Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.
-
Upload
ruth-quinn -
Category
Documents
-
view
212 -
download
0
Transcript of Biometric Technologies Presented By: Student Id: S083008900274 1 Unique Star.
Biometric Technologies
Presented By:
Student Id: S083008900274
1
Unique Star
Overview
Definition of biometrics Purpose of biometrics and what it provides over
conventional security Introduction of subgroups of biometrics Current use of biometrics Conclusion and thoughts on future developments
2
Biometrics are automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics.
Biometric scanning is used for two major purposes: identification and authentication.
Identification: “Do I know who you are?” One to ManyAuthentication: “Are you who you claim to be?” One to One
Biometric scans are more accurate, make it difficult to masquerade, and generally require less of the user than standard security measures such as password protection.
Biometric technology falls roughly into eight categories: finger, hand, iris, retina, face, Signature Recognition , Keystroke Recognition, and voice recognition.
3
Definition of Biometrics
Physiological BiometricsFingerprint RecognitionHand Geometry Recognition Iris Recognition Retinal Scanning Facial Recognition
Behavioral Biometrics.Voice Recognition Signature Recognition Keystroke Recognition
4
Types of Biometrics
The most widely-used biometric technology. Measures the unique, complex swirls on a
person's fingertip. The swirls are characterized and produced as a template requiring from 250-1,000 bytes
5
Fingerprint Scan
Hand scan, also known as hand geometry, is a biometric authentication technology.
The system maps key features of the topography of a person's hand, measuring all the creases on the palm.
This is more expensive and considered less accurate than other biometrics.
Strength: requires only ~9 bytes to store template.
6
Hand Scan
The technology examines the unique patterns of the iris, the ring around the pupil.
Very complex. Iris scans are non-invasive. The person puts their
face in front of a camera which then analyzes all the features.
Even works with corrective lenses. Highest accuracy of all the biometric technologies.
7
Iris Scan
The Retinal scans examine the blood vessel patterns of the retina, the nerve tissue lining the inside of the eye that is sensitive to light.
An infrared light source is used to illuminate the retina of the eye. The image of the enhanced blood vessel pattern of the retina is analyzed for characteristic points.
It is also among the most difficult to use, and is perceived as being moderately to highly intrusive
8
Retinal Scan
One method is called feature analysis which tracks about 80 facial characteristics.
A facial template requires ~1,300 bytes. Essentially, the technology measures the peaks
and valleys of the face. more suitable for wide range. Expensive
9
Facial Scan
Voice is a behavioral biometrics. Voice verification is used with passwords and PIN
numbers. Voice dynamics relies on the production of a
"voice template" that is used to compare with a spoken phrase. A speaker must repeat a set phrase several times as the system builds the template.
10
Voice Scan
Signature scan - analysis of characteristics in an individuals signature. May soon help address the very large demand for document authentication.
Keystroke scan - analysis of an individual’s typing pattern. Can be used along with passwords for a very secure system.
Body odor, skin pores, wrist/hand veins, DNA, Shape of ear, Gait, etc…
11
Others
Network security - Authentication, ATM, Internet banking.
Non-Network based security - Home use, content control.
Sensitive environments, e.g. government buildings, prisons
Schools - Library cards, Computer access, Enrollment.
Businesses - Time and attendance. Law Enforcement - Casino Operations, Super
Bowl. Etc…., The uses are endless.
12
Use of Biometrics
Imagine a secure world without passwords.
13
Conclusion
14
15