Bio metrics
-
Upload
thearcher -
Category
Technology
-
view
643 -
download
6
description
Transcript of Bio metrics
![Page 1: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/1.jpg)
Biometrics
![Page 2: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/2.jpg)
SignaturesHow secure are handwritten
signatures?
The probability that a forged signature will be accepted as genuine mainly depends on the amount of care taken when examining it.
![Page 3: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/3.jpg)
Verification by observation
Problem : High error rates.
![Page 4: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/4.jpg)
Automated verification of signature
Use of machine to verify signature in Banks for cheque-processing.
e.g. MICR
Problem : Error Rate
![Page 5: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/5.jpg)
Why?• Something You Know – Password ,Code• Something You Have – Swipe Card, Token
• Something You are – A Biometric
![Page 6: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/6.jpg)
Definition• Automatic methods for identifying a
person on the basis of some biological or behavioural characteristics of the person.
• To identify, confirmation and security techniques that rely on measurable, individual biological characteristics.
![Page 7: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/7.jpg)
Biometrics identify people by measuring some aspect of individual anatomy or physiology (such as your hand geometry or fingerprint), some deeply ingrained skill, or other behavioral characteristic (such as your handwritten signature), or something That is a combination of the two (such as your voice).
![Page 8: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/8.jpg)
Examples• Facial image• Fingerprints• Handprints• Voice pattern• Iris / Retina• Signature
![Page 9: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/9.jpg)
Finger Prints
![Page 10: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/10.jpg)
Hand Prints
![Page 11: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/11.jpg)
Voice Pattern
![Page 12: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/12.jpg)
Facial Image
![Page 13: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/13.jpg)
![Page 14: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/14.jpg)
Iris / Retina
![Page 15: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/15.jpg)
Signature
![Page 16: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/16.jpg)
![Page 17: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/17.jpg)
Advantages
• Can not be lost or stolen or copied.• Can not be forgotten or guessed by
others.• Very distinctive to each individual
![Page 18: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/18.jpg)
Biometrics are like many other protection mechanisms (alarms, seals, tampersensing enclosures, ...) in that environmental conditions can cause havoc. Noise, dirt, vibration, and unreliable lighting conditions all take their toll.
Some systems, like speaker recognition, are vulnerable to alcohol intake and stress. Changes in environmental assumptions, such as from closed to open systems, from small systems to large
ones, from attended to standalone, from cooperative to recalcitrant subjects can all undermine a system’s viability.
![Page 19: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/19.jpg)
Every technique has some Limits
• Facial image• Fingerprints• Handprints
• Voice pattern• Iris / Retina• Signature
![Page 20: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/20.jpg)
![Page 21: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/21.jpg)
The Design• Identification in the form of verification
or recognition.• Verification – authenticates a person’s
claimed identity by comparing.• Recognition – system determines the
identity of a given person from a database of persons known to it.
![Page 22: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/22.jpg)
System Performance
• True Accept – Genuine individual is accepted.
• True Reject – Imposter is rejected.• False Accept – Imposter is accepted.• False Reject - Genuine individual is
rejected.
![Page 23: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/23.jpg)
![Page 24: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/24.jpg)
The Function• An ideal biometric characteristic should
be Universal, Unique, Permanent and Collectable
• Performance - Accuracy, Speed, and Cost.
• Acceptability and Circumvention.
![Page 25: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/25.jpg)
Current Techniques Physical and Behavioural
• Facial Features• Fingerprints• Hand Geometry• Eye, Retina and Iris Mapping• Signatures• Voice Pattern• Key Stroke Dynamics
![Page 26: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/26.jpg)
Distribution
![Page 27: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/27.jpg)
New Techniques
• Ear Mapping• Body Odour Identification• Body Salinity Identification• EEG Fingerprint• Deoxyribonucleic Acid• Verichip
![Page 28: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/28.jpg)
New Dimensions• Research in New representations, Matching
Algorithms, Database Indexing, Fusion of Biometric Modalities, Live ness Detection, Template Protection, Error Rate Estimation.
• System Testing and Evaluation of Large Database
• Government regulations• Making it Foolproof?• Cost / Benefit Analysis – Quantifying
Deterrence
![Page 29: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/29.jpg)
Issues
• Application• Privacy + & -• Legal• Cost
![Page 30: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/30.jpg)
• Fingerprint recognition as a requirement for ignition of the engine. Jaguar
• Fingerprint scanner to verify season pass holders. Disney
• Hand Geometry for immigration. US Immigration and Naturalization services
• Iris scanner for issue of Rifles to Olympic participants. Winter Olympics Nagano
• Signature verification. For claiming benefits. British Employment Services
• Signature identification for correct distribution of food. Pentonville Prison , England
• Voice Identification to protect computer facilities.
![Page 31: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/31.jpg)
Summary
Biometric measures of one kind or another have been used to identify people since ancient times, with handwritten signatures, facial features, and fingerprints being the traditional methods.
Systems have been built that automate the task of recognition, using these methods and newer ones, such as hand geometry, voiceprints, and iris patterns.
![Page 32: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/32.jpg)
These systems have different strengths and weaknesses. In automatic operation, most have error rates of the order of 1% (though iris recognition is better, hand geometry slightly better, and face recognition worse).
There is always a trade-off between the false accept rate (the fraud rate) and the false reject rate (the insult rate). The statistics of error rates are deceptively difficult.
![Page 33: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/33.jpg)
If any biometric becomes very widely used, there is increased risk of forgery in unattended operation: voice synthesizers, photographs of irises, fingerprint molds, and even good old-fashioned forged signatures must all be thought of in system design.
These do not rule out the use of biometrics, as traditional methods such as handwritten signatures are usable in practice despite very high error rates.
![Page 34: Bio metrics](https://reader033.fdocuments.us/reader033/viewer/2022061200/54716314b4af9fa90a8b4b1b/html5/thumbnails/34.jpg)
Biometrics are usually more powerful in attended operation, where, with good system design, the relative strengths and weaknesses of the human guard and the machine recognition system may complement one another.
Finally, many biometric systems achieve most or all of their result by deterring criminals rather than being effective at identifying them.