et 131 priya
-
Upload
smritisambit -
Category
Documents
-
view
219 -
download
0
Transcript of et 131 priya
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 1/31
3/12/2011 1
KRUPAJAL ENGINEERING
COLLEGESEMINAR ON
BIOMETRICS TECHNOLOGY
SUBMITTED BY:
NAME: PRIYAMBADA BEHERA
BRANCH:ELECTRONICS & TELECOM.ENGINEERING
REGD.NO: 0821223030
ROLL.NO:08ET131
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 2/31
3/12/2011 2
INTRODUCTION:
Biometrics is a technology whichis mainly used for the securitypurpose.
It is preferred over traditionalsecurity methods.
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 3/31
TRADITIONAL SECURITY METHODS:
Password in computer
Pin number in ATM card
Identity card
Driving license
3/12/2011 3
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 4/31
3/12/2011 4
DISADVANTAGE OF TRADITIONAL
SECURITY METHOD:
We may forget the password or pinnumber.
We may loss the identity card & drivinglicense.
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 5/31
3/12/2011 5
DEFINITION OF BIOMETRICS:
Biometrics refer to the automaticidentification of a person based on his/her
physiological or behavioral characteristics.
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 6/31
3/12/2011 6
PHYSIOLOGICAL:
Biometrics based on data derived fromthe measurement of a part of Personsanatomy.
for example:
Face location
Hand geometry
fingerprint verification
Retinal scan
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 7/31
3/12/2011 7
BEHAVIORAL:
Biometrics based on data derived frommeasurement of an action performedby a person.
for example:
Voice recoganization
Signature verification
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 8/31
3/12/2011 8
BIOMETRICS :HOW DO THEY WORK?
Although biometric technologies differ, they all
work in a similar fashion:
� The user submits a sample using acquisition
device.
� Sample is then compared with the sample which
is already present in database.
� If it matches, it shows it is correct otherwise it isincorrect.
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 9/31
3/12/2011 9
LEADING BIOMETRIC TECHNOLOGY:
� Facial recognization
� Fingerprint matching
� Hand geometry
� Voice recognization
� Signature scan
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 10/31
FACIAL RECOGNIZATION SYSTEM:
A facial recognization system is acomputer-driven application for automatically
identifying a person from a digital image.
It does that by comparing selected facialfeatures in the live image and a facialdatabase.
It is typically used for security systems and
can be compared to other biometrics such asfingerprint or eye iris recognition systems.
3/12/2011 10
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 11/31
3/12/2011 11
FACIAL RECOGNIZATION:
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 12/31
3/12/2011 12
ACQUISITION DEVICE:
� Video Camera
� PC camera
� single-image camera
SAMPLE :
� Facial image
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 13/31
3/12/2011 13
FACTORS AFFECT FACIAL LOCATION:
� Quality of capture device
� Change in facial aspect
� Adding or removing glasses
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 14/31
3/12/2011 14
FINGERPRINT IDENTIFICATION:
Among all the biometric techniques, it isthe oldest method which has beensuccessfully used in numerous
application. The uniqueness of a fingerprint can be
determined by the pattern of ridges &furrows as well as the minutiae points.
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 17/31
3/12/2011 17
ACQUISITION DEVICE:
� Desktop peripheral
� PC card
� Mouse chip
SAMPLE :
� Fingerprint image
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 18/31
3/12/2011 18
FACTORS AFFECT FINGERPRINTS:
Cold finger
Dry/oily finger
Cuts to fingerprint
Manual activity that affect fingerprints
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 19/31
3/12/2011 19
HAND GEOMETRY:
This approach uses the geometricshape of the hand for authenticating a
users identity.
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 21/31
3/12/2011 21
ACQUISITION DEVICE:
� Proprietary Wall-mounted unit
SAMPLE :
� Image of top and sides of hand
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 22/31
3/12/2011 22
FACTORS AFFECT HAND
GEOMETRY:
�Jewelry� Bandage
� Swelling of joints
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 23/31
3/12/2011 23
VOICE RECOGNIZATION:
Voice recognization technology verifiesthe identity of the individual who isspeaking.
Voice recognization can utilize anyaudio capture device, including mobileand land telephones and PC
microphones.
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 24/31
3/12/2011 24
ACQUISITION DEVICE:
� Microphone
� telephone
SAMPLE :
� Voice recording
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 25/31
3/12/2011 25
FACTORS AFFECT VOICE
RECOGNIZATION:
Cold or illness that affect voice
Speaking softly Quality of capturing device
Variation in background noise
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 26/31
3/12/2011 26
SIGNATURE VERIFICATION:
Signature verification technology utilizesthe distinctive aspects of the signature
to verify the identity of individuals.
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 27/31
3/12/2011 27
ACQUISITION DEVICE:
� Signature Tablet
SAMPLE :
� Image of Signature
� record of related dynamics measurement
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 28/31
3/12/2011 28
FACTORS AFFECT SIGNATURE:
� Signing too quickly� Different signing position
� Change of sign
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 29/31
3/12/2011 29
APPLICATION OF BIOMETRICS:
It is used in forensic lab for criminalsidentification.
It is used to prevent unauthorized access toATM card, smart card & computer.
In automobile, biometrics can replace keyswith key less entry & key less ignition.
Due to increased security threats, many
country have used this technique for bordercontrol & national ID CARDS.
8/7/2019 et 131 priya
http://slidepdf.com/reader/full/et-131-priya 30/31
3/12/2011 30
CONCLUSION:
Biometric cannot be lost, stolen orforgotten.
it cannot be written down and stolen bysocial re-engineering.
Thats why this technology is more
secure than others.