Você está na página 1de 25

BIOMETRICS

Paper Presentation on:

Presented By D.Keerthi IV I.T

CONTENTS
1.ABSTRACT 2. COMMON BIOMETRICS CHARACTERISTICS 3. HAND GEOMETRICS

4. FINGURE PRINTS
5. FACE SCAN 6. RETINAL SCAN 7. IRIS SCAN 8. EAR RECOGNITION 9. PEERING BENEATH THE SKIN 10. SIGNATURE

11. VOICE
12. USES FOR BIOMETRIC SECURITY 13. APPLICATIONS 14. CONCLUSION

ABSTRACT:
Nature has made human beings with different characteristics This property is made use of Biometric Technology to distinctly identify each person. Biometrics is a means of using the physiological or behavioral characteristics of a person as a kind of permanent password. Thus, biometric systems are being deployed to enhance security and reduce financial fraud.

INTRODUCTION:

Biometrics Definition :
Biometrics refers to technologies that measure and analyze human body characteristics.Biometrics security systems are growing rapidly because they are considered more secure than conventional security systems. After all its much more difficult to steal or duplicated a fingerprint than it is to do the same with a key or a password.

Common biometric characteristics:


Biometric characteristics can be divided in TWO main classes, as represented in
Physiological are related to the shape of the body. The oldest traits, which have been used for more than 100 years, are fingerprints other examples are face recognition, hand geometry and iris recognition. Behavioral are related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voice.

The parameters that are used to understand human characteristics are: Universality describes how commonly a biometric is found in each individual. Uniqueness is how well the biometric separates one individual from another. Permanence measures how well a biometric resists aging. Collect ability explains how easy it is to acquire a biometric for measurement. Performance indicates the accuracy, speed, and robustness of the system capturing the biometric. Acceptability indicates the degree of approval of a technology by the public in everyday life.

HAND GEOMETRY::

The process is easy for the user, produces a very small ID template (only 9 bytes) and is suitable for unattended operation. However, individual hand

geometry is not regarded as sufficiently unique for identification, so its use is


generally restricted to verification - such as building access control.

Finger prints:

Fingerprint scanners are very low cost. Many different manufacturers supplying fingerprint solutions, and the software is easily Integrated with business applications.

How Fingerprint Scanners Work


Today fingerprint devices are by far the most popular form of biometric security used. Long gone are the huge bulky fingerprint scanners; now a fingerprint scanning device can be small enough to be incorporated into a laptop for security.

A fingerprint is made up of a patterns of ridges and furrows. Fingerprint scanning essentially provides an identification of a person based on the acquisition and recognition of those unique patterns and ridges in a fingerprint.

Cont
The basis of identification, however, is nearly the same. Standard systems are comprised of a sensor for scanning a fingerprint and a processor which stores the fingerprint database and software which compares and matches the fingerprint to the predefined database. Within the database, a fingerprint is usually matched to a reference number, or PIN number which is then matched to a person's name or account.

Face Scan:
But everyone, regardless of illness or injury, has a face. This in itself makes facial recognition an attractive option. Its other unique advantage is that it is a technique that can be applied to unwilling candidates. Facial recognition allows for anyone whose facial image is captured to be matched to predefined database

Cont
For identification purposes there needs to be a central database of identity templates. For verification you can choose to have a central database, or to provide candidates with a physical token ( eg smart card) containing their template, which is verified without the need for central database access . It will be seen from above that some technologies are better suited to verification and others to identification, so in some cases a combination of technologies, as well as traditional tokens or passwords, are used.

Retinal Scan:

Retina is not directly visible and so a coherent infrared light source is necessary to illuminate the retina. The image of the retina blood vessel pattern is then analyzed for characteristic points within the pattern. The retina scan is more susceptible to some diseases than the iris scan, but such diseases are relatively rare . The main drawback of the retina scan is its intrusiveness .

Iris Scan:
high degree of accuracy and a relatively small ID template, (up to 512 bytes) popular technology for fast processing of individuals in verification applications like passport control.

a popular technology for fast processing of individuals in verification applications like passport control. This can be a combination of specific characteristics known as corona, crypts, filaments , freckles, pits, furrows, striations and rings. The iris code is computed very fast and takes 256 bytes. The

Iris recognition leverages the unique features of the human iris to perform identification and, in certain cases, verification.

How it Works

Iris recognition is based on visible qualities of the iris. A primary visible characteristic is the trabecular meshwork a tissue which gives the appearance of dividing the iris in a radial fashion. Other visible characteristics include rings, furrows, freckles, and the corona, to cite only the more familiar. Iris-scan technology has been used in ATM environments in England .

iris data became the verification tool for access to the bank account, thereby eliminating the need for the customer to enter a PIN number or password. When the customer

Ear Recognition:
Recently, we have been working on automatic ear recognition, where we develop a unique signature from the image of an ear (it has its own unique advantages).

Peering Beneath the Skin:


the pattern of blood veins in the palm is unique to every individual. Unlike a fingerprint, however, the palm has a biometric pattern that is virtually impossible to duplicate

So Fujitsu developed a palm reader that checks the blood vessels under the skin -and people don't even have to touch the device. The palm reader especially in hospitals, where many people touch the same biometric sensors to gain access to a room or storage cabinet.

Signature:
Signature matching by human eye relies only on visual similarity, and allows for relatively easy forgery. Biometrics, on the other hand, also examine the rhythm, speed, and pressure that the writer exerts - none of which could be reproduced by a forger looking at a written signature.

verification take place using special capture tablets. This technology has high user acceptance, as the process is very familiar, and it can be used for both identification and verification.

Voice:
Strictly speaking, voice is also a physiological trait because every person has
a different pitch, but voice recognition is mainly based on the study of the way a person speaks.

the use of voice patterns for identification is very difficult due to the variability of people's speech due to health and mood, and the interference of background noise and telecommunications channels

Uses for Biometric Security


Biometrics is used in two major ways: Identification and Verification.
Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. Verification is the process of authenticating if a person is who he/she says he/she is. It involves taking the measured characteristic and comparing it to the previously recorded data for that person.

Applications:
While biometric systems, particularly automatic fingerprint identification systems (AFIS), has been widely used in forensics for criminal identification, recent advancements in biometric sensors and matching algorithms have led to the deployment of biometric authentication in a large number of civilian and government applications.

It can be used to verify a customer during transactions conducted via telephone and Internet (electronic commerce and electronic banking).

Conclusion:
biometric techniques is not perfect yet, there are many mature biometric systems available now. Proper design and implementation of the biometric system can indeed increase the overall security, especially the smartcard based solutions seem to be very promising. The word biometrics is very often used as a synonym for the perfect security.

Você também pode gostar