Biometrics Identity Management Agency Biometrics Report, FY11
Biometrics 7
-
Upload
er-amar-kumar -
Category
Documents
-
view
212 -
download
0
Transcript of Biometrics 7
-
8/14/2019 Biometrics 7
1/13
-
8/14/2019 Biometrics 7
2/13
-
8/14/2019 Biometrics 7
3/13
INTRODUCTIONINTRODUCTION
Q. What is Biometrics ?
:- The meaning of Biometrics comes from the Greeks. In
Which the word Bio means life and the word metry
means to measure.
So we can also say that Biometric
means the measurement of life for statistical purposeswhere using body as a password. Its a new technology
that could be used by banks, airports and hospitals to
ensure secure networks.
-
8/14/2019 Biometrics 7
4/13
Q.How Does Biometrics work?
:- Biometrics functions works on a very simple principle:
everyone in the world is unique, and this uniqueness can
be used for identity verification.
Most Biometric technology systems
use the same basic principles of operation. First, a person
must be registered, or enrolled, on the biometric system.
Now when a user wants to enter a system , the system willneed his sample, If the sample is matched, the user is
authenticated and granted access to the computer;
otherwise the user is not granted access.
PRINCIPLEPRINCIPLE
-
8/14/2019 Biometrics 7
5/13
Functions of Biometric SystemsFunctions of Biometric Sys
temsOne useful way of thinking about biometricsOne useful way of thinking about biometrics
is that they are used for one of two purposes:is that they are used for one of two purposes:
(A) To prove that you are who you say you are(A) To prove that you are who you say you are
(positive ID).(positive ID).
In a positive ID situation, the subject assertsIn a positive ID situation, the subject asserts
that she is Jane Doe and submits a "live"that she is Jane Doe and submits a "live"
sample (a fingerprint, for example) to thesample (a fingerprint, for example) to the
system. The system then checks its databasesystem. The system then checks its database
of previously enrolled or registered samplesof previously enrolled or registered samples
to see if the live sample matches theto see if the live sample matches the
reference sample. A positive ID system isreference sample. A positive ID system isdesigned to prevent more than one persondesigned to prevent more than one person
from using a single identity.from using a single identity.
-
8/14/2019 Biometrics 7
6/13
(B) To prove that you are not who you say(B) To prove that you are not who you say
you are not (negative ID).you are not (negative ID).
In a negative ID situation, John Roe claimsIn a negative ID situation, John Roe claims
notnot to be someone already known to theto be someone already known to thesystem. Here, the system checks its databasesystem. Here, the system checks its database
to see that Roe is not on the watch list ofto see that Roe is not on the watch list of
suspected criminals and terrorists, whosesuspected criminals and terrorists, whose
biometrics are already in the system. Abiometrics are already in the system. Anegative ID system is designed to preventnegative ID system is designed to prevent
one person from using more than oneone person from using more than one
identity.identity.
When biometrics is employed to effectWhen biometrics is employed to effectnegative identification, one need not benegative identification, one need not be
enrolled. The only persons who must be "in"enrolled. The only persons who must be "in"
the database are those whom the operator isthe database are those whom the operator is
trying to keep out or catch.trying to keep out or catch.
-
8/14/2019 Biometrics 7
7/13
BIOMETRIC TECHNOLOGIESBIOMETRIC TECHNOLOGIES
Various Biometric system modes & its working
A video camera shoots an image of theA video camera shoots an image of the
eye.The patterns of the iris areeye.The patterns of the iris are
converted into digitized code.The code isconverted into digitized code.The code is
compared with a database of iris codes.compared with a database of iris codes.
IrisIris
RecognitionRecognition
Converts the image of aConverts the image of a
fingerprint into afingerprint into amathematical template of themathematical template of the
print's minutiae points.print's minutiae points.
FingerprintFingerprint
scanscan
A camera captures the imageA camera captures the imageof a face.Features andof a face.Features and
discrete areas of his face arediscrete areas of his face are
analyzedanalyzed ..
FaceFaceRecognitionRecognition
HOW IT WORKSHOW IT WORKSMODEMODE
-
8/14/2019 Biometrics 7
8/13
KeystrokeKeystrokeDynamicsDynamics
The system analyses theThe system analyses thecharacteristics rhythm of acharacteristics rhythm of aperson's typing.person's typing.
HandHand
GeometryGeometry
A picture of the hand is taken andA picture of the hand is taken andsalient features are examined.Thesesalient features are examined.These
include 3D shape,length,width ofinclude 3D shape,length,width offingers and shape of knuckles.fingers and shape of knuckles.
Retinal scanRetinal scan User's position their eye in proximity toUser's position their eye in proximity toa retinal reader and focus their sight ona retinal reader and focus their sight onan illuminated target inside thean illuminated target inside the
reader.An image of the retina's bloodreader.An image of the retina's bloodvessel pattern is saved in a file.vessel pattern is saved in a file.
VoiceVoiceverificationverification
The user states a pass phraseThe user states a pass phraseinto a microphone or telephoneinto a microphone or telephone
handset.handset.
-
8/14/2019 Biometrics 7
9/13
-
8/14/2019 Biometrics 7
10/13
DISADVANTAGESDISADVANTAGES
In Iris recognition ,it is Relatively expensive;requires large amount of computer storage; may not
be generally accepted by public.
In Voice verification , Works well over thetelephone but Requires large amount of computer
storage; people's voices can change; background
noises can interfere.
When the data collected from the user passes
through the system, the data is not encrypted at all.
-
8/14/2019 Biometrics 7
11/13
APPLICATIONSAPPLICATIONS
PC access and internet security.
Safety on weapons: no access for children and other
unauthorized user.
Mobile phones: network access, theft protection,
mobile financial transaction.
Credit cards, bank cards,ATM cards.
Malaysia's Kuala Lampur airport has incorporated
as a facial recognition.
Various applications of Biometric Authentication are as follows:-
-
8/14/2019 Biometrics 7
12/13
CONCLUSIONCONCLUSION
Biometric Authentication Systems are used to improve
computer and network security. They reduce the risks
associated with the use of passwords and usernames.
Their advantages overcome the disadvantageshowever; biometrics authentication systems are
expensive and not fully tested that is why they are not
globally used.
-
8/14/2019 Biometrics 7
13/13