Biometrics Based Authentication AKASH

Post on 28-Jan-2018

246 views 0 download

Transcript of Biometrics Based Authentication AKASH

Prepared By :

AKASH DEEP

MAURYA

1351110002

Presentation Outlines

Authentication & Its types

Biometric & Why use it ?

Characteristics & Modes

Working of Biometric System

Different Techniques

Comparison b/w Different techniques

Application of Biometric Authentication

Limitations

Conclusion

References

Authentication

Act of confirming something or giving

privileges to access something.

Process of giving someone identity-he or she

can access that particular application or data.

For e.g. : Giving identity-card to a student of

an institute.

Types of Authentication

Passwords, PIN

Smart card or Swipe card

Biometric

Biometric

“ something that you are ”

Two Greek words Bio(Life) and Metric(To Measure).

Measures and Analyzes - biological traits - human being.

Automated recognition of an individual - behavioral or physical characteristics.

Provides privacy to personal data & high security to confidential, financial transactions.

Why Biometric ?

Identity theft is not possible

Password remembrance problem does not exist

Cannot be predicted or hacked

Cannot be shared

Perceived as more secure

Accuracy

Characteristics of a Biometric

Recognizing an individual based on two main characteristics :

Physical characteristics are related to physical shape of the

body. For e.g. Fingerprint, face, hand geometry, iris etc.

Behavioral characteristics are related to the behavior of a

person. For e.g. Voice pitch, speaking style, typing rhythm,

signature etc.

Modes of Biometric System

Identification

One-to-many comparison.

It search for a sample against a database of templates.

It identifies an unknown individual.

For e.g. Who is “x” ?

Verification

One-to-one comparison.

It compares a sample against a single stored template.

It verifies the individual’s identity.

For e.g. Is this “x” ?

Working process

Enrollment : In this stage, Information captured-sensing

device-stored in database for later comparison. When someone

uses biometric for the first time then the stage is called

enrollment.

Authentication : Registered biometric sample during the

enrollment process are matched against newly capturing

biometric sample.

Working of Biometric System

Steps :

Capturing

Pre-processing

Feature Extraction

Template Creation

Matcher/Comparison

Application Device

Different biometric technique

Fingerprint technology :

Oldest and most widely used.

Registered points are located and compared.

Optical sensors are used for scanning purpose.

Affects by impression angle, pressure, dirt, moisture etc.

It can be used for many applications like pc login security,

voting system, attendance system etc.

Face Recognition Technology :

For automatic identification or verification of a person from a

digital image.

These include the position/size/shape of the eyes, nose,

cheekbones and jaw line.

Iris Recognition Technology :

It measures the iris pattern of the eye i.e. the colored part of

the eye that surrounds the pupil.

The iris scanner analyzes features like rings, furrows, and

freckles existing in the colored tissue surrounding pupil.

Iris pattern is not changed over years or by glasses, contact

lenses.

Hand Geometry Technology :

Uses hand images for identification or verification.

Person identification utilizes hand images to extract a number

of features such as length, width, thickness, finger area etc.

Measures the digits of the hand and compares to those

collected at the time of enrollment.

Places hand on the system which takes the three dimensional

image of the hand.

Voice Recognition Technology :

Validate user’s claimed identity using

their voice.

It uses the pitch, pattern, tone,

frequency, rhythm of speech for

identification purposes.

A telephone or microphone can act as a

sensor.

Comparison between Different

Technique

Applications Limitations

Criminal identification

Internet Banking

Attendance system

Airport, Bank security

PC login security

Prevents unauthorized access to

private data.

Presence of noise in the sensed

data.

Variations in the enrolled data

i.e. change in age, disease,

environment etc.

Non-universality

It is an expensive security

solution.

Conclusion

Security of e-commerce or e-government sites -

Enhanced

The Greatest strength of the biometric system is that

they does not change over time so it is much more

efficient than other traditional security mechanism.

Accuracy, performance, effectiveness & suitability of

the security systems can be increased.

References

Wikipedia :

http:en.Wikipedia.org/wiki/Biometric_authentication

Google Search Engine