2 a. (biometrics)

19
BIOMETRICS Ravi P. Agrahari (Science & Technology)

description

Biometrics

Transcript of 2 a. (biometrics)

Page 1: 2 a. (biometrics)

BIOMETRICS

Ravi P. Agrahari (Science & Technology)

Page 2: 2 a. (biometrics)

INTRODUCTION

Biometrics is the Science and Technology of Biometrics is the Science and Technology of Measuring and Analyzing Biological data.Measuring and Analyzing Biological data.

In biometric technology, the identity of user will be In biometric technology, the identity of user will be identified by biological phenomena of human body. identified by biological phenomena of human body. Biological structures and actions of different body Biological structures and actions of different body parts of human body ranges from iris of eye, finger parts of human body ranges from iris of eye, finger print, DNA fingerprint, gait recognition, face print, DNA fingerprint, gait recognition, face recognition to voice recognition can be used.recognition to voice recognition can be used.

Page 3: 2 a. (biometrics)

Existing Biometrics

- Iris Recognition- Iris Recognition

- Fingerprint Recognition- Fingerprint Recognition

- Voice Recognition- Voice Recognition

- Signature Recognition- Signature Recognition

- Face Recognition- Face Recognition

Page 4: 2 a. (biometrics)

It is an Automated Method of recognizing a person based on a - Physiological or

- Behavioral characteristics

(A) Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, which has largely replace retina, and odour/scent.

(B) Behavioural are related to the behaviour of a person. Examples include, but are not limited typing rhythm, gait, and voice. Some researchers have coined the term behaviour-metrics for this class of biometrics.

Page 5: 2 a. (biometrics)

The Features measured are,

- face- finger print- hand geometry- hand writing- iris- voice- blood vessels in the retina- coloration in the cornea of the eye- DNA from tissue samples

Page 6: 2 a. (biometrics)

Biometric-Based Authentication Dr. S.R. RANGANATHAN, Father of Dr. S.R. RANGANATHAN, Father of

Library Science said, “ Library Science said, “ The Right Book to The Right Book to the Right Reader at the Right Time the Right Reader at the Right Time ””

At present distinguishing “The Right At present distinguishing “The Right Person” from an imposter is the key to Person” from an imposter is the key to security and trust.security and trust.

Biometric based solution provide Biometric based solution provide Personal data privacyPersonal data privacy Confidential financial transactionConfidential financial transaction

Page 7: 2 a. (biometrics)

Biometric-base authentication applications include WorkstationWorkstation Network and Domain accessNetwork and Domain access Single Sign-onSingle Sign-on Application logonApplication logon Data ProtectionData Protection Remote access to resourcesRemote access to resources Transaction security and Transaction security and Web security.Web security.

Page 8: 2 a. (biometrics)

Biometric Device – Fingerprint

Finger Print is - Finger Print is - not easily not easily

borrowed, borrowed, lostlost stolenstolen forgottenforgotten falsified orfalsified or guessed.guessed.

Page 9: 2 a. (biometrics)

Biometrics and Libraries

In libraries, finger print identification has the In libraries, finger print identification has the additional benefits of - additional benefits of -

o ConvenienceConvenienceo Customer confidenceCustomer confidenceo Prevent theft and vandalismPrevent theft and vandalismo Prevent unauthorized & fraudulent usePrevent unauthorized & fraudulent useo Improves safetyImproves safetyo Accuracy and SecurityAccuracy and Security

Page 10: 2 a. (biometrics)

Biometric Finger Scanners

It consists of It consists of o A reader or scanning deviceA reader or scanning deviceo Software that converts the Software that converts the

scanned information into scanned information into Digital form and compares Digital form and compares match pointsmatch points

o A Database that stores the A Database that stores the Biometric data for Biometric data for comparisoncomparison

Page 11: 2 a. (biometrics)

Biometric System

Finger print identification process consists of two essential Finger print identification process consists of two essential proceduresprocedures

EnrollmentEnrollment AuthenticationAuthentication

No person’s finger prints are identical to those of another No person’s finger prints are identical to those of another individual! individual!

Page 12: 2 a. (biometrics)

Comparison for identification

A Verification A Verification SystemSystem

It conducts a one-to-It conducts a one-to-one comparison (1:1) one comparison (1:1) to determine whether to determine whether the identity is true.the identity is true.

eg. Accessing an eg. Accessing an online secure data online secure data source.source.

An Identification An Identification SystemSystem

It conducts a one-to-It conducts a one-to-many (1:N) many (1:N) comparison to comparison to establish a subject’s establish a subject’s identity.identity.

eg.Front counter eg.Front counter check-incheck-in

Page 13: 2 a. (biometrics)

A biometric system can operate in the following two modes:- VerificationVerification – A one – A one

to one comparison of to one comparison of a captured biometric a captured biometric with a stored template with a stored template to verify that the to verify that the individual is who he individual is who he claims to be. Can be claims to be. Can be done in conjunction done in conjunction with a smart card, with a smart card, username or ID username or ID number.number.

IdentificationIdentification – A one to many – A one to many comparison of the captured comparison of the captured biometric against a biometric biometric against a biometric database in attempt to identify an database in attempt to identify an unknown individual. The unknown individual. The identification only succeeds in identification only succeeds in identifying the individual if the identifying the individual if the comparison of the biometric comparison of the biometric sample to a template in the sample to a template in the database falls within a previously database falls within a previously set threshold.set threshold.

Page 14: 2 a. (biometrics)

Web-Based Biometric Authentication System (WBAS)

Page 15: 2 a. (biometrics)

The authentication can be done by:

Fingerprint only (needs a Fingerprint only (needs a fingerprint reader) fingerprint reader)

Face only (needs a Face only (needs a webcam/camera) webcam/camera)

Fingerprint and Face (needs a Fingerprint and Face (needs a fingerprint reader and a fingerprint reader and a webcam/camera) webcam/camera)

Page 16: 2 a. (biometrics)

Biometrics and smart card system

Biometrics add an additional Biometrics add an additional layer of security to a smart layer of security to a smart card systemcard system

Smart cards provide the Smart cards provide the ““something you havesomething you have”factor.”factor.

The “The “Something you knowSomething you know”is ”is

usually a PINusually a PIN Integrating a finger print Integrating a finger print

scanner into a smart card reader scanner into a smart card reader increases security by adding increases security by adding ““something you aresomething you are””

Page 17: 2 a. (biometrics)

Biometrics in INDIAIndia which is perpetually under the India which is perpetually under the threat of terrorism and security threat of terrorism and security breach, is gearing up to adopt various breach, is gearing up to adopt various biometric methods.biometric methods.

It is used in It is used in •Defense and Security IndustryDefense and Security Industry•Police AdministrationPolice Administration•Finance Ministry (PANs)Finance Ministry (PANs)•Home Affairs (IDs)Home Affairs (IDs)•LibrariesLibraries

Page 18: 2 a. (biometrics)

BIOMETRICS INDIA EXPO 2007:

 The First International The First International Conference Conference

and Exhibition of Biometric Technologies and Exhibition of Biometric Technologies and Applicationsand Applications was held at was held at PRAGATI PRAGATI MAIDAN, NEW DELHIMAIDAN, NEW DELHI, September 13-, September 13-15, 2007.15, 2007.

Page 19: 2 a. (biometrics)

Thank you