Biometrics 7

download Biometrics 7

of 13

Transcript of Biometrics 7

  • 8/14/2019 Biometrics 7

    1/13

  • 8/14/2019 Biometrics 7

    2/13

  • 8/14/2019 Biometrics 7

    3/13

    INTRODUCTIONINTRODUCTION

    Q. What is Biometrics ?

    :- The meaning of Biometrics comes from the Greeks. In

    Which the word Bio means life and the word metry

    means to measure.

    So we can also say that Biometric

    means the measurement of life for statistical purposeswhere using body as a password. Its a new technology

    that could be used by banks, airports and hospitals to

    ensure secure networks.

  • 8/14/2019 Biometrics 7

    4/13

    Q.How Does Biometrics work?

    :- Biometrics functions works on a very simple principle:

    everyone in the world is unique, and this uniqueness can

    be used for identity verification.

    Most Biometric technology systems

    use the same basic principles of operation. First, a person

    must be registered, or enrolled, on the biometric system.

    Now when a user wants to enter a system , the system willneed his sample, If the sample is matched, the user is

    authenticated and granted access to the computer;

    otherwise the user is not granted access.

    PRINCIPLEPRINCIPLE

  • 8/14/2019 Biometrics 7

    5/13

    Functions of Biometric SystemsFunctions of Biometric Sys

    temsOne useful way of thinking about biometricsOne useful way of thinking about biometrics

    is that they are used for one of two purposes:is that they are used for one of two purposes:

    (A) To prove that you are who you say you are(A) To prove that you are who you say you are

    (positive ID).(positive ID).

    In a positive ID situation, the subject assertsIn a positive ID situation, the subject asserts

    that she is Jane Doe and submits a "live"that she is Jane Doe and submits a "live"

    sample (a fingerprint, for example) to thesample (a fingerprint, for example) to the

    system. The system then checks its databasesystem. The system then checks its database

    of previously enrolled or registered samplesof previously enrolled or registered samples

    to see if the live sample matches theto see if the live sample matches the

    reference sample. A positive ID system isreference sample. A positive ID system isdesigned to prevent more than one persondesigned to prevent more than one person

    from using a single identity.from using a single identity.

  • 8/14/2019 Biometrics 7

    6/13

    (B) To prove that you are not who you say(B) To prove that you are not who you say

    you are not (negative ID).you are not (negative ID).

    In a negative ID situation, John Roe claimsIn a negative ID situation, John Roe claims

    notnot to be someone already known to theto be someone already known to thesystem. Here, the system checks its databasesystem. Here, the system checks its database

    to see that Roe is not on the watch list ofto see that Roe is not on the watch list of

    suspected criminals and terrorists, whosesuspected criminals and terrorists, whose

    biometrics are already in the system. Abiometrics are already in the system. Anegative ID system is designed to preventnegative ID system is designed to prevent

    one person from using more than oneone person from using more than one

    identity.identity.

    When biometrics is employed to effectWhen biometrics is employed to effectnegative identification, one need not benegative identification, one need not be

    enrolled. The only persons who must be "in"enrolled. The only persons who must be "in"

    the database are those whom the operator isthe database are those whom the operator is

    trying to keep out or catch.trying to keep out or catch.

  • 8/14/2019 Biometrics 7

    7/13

    BIOMETRIC TECHNOLOGIESBIOMETRIC TECHNOLOGIES

    Various Biometric system modes & its working

    A video camera shoots an image of theA video camera shoots an image of the

    eye.The patterns of the iris areeye.The patterns of the iris are

    converted into digitized code.The code isconverted into digitized code.The code is

    compared with a database of iris codes.compared with a database of iris codes.

    IrisIris

    RecognitionRecognition

    Converts the image of aConverts the image of a

    fingerprint into afingerprint into amathematical template of themathematical template of the

    print's minutiae points.print's minutiae points.

    FingerprintFingerprint

    scanscan

    A camera captures the imageA camera captures the imageof a face.Features andof a face.Features and

    discrete areas of his face arediscrete areas of his face are

    analyzedanalyzed ..

    FaceFaceRecognitionRecognition

    HOW IT WORKSHOW IT WORKSMODEMODE

  • 8/14/2019 Biometrics 7

    8/13

    KeystrokeKeystrokeDynamicsDynamics

    The system analyses theThe system analyses thecharacteristics rhythm of acharacteristics rhythm of aperson's typing.person's typing.

    HandHand

    GeometryGeometry

    A picture of the hand is taken andA picture of the hand is taken andsalient features are examined.Thesesalient features are examined.These

    include 3D shape,length,width ofinclude 3D shape,length,width offingers and shape of knuckles.fingers and shape of knuckles.

    Retinal scanRetinal scan User's position their eye in proximity toUser's position their eye in proximity toa retinal reader and focus their sight ona retinal reader and focus their sight onan illuminated target inside thean illuminated target inside the

    reader.An image of the retina's bloodreader.An image of the retina's bloodvessel pattern is saved in a file.vessel pattern is saved in a file.

    VoiceVoiceverificationverification

    The user states a pass phraseThe user states a pass phraseinto a microphone or telephoneinto a microphone or telephone

    handset.handset.

  • 8/14/2019 Biometrics 7

    9/13

  • 8/14/2019 Biometrics 7

    10/13

    DISADVANTAGESDISADVANTAGES

    In Iris recognition ,it is Relatively expensive;requires large amount of computer storage; may not

    be generally accepted by public.

    In Voice verification , Works well over thetelephone but Requires large amount of computer

    storage; people's voices can change; background

    noises can interfere.

    When the data collected from the user passes

    through the system, the data is not encrypted at all.

  • 8/14/2019 Biometrics 7

    11/13

    APPLICATIONSAPPLICATIONS

    PC access and internet security.

    Safety on weapons: no access for children and other

    unauthorized user.

    Mobile phones: network access, theft protection,

    mobile financial transaction.

    Credit cards, bank cards,ATM cards.

    Malaysia's Kuala Lampur airport has incorporated

    as a facial recognition.

    Various applications of Biometric Authentication are as follows:-

  • 8/14/2019 Biometrics 7

    12/13

    CONCLUSIONCONCLUSION

    Biometric Authentication Systems are used to improve

    computer and network security. They reduce the risks

    associated with the use of passwords and usernames.

    Their advantages overcome the disadvantageshowever; biometrics authentication systems are

    expensive and not fully tested that is why they are not

    globally used.

  • 8/14/2019 Biometrics 7

    13/13