Biometric

28
Presented By: SAGAR DEOKATE KIRAN WANGIKAR

description

Best Seminar !

Transcript of Biometric

Page 1: Biometric

Presented By:SAGAR DEOKATE

KIRAN WANGIKAR

Page 2: Biometric

CONTENTS

Biometrics OverviewNeed of BiometricsWorking PrincipalPhysical ModesBehavioral ModesApplicationsBenefitsConcernConclusion

Page 3: Biometric

Biometrics Overview

Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic

Better than traditional method.

Definition:

Physical: Fingerprint Facial Recognition Hand Geometry Iris Scan Retinal Scan DNA

Behavioral: Speaker Recognition Signature Recognition

Page 4: Biometric

NEED

Traditional methods have some flawsTo secure access to building, computer

system, laptop, phone, ATM, bank account, & many more.

For security & reduce financial fraud. To prevent fraudulent acts like faking ID

badges or licenses.Types of biometric: 1. single model biometric system. 2. multi model biometric system.

Page 5: Biometric

WORKING PRINCIPAL

1.Enrollment Adding biometric information to data file.

2.Input Device Sensors, cameras etc

3. Comparison with the database.4. Decision

Page 6: Biometric

WORKING

Page 7: Biometric

Biometrics Overview

Verification Matching against a single record. It is 1:1 matching

Identification Matching against all record in the database. It is 1:N matching.

Ways to recognize a person:

Page 8: Biometric

Error and Accuracy

2 types of errors:False rejection: When an actual client gets identified as

imposter.False acceptance: When an actual imposter gets

identified as client.

Accuracy:FRR =number of false rejections/number of client accesses

FAR = number of false acceptance/number of client accesses

TER=(no of FA+no of FR)/total no accesses.

Page 9: Biometric

PHYSICAL MODES

o Fingerprinto Facial Recognitiono Hand Geometryo Iris Scano Retinal Scano DNA

Page 10: Biometric

Fingerprint

Typical System: fingerprint scanner maps the series of whorls, ridges, furrows and minutiae on the surface of the finger

Optical sensor and Solid State sensor are used.

Page 11: Biometric

Fingerprint structure

Page 12: Biometric

FACIAL RECOGNITION

Typical system: digital video camera input of a person’s face images- measures facial structure; compares against database

2 Methods:Face geometryFacial thermograph: uses infrared heat scans to

identify facial characteristics.

Page 13: Biometric

HAND GEOMETRY

Analyses and computes features like length and width of finger, ratio of palm or fingers, width and thickness of the palm.

Basic procedure involves taking images of top and side views of hand using camera.

Page 14: Biometric

Iris Recognition

Iris analysisTypical system: scanner analyzes features

like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.

Sophisticated camera uses infrared imager to capture high resolution photograph.

Advantage:o Iris is well protected area of eye with minimum

possibility of injury.

Page 15: Biometric

Retina Scanning

Analysis of layer of blood vessels at the back of the eye

Typical system: low-intensity infrared light source and an optical coupler to scan a unique vascular pattern of retina and its reflection is recorded.

Most accurate and reliable method.

Page 16: Biometric

DNA (Deoxyribonucleic acid)

A DNA sample is used to produce either a DNA fingerprint or a DNA profile

Comparison of alleles of DNA sequences found in nuclear genetic material.

Used in medical field and forensic investigation purpose.

Page 17: Biometric

BEHAVIORAL MODE

Speaker Recognition Signature Recognition

Page 18: Biometric

Speaker Recognition

Voice recognition and analysisTypical system: uses the pitch, pattern,

tone, frequency, rhythm of speech for identification purposes; only biometric that allows users to authenticate remotely.

3 types:Fixed text methodText dependent methodText independent method

Page 19: Biometric

Signature Recognition

Handwriting analysis Typical System: user will sign on a tablet, the

device will record pressure, speed, sequence and shape of characters and compare to a database.

Verification is based on features like no. of interior contours and no. of vertical slope components.

Rarely used method.

Page 20: Biometric

Comparison Chart Accuracy/Reliability

Biometric Accuracy Reliability Errors

Fingerprint Very High High Dirt, dryness

Facial Recognition High Medium Hair, glasses, age

Hand Geometry High Medium Hand injury

Iris Scan Very High High Poor lighting

Retinal Scan Very High High Glasses

DNA Very High High none

Speaker Recognition Medium Low Noise, colds

Signature Recognition Medium Low Changing signatures

Accuracy: How well can the specific biometric is able to tell individual apartReliability: how dependable the specific biometric is for recognition purposes

Page 21: Biometric

APPLICATIONS

BIOMETRIC TECH

APPLICATIONS

FINGERPRINTS Law enforcement, entry devices for offices and colleges, enterprise security; medical and financial

FACIAL RECOGNITION Automated bank tellers- user verification purposes

HAND GEOMETRY Time and attendance systems, physical access

IRIS SCAN Law Enforcement, Employee Security Check, banking

Page 22: Biometric

RETINA SCAN High-end security, military, power plans

DNA Medical applications, Paternity Tests, Criminal identification and forensics

VOICE RECOGNITION Call Centers, Law enforcement – house arrest authentication

SIGNATURE Access to documents, Banking services

Page 23: Biometric

What Biometrics are Replacing

Passwords PIN numbers

Tokens Photo ID cards Smart cards Magnetic strip cards Physical keys

Traditional verification methods:

Page 24: Biometric

Current Biometric Applications

Computer loginsATMsGrocery storesAirport kiosksDriver’s licensesInternet bankingNational ID cardsWelfare disbursementInternational border crossingForensics – criminal identificationAnnual amusement park pass holdersSpeaker verification for television home shopping

Page 25: Biometric

BENEFITS

Increased security measuresReduce costs of password and ID card

maintenanceAbility to track employees and link activities No passwords to forgetElimination of problems such as lost/stolen

identification cards and PIN numbersFaster login timeImproved security of sensitive information

Page 26: Biometric

CONCERNS

Sensitive biometric information susceptible to hackers.

Lack of privacy for employees.Costly and time consuming to implement .

Page 27: Biometric

CONCLUSION

Multi biometric systems have a huge potential of growth.

Access procedures are made simpler, faster and more secure.

Especially governments, law enforcement agencies, military and industrial companies, already make partial use of this technology.

In the future biometric devices will surely become more involved in many civil areas.

Page 28: Biometric

THANK YOU!THANK YOU!