Biomatrics
-
Upload
sheel-shah -
Category
Technology
-
view
295 -
download
0
Transcript of Biomatrics
![Page 2: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/2.jpg)
MY PRESENTATION
• INTRODUCTION• HISTORY• WORKING PROCESS• TECHNOLOGIES• ADVANTAGES & DISADVANTAGES• CONCLUSION• BIBLIOGRAPHY
![Page 3: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/3.jpg)
INTRODUCTION
• Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.
• As the level of security decreases and transaction fraud increases, the need for highly secure identification and personal verification technologies is more.
• Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy.
![Page 4: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/4.jpg)
HISTORY• The term "biometrics" is derived from the Greek
words bio (life) and metric (to measure).• The first known example of biometrics in
practice was a form of finger printing being used in China in the 14th century by “Joao de Barros.”
• “Bertillonage” a method of bodily measurement was used by police authorities.
• The police then used finger printing, which was developed by Richard Edward Henry of Scotland Yard.
![Page 5: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/5.jpg)
WHY BIOMETRICS…?
• Convenient• Passwords are not user-friendly• Perceived as more secured• Passive identification
![Page 6: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/6.jpg)
WORKING All biometric systems works in a four-stage process that consists of the following
steps:
• Capture: A biometric system collects the sample of biometric features like fingerprint, voice etc of the person who “LOGGS” in.
• Extraction: The data extraction is done uniquely from the sample and a template is created for unique features. Templates stores in digital biometric code format.
• Comparison: The template is then compared with a new sample. • Match/non-match: The system then decides whether the features extracted
from the new sample are a match or a non-match with the template. When identity needs checking, the person interacts with the biometric system, a new biometric sample is taken and compared with the template.
![Page 7: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/7.jpg)
TECHNOLOGIES
• Identification And Verification Systems Identification:Search a sample against a database
of templates. Typical application: identifying fingerprints Verification:Compare a sample against a single
stored template Typical application: voice lock
![Page 8: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/8.jpg)
METHODS BIOMETRIC METHODS: 1)Behavioral Biometrics a)Keystroke or Typing Recognition b)Speaker Identification or Recognition
2)Physical Biometrics a)Fingerprint Identification or Recognition b)Speaker or Voice Authentication c)Hand or Finger Geometry Recognition d) Facial Recognition
![Page 9: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/9.jpg)
BEHAVIORAL BIOMETRICS
• Used for verification purpose• Keystroke or Typing Recognition:Keystroke recognition
measures the characteristics of an individual’s typing patterns, including the time spacing of words. It can be used for identifying people who may create inappropriate email or conduct.
• Speaker Identification or Recognition: Speaker identification and recognition is used to discover an unknown speaker’s identity based on patterns of voice pitch and speech style. Behavioral patterns of a voice differ with every individual.
![Page 10: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/10.jpg)
PHYSICAL BIOMETRICS
• Used for Identification purpose• Fingerprint Identification or Recognition: This type of
biometrics compares two fingerprints to determine identification.
• Speaker or Voice Authentication: Speaker or voice authentication is the analysis of vocal behavior by matching it to a voice model template
• Hand or Finger Geometry Recognition:The method uses 3D analysis of the finger for tracking and identification purposes.
• Facial Recognition: Facial recognition uses algorithms to analyze features. These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
![Page 11: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/11.jpg)
ADVANTAGES
• Increase security • Eliminate problems caused by lost IDs or
forgotten passwords • Reduce password administration costs.• Make it possible, automatically, to know WHO
did WHAT, WHERE and WHEN?• Replace hard-to-remember passwords which
may be shared or observed.
![Page 12: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/12.jpg)
DISADVANTAGES
• The finger print of those people working in Chemical industries are often affected.
• It is found that with age, the voice of a person differs.
• For people affected with diabetes, the eyes get affected resulting in differences.
• Biometrics is an expensive security solution.
![Page 13: Biomatrics](https://reader033.fdocuments.in/reader033/viewer/2022060115/5575e64cd8b42af74e8b4a68/html5/thumbnails/13.jpg)
CONCLUSION
• Biometrics is a very interesting and exciting field that has be growing exponentially in recent years (especially 2001).
• The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world