Authentication using Biometrics

22
Submitted by:- Isha Ranjan 12EARIT026 Information Technology

Transcript of Authentication using Biometrics

Page 1: Authentication using Biometrics

Submitted by:-

Isha Ranjan

12EARIT026

Information Technology

Page 2: Authentication using Biometrics

Authentication depends on :-

• What we have :- Smart cards

• What we know :- Passwords

• What we are :- Biometrics

Page 3: Authentication using Biometrics

Lets Define !

“A biometric is a physiological

or behavioral characteristic of a

human being that can distinguish

one person from another and that

theoretically can be used for

identification or verification of

identity.”

Page 4: Authentication using Biometrics

Why Biometrics?

Identity thefts

Something we know can be

stolen

Predicted or hacked

Reliability on manual

verification

Page 5: Authentication using Biometrics

Biometric Authentication Process :-

Two step process:-

• Acquisition• Creation of Master characteristics• Storage of Master characteristics

Comparison of data•Acquisition(s)•Comparison•Decision

Storing of Data

Page 6: Authentication using Biometrics

Application Categories :-

Biometric applications available today

are categorized into 2 sectors :-

Psychological :- Iris, Fingerprints,

Hand, Retinal and Face recognition

Behavioral :- Voice, Typing pattern,

Signature

Page 7: Authentication using Biometrics

Fingerprint techniques :-

Optical

Capacitive

Ultrasonic

Page 8: Authentication using Biometrics

Fingerprint recognition :-

Divides print into loops, whorls and arch

Calculates minutiae points (ridge endings)

Comparisons

Authentication

Page 9: Authentication using Biometrics

Storage of Master Characteristics :-

Page 10: Authentication using Biometrics

Retinal Scanning :-

User looks straight into retinal reader

Scan using low intensity infrared light

Beam of light traces a standardized path

on the retina

retinal blood vessels absorb light more

readily than the surrounding tissue

The pattern is digitized and stored in

a database

Page 11: Authentication using Biometrics

Iris Scanner :-

Iris recognition uses camera technology

with subtle infrared illumination

It acquire images of the detail rich

structures of the iris

Digital templates encoded from these

patterns by mathematical and statistical

algorithms allow unambiguous positive

identification of an individual

Page 12: Authentication using Biometrics

Face recognition :-

Facial recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face.

These features are then used to search for other images with matching features.

A probe image is then compared with the face data.

Recognition algorithms can be divided into two main approaches :-

• geometric :- looks at distinguishing features

• photometric :- statistical approach that distils an image into values and compares the values with templates to eliminate variances.

Page 13: Authentication using Biometrics

Geometric :-

Page 14: Authentication using Biometrics

Photometric :-

Statistical approach

that distils an image

into values and

compares the values

with templates to

eliminate variances.

Page 15: Authentication using Biometrics

Behavioral :-

Voice

Signature

Typing pattern

Page 16: Authentication using Biometrics

Voice Recognition :-

It is identification of a person

from characteristics of voice.

Characteristics like voice pitch,

speaking style, pauses etc.

Each voice recognition system

has two phases:

• Enrolment

• Verification

Page 17: Authentication using Biometrics

Enrolment :-

The speaker's voice is recorded.

A number of features are extracted

to form a voice print.

Verification :-

A speech sample or "utterance" is

compared against a previously

created voice print

Page 18: Authentication using Biometrics

Signature Recognition :-

Signature verification analyzes the way a user signs her name.

Signature measures (dynamic)

Speed

Pressure

Handwriting Style

Page 19: Authentication using Biometrics

Two types of digital handwritten

signature authentication :-

Static :- Comparison between one scanned

signature and another scanned signature, or

a scanned signature against an ink signature

using advance algorithms.

Dynamic :- Data is captured along with the

X,Y,T and P Coordinates of the signor from

the signing device. To create a biometric

template from which dynamic signatures can

be authenticated

Page 20: Authentication using Biometrics

Current applications :-

Banks

Mobile Phones

Attendance System

Forensic Science Department

Immigration facilities across

countries

Page 21: Authentication using Biometrics

Conclusion :-

While biometrics technology provides a strong user authentication solution, there are other variables to be considered in the authentication protocol. When a high level of security is needed, it is recommended that you combine other authentication factors with biometrics. When you combine what you know, what you have, and what you are, you will have achieved the highest level of security across multiple applications and systems. According to information made available by the International Biometrics Group, “there is no one right biometrics technology for every application.”

Page 22: Authentication using Biometrics