/24
BIOMETRICS ROLE IN PERSONAL
IDENTIFICATION One of the most important ways that biometrictechnology is impacting security lies within the confines of computer information systems.
Biometric technology offers an alternative to the mostused system currently in place in most operations:passwords or personal identification numbers (PIN).
Instead of users inputting their password or PIN, usersinteract with a computer terminal that will scan their finger,face, voice, retina, etc. to identify them
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 4/24
HOW BIOMETRICS WORKS ?
Enrollmemt
Authenticate/Identify
Accuracy
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 5/24
Fingerprint recognition.
Iris scanning.
Smart card security.
Face recognition.
TYPES OF BIOMETRICS
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 6/24
FINGERPRINT RECOGNITION
Fingerprint matching
Fingerprint classification
Fingerprint image Enhancement
Fingerprint recognition demonstration
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 7/24
FINGERPRINT RECOGNITION
ALGORITHM The Authentication Fingerprint is
captured. The user will be advisedto accurately position his finger onthe device. The quality ismeasured and only good imageswill be accepted. Once an image isaccepted, its relevant informationwill be extracted and stored into adatabase.
The extraction of information
starts with the color reduction toblack and white. Several filtersreduce the noise in the relevantimage areas without destroyingrequired information.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 8/24
ALGORITHM
CONT....
Ridge width is reduced to
one pixel based on the
image.A mask is computed to
be able to exclude noisy,
unsharp or blank areas from
the recognition process.
This mask is also used to
determine the overall image
quality.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 9/24
ALGORITHM
CONT....
Minutiae locations are
extracted. False Minutiae are
rejected by the quality mask
(Step 3) Various Features are
extracted from each Minutia
Once taught in, the user may
now authenticate himself by
putting the finger on the device.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 10/24
ALGORITHM CONT....
The so extracted data is compared to thetraining data in the database. The finger of theuser has been shifted to the right and wasslightly rotated. Corresponding minutiae datais connected with a line in this illustration.Dots are unmatched minutiae.
• The user has been accepted .
The extracted data is compared to thetraining data in the database. There is only locorrelation between some minutiae. Additionalmatching criteria checks fail.
• The user has been rejected.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 11/24
IRIS SCANNING Iris scans analyze the features that exist in the colored
tissue surrounding the pupil which has more than 200points that can be used for comparison, including rings,furrows and freckles.
The scans use a regular video camera style and can bedone from further away than a retinal scan.
It will work through glasses fine and in fact has theability to create an accurate enough measurement that
it can be used for identification purposes, and not muchverification.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 12/24
HOW IRIS SCANNING WORKS ?
The user’s eye is positioned near the
camera of the iris recognition device.The camera automatically zooms in and
focuses.
The camera captures image of the iris.
This can be done through eyeglasses,
contact lenses or at night.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 13/24
HOW IRIS SCANNING
WORKS ?A computer program analyzes the
patterns within each circular gridand transforms them into a data
file, which is like a personal bar code.
The code from the iris iscompared against a database of previously recorded irises toconfirm the Identification of the
user.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 14/24
SMART CARD SECURITY
CARD SECURITY
BIOMETRICS IDENTIFICATION
PHYSICAL STRUCTURE
LIFE CYCLE OF A SMART CARD
LOGICAL STRUCTURE AND ACCESS CONTROLS
SMART CARD SOFTWARE
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 15/24
SMART CARD SOFTWARE
• It has been established that any secure
transaction involves 6 generic functions as
followed:
Data Protection
Identification of the cardholder
Mutual authentication
Secure writing Certification or signature
Encryption
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 16/24
FACIAL RECOGNITION
Facial recognition analyzes the characteristics of a person's face images
input through a digital video camera.
It measures the overall facial structure, including distances between
eyes, nose, mouth, and jaw edges.
These measurements are retained in a database and used as a
comparison when a user stands before the camera. This biometric has ben widely, and perhaps wildly, touted as a fantastic
system for recognizing potential threats (whether terrorist, scam artist,
or known criminal) but so far has been unproven in high-level usage. It is
currently used in verification only systems with a good deal of success.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 17/24
HOW FACIAL RECOGNITION WORKS ?
User faces the camera, standing about two feet from it. Thesystem will locate the user's face and perform matchesagainst the claimed identity or the facial database.
It is possible that the user may need to move and reattemptthe verification based on his facial position.
The system usually comes to a decision in less than 5seconds.
To prevent a fake face or mold from faking out the system,many systems now require the user to smile, blink, or otherwise move in a way that is human before verifying.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 18/24
HOW THE SOFTWARE WORKS ?
Detection
Normalization
Matching
Representation
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 19/24
WHERE BIOMETRICS ARE BEEN USED ?
Panasonic sells an iris reader for desktop computers that does log-onsand videoconferencing. ADT Security Services now uses Visionics face-recognition systemsat the airports they protect.
Some new PC models use desktop fingerscanners on their mouse or keyboards.The Los Angleles Firemen's Credit Union spent $40,000 on afingerprint-.scanning system. Its 90 employees no longer need toremember up to 10 passwords to use networks and applications. They
just touch the finger pad and they're ready to go. St. Vincent Hospitals and Health Care Center uses a fingerprintreader system and biometric software in its facilities of up to 3,000 staff and physicians to access computers.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 20/24
ADVANTAGES OF BIOMETRICS SECURIT
First, unlike passwords or PIN numbers, biometrics looks ata person’s unique trait, which cannot be replicated by others.Thus, when a user scans their retina for access to a
computer’s resources, biometrics links the event to a certainindividual.
Second, Users do not need to remember their password or carry around other identification forms (like a driver’s license).
Third, biometrics offers better, more accurate authenticationcompared to current password/PIN systems (2002).
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 21/24
LIMITATIONS AND DISADVANTAGES
First, biometric technology can be relatively intrusive on users,especially if computers are using fingerprints and retina scans toidentify users. The issue of personal privacy comes into play whensuch delicate information is being recorded.
Second, many of the biometric techniques for identifying usersare expensive and difficult to implement on current computer systems.
Third, many of the biometric techniques take a lot of effort to useand can be complicated for those who are unfamiliar with the
technology.
Fourth, biometric security techniques are not equally accurateand dependable.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 22/24
CONCLUSION Biometric security technology cannot be
overplayed. Even with its disadvantages andupfront costs, biometric technology is simplythe best route to preventing identity theft andsecuring computers from unwanted users.
As the technology works its way intocorporate computers and home PCs, thedemand for the product will increase and theuneasiness towards the technology willdecrease.
Biometrics are quickly becoming moresocially acceptable, more accurate, and lessexpensive. Their place in the future: assured.Their impact on security: profound.
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 23/24
REFERENCES
An Introduction to Biometrics” The Biometric Consortiume” http://www.biometrics.org/html/introduction.htm, 23 June
2004 About Biometrics” Information Technology Laboratory”
http://www.itl.nist.gov/div893/biometrics/about.html,23 June 2004.
Bertolucci, James” Products for the Paranoid”http://www.pcworld.com/news/article/0,aid,116573,00.asp23 June 2004.
Mace, Scott.”Gates Previews Security Projects”http://www.pcworld.com/news/article/0,aid,114916,00.asp 23 June
O’Brien, James A.Management Information Systems”
Managing Information Technology in the Business Enterprise"New York: McGraw-Hill, 2004c Newell, Adrienne.Is Biometrics Coming to a PC Near You?
http://www.pcworld.com/news/article/0,aid,115289,00.asp 2004d, March 19
8/14/2019 Bio Metrics in Security Technology
http://slidepdf.com/reader/full/bio-metrics-in-security-technology 24/24