Você está na página 1de 25

A

SEMINAR ON
BIOMETRICS SECURITY SYSTEM

Presented By:GAZAL GUPTA


VIII-SEM
IT

SEMINAR
INTRODUCTION
Biometrics is a rapidly evolving technology
Facilitates the automatic identification based on
physical or behavioral characteristics
Eliminates the need to memorize a password or
carry some form of token

SEMINAR
WHAT IS A BIOMETRIC ?
Science and technology of measuring and

statistically analyzing biological data that is represented


in human by patterns unique to
every individual

Biometrics is a science of measuring the unique physical


characteristics of a person such as voice, a face or a
fingerprint. These personal features are analyzed and
stored as bioprints in a reference database, on a smart
card

SEMINAR
Figure describing the process involved in
using the biometric system

SEMINAR
SUBSYSTEMS OF BIOMETRIC MODEL
DATA COLLECTION
TRANSMISSION(compression, transmission, expansion)
SIGNAL PROCESSING(pattern matching, quality control ,features extraction)
DECISION MAKING
DATA STORAGE(Database, smart card,)

SEMINAR
TYPES OF BIOMETRIC SYSTEM
Fingerprint Verification
Hand Geometry
Retinal Scanning
Iris Scanning
Facial Recognition
Signature Verification
Voice Verification

SEMINAR
DETAIL ANALYSIS OF IRIS SCANNING
Iris scan takes about 30sec & 2sec for verification
A camera located at about 3 feet focuses on & scans iris from one side
This scan is converted into a template
Only phase information is used for recognizing iris as amplitude information is depends on
extraneous factors

SEMINAR

A IRISCODE Sample

SEMINAR

Iris scanning enabled Atm

Authenticam used for iris scanning

SEMINAR
ADVANTAGES OF IRIS SCANNING
Iris pattern posses high degree of randomness,variability & uniqueness
Patterns are apparently stable throughout life
Encoding & decision making are tractable
Image analysis & encoding time : 1sec
Search period : 100000 iris codes/sec

SEMINAR
DISADVANTAGES OF IRIS SCANNING
Small target (1cm) to acquire from a distance (1m)
Located behind a curved, wet, reflecting surface
Obscured by eyelashes,lenses,reflections
Partially occluded by eyelids, often dropping
Illumination should not be visible or bright

Fingerprint Authentication
a fingerprint impression is acquired
The next step is to locate these features in the fingerprint
image, using an automatic feature extraction algorithm.

How does fingerprint identification


work?

The first step in fingerprint identification is collecting the fingerprint,


named enrollment.
In this step, the applicant acquires the reference fingerprint for later
authentication.
The reference fingerprint is called the template of the fingerprint
After the capture of the template, it can be stored in a database, on a
token with 2D barcode, or in a smart card
At this point, the applicant is registered and the next stage is to compare
the fingerprint with the template to the fingerprint read by the sensor.
After reading the fingerprint, the authentication system extracts the
minutiae in the same way as it did during the enrollment process
Since the fingerprint is never captured in the same position, the
verification algorithm must perform rotation and translation of the
captured fingerprint in order to adjust the fingerprint minutiae with the
template minutiae.

Components Of a Fingerprint System

SEMINAR
CHARACTERICTICS FOR SELECTING
A BIOMETRIC TECHNOLOGY
Accuracy
Ease of use
Error incidence
Cost
User acceptance
Required security level
Long term stability

SEMINAR
Character
istic

Finger
Print

Hand
Geometry

Retina

Iris

Face

Signature

Voice

Ease of
use

High

High

Low

Medium

Medium

High

High

Error
Incidence

Dryness,
Dirt,Age

Hand
Injury,Ag
e

Glasses

Poor
Lighting

Lighting,
Age,Glas
ses

Changing
Signature
s

Noise,Co
lds,Weath
er

Accuracy

High

High

Very
High

Very
High

High

High

High

Cost

User
Acceptan
ce

Medium

Medium

Medium

Medium

Medium

Medium

High

Required
Security

High

Medium

High

Very
High

Medium

Medium

High

LTS

High

Medium

High

High

Medium

Medium

Medium

SEMINAR
METHODS TO RATE BIOMETRICS
ACCURACY
FALSE- ACCEPTANCE RATE (FAR)
FALSE- REJECTION RATE (FRR)

SEMINAR
The plot of FAR Vs FRR representing
crossover error rate

SEMINAR
COST

ANALYSYS FOR BIOMETRICS

Hardware
Back-end processing power to maintain database
Research & testing of the system
User education
Exception processing
System maintenance

SEMINAR
BIOMETRICS APPLICATIONS
Indian Initiatives

Bioenable Technology, Pune


Siemens Information System Ltd., Banglore
Axis Software, Pune
Jaypeetex ,Mumbai

Global Developments

Internet Security : Litronix, Usa


Windows Biometrics : Microsoft
Net Nanny Software International
Biometric Smart Cards : Polarid & Atmel

SEMINAR
FUTURE OF BIOMETRICS
ATM Machine Use
Travel & Tourism
Public Identity Card

SEMINAR
CONCLUSION
Your fingerprints, iris pattern, and voice will verify your identity
You can unlock your house or withdraw money from your bank with
just a blink of eye, a tap of your finger, or by just showing your face

SEMINAR
BIBLIOGRAPHY

Biometrics : Journal of International Biometric Society


The Biometrics Constrium ..May 2002
Electronics For You June 2002
www.biometric.com
www.bioventric.com
http://homepage.ntlworld.com/avanti
http://www.ibia.org

SEMINAR

SEMINAR

Você também pode gostar