Escolar Documentos
Profissional Documentos
Cultura Documentos
Presented By
Name Roll No. Branch Semester College : Vishesh Kapoor : 272/09 : Computer Science : 7th : Model Institute of Engineering and Technology, Jammu
Introduction
Biometrics Expectations and Reality Fingerprint Advantages of Biometrics Processes Security Aspects Touch-Based Technology Disadvantages of Touch-Based Technology Touch-less Technology Basics Advantages of Touch-less 3D Technology Markets and Applications
Fingerprints
INTRODUCTION TO BIOMETRICS
The term Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control.
Biometrics is key to solve security challenges of the 21st century #Reality or Fiction?
PRO Makes secure identification possible, eliminates weak identification Unique, constant and always available Flexible, can be adapted to situation and user group Can be combined with other systems to increase security Convenient and User friendly CONTRA Some technologies not mature yet Market consolidation has just started Not deterministic, identification based on probabilities
Fingerprint
Most adopted technology Fingerprint is unique, constant and can be captured fast & easily.
Fingerprint still takes more than 50% of the market share. A fingerprint consists of patterns of ridges and valleys on the surface of a fingertip.
A system is as secure as its weakest part! Biometrics is part of a total security solution Must not limit system security
Risk factors
Data Security Secure data storage Secure data transfer Can biometric data be interpreted and repeated? Can biometric data be revoked? Process Security Is biometric process stable? Is biometric process safe against spoofing?
1. A fingerprint consists of patterns of ridges and alleys on the surface of a finger tip. 2. Each individual has fingerprint which is different from the other.
2. Fingerprint recognition system is an identification system that can be an Automated Fingerprint Identification System (AFIS) or a Non-automated Fingerprint Recognition
System.
Most of the sensors available today use touch method since it is simple and requires little training. These touch sensors acquire fingerprint images as the users fingerprint is contacted on a solid flat sensor. Both the sensor method and ink-technique requires the person to press his/her finger against a flat rigid surface. For this reason they are known as touch-based methods. Conventional fingerprint systems are simple and require less processing as compared to the touch-less fingerprint recognition system, but they suffer from several problems like hygienic user interface, maintenance and latent fingerprints that are invisible from naked eyes and important for law enforcement agencies.
Problem of contamination occurs because of placing the fingertip over the same interface, which is already used by other. This produces a low quality fingerprint image. Due to contact pressure creates physical distortions, which are usually non-linear in arbitrary direction and strength. Moreover, the distortion occurs globally, while its deformation parameters could be different locally in a single fingerprint image.
Figure shows the fingerprint image of one fingertip but with different minutiae because of physical pressure
3 cameras surrounding the finger Finger imaging instead of Finger printing Full-3D and Approx-3D variants, depending on application Full-3D to create rolled equivalent fingerprints Compliant to 2D technology (touch-based) Approx-3D to extend and optimize center image
Access Control and Time & Attendance Early adopter of new technologies Small to medium sized applications Targets mainly on single factor identification Networked environment Biometric (sub)system required, rather than sensors Focus on Process Security Civil, Governmental and Criminal ID Long term business Large sized applications Targets mainly on AFIS infrastructures PC based environment High-Quality biometric sensors required Focus on Data Security
THANK YOU