Biometric

Post on 20-Jan-2015

1.557 views 4 download

Tags:

description

Best Seminar !

Transcript of Biometric

Presented By:SAGAR DEOKATE

KIRAN WANGIKAR

CONTENTS

Biometrics OverviewNeed of BiometricsWorking PrincipalPhysical ModesBehavioral ModesApplicationsBenefitsConcernConclusion

Biometrics Overview

Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic

Better than traditional method.

Definition:

Physical: Fingerprint Facial Recognition Hand Geometry Iris Scan Retinal Scan DNA

Behavioral: Speaker Recognition Signature Recognition

NEED

Traditional methods have some flawsTo secure access to building, computer

system, laptop, phone, ATM, bank account, & many more.

For security & reduce financial fraud. To prevent fraudulent acts like faking ID

badges or licenses.Types of biometric: 1. single model biometric system. 2. multi model biometric system.

WORKING PRINCIPAL

1.Enrollment Adding biometric information to data file.

2.Input Device Sensors, cameras etc

3. Comparison with the database.4. Decision

WORKING

Biometrics Overview

Verification Matching against a single record. It is 1:1 matching

Identification Matching against all record in the database. It is 1:N matching.

Ways to recognize a person:

Error and Accuracy

2 types of errors:False rejection: When an actual client gets identified as

imposter.False acceptance: When an actual imposter gets

identified as client.

Accuracy:FRR =number of false rejections/number of client accesses

FAR = number of false acceptance/number of client accesses

TER=(no of FA+no of FR)/total no accesses.

PHYSICAL MODES

o Fingerprinto Facial Recognitiono Hand Geometryo Iris Scano Retinal Scano DNA

Fingerprint

Typical System: fingerprint scanner maps the series of whorls, ridges, furrows and minutiae on the surface of the finger

Optical sensor and Solid State sensor are used.

Fingerprint structure

FACIAL RECOGNITION

Typical system: digital video camera input of a person’s face images- measures facial structure; compares against database

2 Methods:Face geometryFacial thermograph: uses infrared heat scans to

identify facial characteristics.

HAND GEOMETRY

Analyses and computes features like length and width of finger, ratio of palm or fingers, width and thickness of the palm.

Basic procedure involves taking images of top and side views of hand using camera.

Iris Recognition

Iris analysisTypical system: scanner analyzes features

like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.

Sophisticated camera uses infrared imager to capture high resolution photograph.

Advantage:o Iris is well protected area of eye with minimum

possibility of injury.

Retina Scanning

Analysis of layer of blood vessels at the back of the eye

Typical system: low-intensity infrared light source and an optical coupler to scan a unique vascular pattern of retina and its reflection is recorded.

Most accurate and reliable method.

DNA (Deoxyribonucleic acid)

A DNA sample is used to produce either a DNA fingerprint or a DNA profile

Comparison of alleles of DNA sequences found in nuclear genetic material.

Used in medical field and forensic investigation purpose.

BEHAVIORAL MODE

Speaker Recognition Signature Recognition

Speaker Recognition

Voice recognition and analysisTypical system: uses the pitch, pattern,

tone, frequency, rhythm of speech for identification purposes; only biometric that allows users to authenticate remotely.

3 types:Fixed text methodText dependent methodText independent method

Signature Recognition

Handwriting analysis Typical System: user will sign on a tablet, the

device will record pressure, speed, sequence and shape of characters and compare to a database.

Verification is based on features like no. of interior contours and no. of vertical slope components.

Rarely used method.

Comparison Chart Accuracy/Reliability

Biometric Accuracy Reliability Errors

Fingerprint Very High High Dirt, dryness

Facial Recognition High Medium Hair, glasses, age

Hand Geometry High Medium Hand injury

Iris Scan Very High High Poor lighting

Retinal Scan Very High High Glasses

DNA Very High High none

Speaker Recognition Medium Low Noise, colds

Signature Recognition Medium Low Changing signatures

Accuracy: How well can the specific biometric is able to tell individual apartReliability: how dependable the specific biometric is for recognition purposes

APPLICATIONS

BIOMETRIC TECH

APPLICATIONS

FINGERPRINTS Law enforcement, entry devices for offices and colleges, enterprise security; medical and financial

FACIAL RECOGNITION Automated bank tellers- user verification purposes

HAND GEOMETRY Time and attendance systems, physical access

IRIS SCAN Law Enforcement, Employee Security Check, banking

RETINA SCAN High-end security, military, power plans

DNA Medical applications, Paternity Tests, Criminal identification and forensics

VOICE RECOGNITION Call Centers, Law enforcement – house arrest authentication

SIGNATURE Access to documents, Banking services

What Biometrics are Replacing

Passwords PIN numbers

Tokens Photo ID cards Smart cards Magnetic strip cards Physical keys

Traditional verification methods:

Current Biometric Applications

Computer loginsATMsGrocery storesAirport kiosksDriver’s licensesInternet bankingNational ID cardsWelfare disbursementInternational border crossingForensics – criminal identificationAnnual amusement park pass holdersSpeaker verification for television home shopping

BENEFITS

Increased security measuresReduce costs of password and ID card

maintenanceAbility to track employees and link activities No passwords to forgetElimination of problems such as lost/stolen

identification cards and PIN numbersFaster login timeImproved security of sensitive information

CONCERNS

Sensitive biometric information susceptible to hackers.

Lack of privacy for employees.Costly and time consuming to implement .

CONCLUSION

Multi biometric systems have a huge potential of growth.

Access procedures are made simpler, faster and more secure.

Especially governments, law enforcement agencies, military and industrial companies, already make partial use of this technology.

In the future biometric devices will surely become more involved in many civil areas.

THANK YOU!THANK YOU!