Biometrics Security System

40
BIOMETRIC SECURITY SYSTEM Presented by:- Group D

Transcript of Biometrics Security System

Page 1: Biometrics Security System

BIOMETRIC SECURITYSYSTEM

Presented by:- Group D

Page 2: Biometrics Security System

Introduction of Biometric Security

System

Page 3: Biometrics Security System

Biometrics is defined as the unique physical/logical characteristics or traits of human body.

Any details of the human body which differs from one human to other will be used as unique biometric data to serve as that person's unique identification ,

such as: retinal, iris, fingerprint, palm print and DNA.

Page 4: Biometrics Security System

Biometric systems will collect and store this data in order to use it for verifying personal identity.

The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems.

The biometric security system is a lock and capture mechanism to control access to specific data.

Page 5: Biometrics Security System

Governments, businesses and organizations can use biometric systems to get more information about individuals or about a populace as a whole.

Many biometric systems are developed for security applications.

An airport scanning device, a "bio-password" system, or an internal data gathering protocol is an example of a biometric system that uses identifying data for a security result.

Page 6: Biometrics Security System

Biometrics can be sorted into two classes:

PhysiologicalExamples: face, fingerprint, hand geometry

and iris recognition BehaviouralExamples: signature and voice

Classification of Biometrics(In general)

Page 7: Biometrics Security System

Common: Fingerprint

Recognition Face Recognition Speaker Recognition Iris Recognition Hand Geometry Signature verification

Others: DNA Retina recognition Thermo grams Gait Keystroke Ear recognition Skin reflection Lip motion Body odor

Biometric Identifiers

Page 8: Biometrics Security System

Odor & Scent cognitive system

Page 9: Biometrics Security System

Odors have been shown to impact human performance across a range of contexts.

The focus of the current special issue reflects incidental industrial/environmental odor exposure.

If odor effects are secondary to an odor-induced elevation in mood, one might predict that similar valance odors produce qualitatively equivalent effects on cognition and mood.

Page 10: Biometrics Security System

Odor qualities have often been assessed by perception-based ratings.

Although they have been applied for more than 5 decades, these psychological approaches have not yielded a comprehensive or generally accepted classification system yet.

Page 11: Biometrics Security System

By reviewed 28 perception-based classification studies and found that their outcome has been largely determined by 4 influencing factors:

1) inter individual differences in perceptual and verbal abilities of subjects 2)stimuli characteristics 3)approaches of data collection 4)methods of data analysis.

Page 12: Biometrics Security System

Facial Cognitive System

Page 13: Biometrics Security System

A facial recognition system is a computer application capable of identifying or verifying a person from a digital image or a video frame from a video source.

One of the ways to do this is by comparing selected facial features from the image and a facial database.

Page 14: Biometrics Security System

Facial recognition surveillance camera

Page 15: Biometrics Security System

Some facial recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face.

For example, an algorithm may

analyze the relative position, size, and/or shape of the eyes, nose, cheekbones, and jaw.

A newly emerging trend, claimed to achieve improved accuracies, is three-dimensional face recognition.

This technique uses 3D sensors to capture information about the shape of a face.

This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin.

Page 17: Biometrics Security System

Performance Cognitive System

Page 18: Biometrics Security System

The cognitive performance of a group of patients with multiple system atrophy (MSA) of striato-nigral predominance was compared with that of age.

IQ matched control subjects, using three tests sensitive to frontal lobe dysfunction and a battery sensitive to memory and learning deficits

Page 19: Biometrics Security System

The MSA group showed no consistent evidence of intellectual deterioration as assessed from their performance on subtests of the Wechsler Adult Intelligence Scale (WAIS) and the National Adult Reading Test (NART).

Consideration of individual cases showed that there was some heterogeneity in the pattern of deficits in the MSA group, with one patient showing no impairment, even in the face of considerable physical disability.

Page 20: Biometrics Security System

Handwriting Recognition

Page 21: Biometrics Security System

Handwriting recognition is the ability of a computer to receive and interpret intelligible handwritten input from sources such as paper documents, photographs, touch-screens and other devices.

The image of the written text may be sensed "off line" from a piece of paper by optical scanning or intelligent word recognition.

Alternatively, the movements of the pen tip may be sensed "on line", for example by a pen-based computer screen surface, a generally easier task as there are more clues available.

Page 22: Biometrics Security System

Handwritten biometrics can be split into two main categories:

Static: In this mode, users writes on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the text analyzing its shape.

Dynamic: In this mode, users writes in a digitizing tablet, which acquires the text in real time.

Another possibility is the acquisition by means of stylus-operated PDAs.

Dynamic information usually

consists of the following information:

spatial coordinate x(t) spatial coordinate y(t) pressure p(t) azimuth az(t) inclination in(t)

Page 23: Biometrics Security System

Handwriting recognition principally entails optical character recognition.

However, a complete handwriting recognition system also handles formatting, performs correct segmentation into characters and finds the most plausible words.

Page 24: Biometrics Security System

Factors of determining

characteristics

Page 25: Biometrics Security System

Universality: Each person should possess the biometric trait.

Distinctiveness: Each person should be sufficiently unique in terms

of their biometric traits.

Factors of Determining Characteristics

Page 26: Biometrics Security System

Permanence: Biometric trait should be invariant over time. A

good biometric system should measure something that changes slowly over time.

Collectability: Biometric trait should be measured quantitatively.

How easily the biometric can be measured can be significantly important in some applications

Page 27: Biometrics Security System

Functions of Biometrics

Page 28: Biometrics Security System

Biometric system are a relatively modern technology

Accuracy: The goal of biometrics is to provide fast, accurate

readings---preventing unauthorized access. Biometrics allows for a greater security level than would have otherwise been possible.

Page 29: Biometrics Security System

Fast

Since biometrics performs scans, there is no need for security codes or keys---this can create a faster and simpler system to gain access to areas or information.

Management

Biometrics currently serves a key role in management. Since systems are electronic, they store data; therefore, it is very common for employers to use biometric systems as time clocks, an automated way of tracking employees accurately.

Page 30: Biometrics Security System
Page 31: Biometrics Security System

Biometrics systems work by recording and comparing biometric characteristics.

In many cases, characteristics are recorded as images, but for speaker recognition a waveform is recorded, and for signature recognition, time series data.

  For efficiency reasons, rather than using recorded

characteristics directly, it is usual to extract identifying features from the samples and encode these features in a form that facilitates storage and comparison.

Page 32: Biometrics Security System

The future of Biometric system

Page 33: Biometrics Security System

Aadhaar Access control AFIS AssureSign BioAPI Biometric passport Biometrics in schools BioSlimDisk Facial recognition system Fingerprint recognition Fuzzy extractor Gait analysis Government database Hand geometry

Handwritten biometric recognition

Identity Cards Act 2006 International Identity Fed

eration Iris recognition Keystroke dynamics Private biometrics Retinal scan Signature recognition Smart city Speaker recognition Surveillance Vein matching Voice analysis

Page 34: Biometrics Security System

A biometric passport: also known as an e-passport, ePassport or a digital passport, is a combined paper and electronic passport that contains biometric information that can be used to authenticate the identity of travellers.

Biometrics in schools have been used primarily in the UK and US since the early first decade of the 21st century, with some use of biometric technology in schools in Asia too.

Biometric technology is used to address truancy, to replace library cards, or to charge for meals.

Page 35: Biometrics Security System

A government database collects information for various reasons, including climate monitoring, securities law compliance, geological surveys, patent applications and grants, surveillance, national security, border control, law enforcement, public health, voter registration, vehicle registration, social security, and statistics.

Hand geometry is a biometric that identifies users by the shape of their hands. Hand geometry readers measure a user's hand along many dimensions and compare those measurements to measurements stored in a file.

Page 36: Biometrics Security System

Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.

Page 37: Biometrics Security System

Vein matching, also called vascular technology, is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin.

Voice analysis is the study of speech sounds for purposes other than linguistic content, such as in speech recognition.

Such studies include mostly medical analysis of the voice (phoniatrics), but also speaker identification.

More controversially, some believe that the truthfulness or emotional state of speakers can be determined using Voice Stress Analysis or Layered Voice Analysis.

Page 38: Biometrics Security System

Biometrics refers to metrics related to human characteristics.

Biometric is different from each and every person.

This is most secure from other security system. Because others can’t hack this system.

So the biometric system is most secured system in IT field and others.

Conclusion

Page 39: Biometrics Security System

Reference http://www.cse.wustl.edu/~jain/cse571-11/ftp/biomet.pdf https://www.cse.unr.edu/~bebis/CS790Q/Lect/

Chapters_3_4.ppt https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231408/ http://chemse.oxfordjournals.org/content/38/3/189.full http://brain.oxfordjournals.org/content/115/1/271.short https://en.wikipedia.org/wiki/Handwriting_recognition https://www.newera.com.na/2014/04/23/characteristics-

biometric-systems/ http://www.ehow.com/facts_6087565_functions-

biometric-devices_.html https://en.wikipedia.org/wiki/Biometrics

Page 40: Biometrics Security System

THANK YOU …