Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

18
Biometrics Authentication Technology

Transcript of Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Page 1: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Biometrics Authentication Technology

Page 2: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

• Something you know, like a password, PIN, or code.

• Something you have, like a swipe card, smart card, token, or key.

• Something you are, which is biometrics.

Three main types of authentication available today are:

Page 3: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

What is a biometric?

Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioural characteristic.

Most definitive, real-time tool available today.

Can be combined with other tools to form more secure, easier to use verification solutions.

Recognizes individuals definitively.

Page 4: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Characteristics

The common Physical characteristics are:

Fingerprint Face Retina Iris Vein pattern Hand and finger geometry

Page 5: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Characteristics

Behavioral characteristics are:

Keystroke dynamics

Voice

Gait

Signature dynamics

Page 6: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.
Page 7: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Biometrics Process

No

Yes

BiometricData Collection

TransmissionQuality

Sufficient?

Yes

Template Match

Signal Processing, Feature Extraction,

Representation

Database

Generate Template

DecisionConfidence?

new biometric sample is requested. No

Page 8: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Database

Fingerprint Recognition steps:

Page 9: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Face recognition process:

Database

Input face image

Extraction of face image

Extraction of face features

Positive

Negative

Page 10: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Iris Identification Steps:

Database

Input of face image

Detection of eye regions

Put iris in focusRecognition of

iris pattern

Accept

Reject

Page 11: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Vein Recognition System:

Database

Input of palm picture

The output picture

Generate veins structure

Match

Not match

Page 12: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

the angle at which the pen is held,

the number of times the pen is lifted,

the time it takes to write the entire signature,

the pressure exerted by the person while signing,

the variations in the speed with which different parts of the signature are written.

Signature Verification Process

Biometric trait

Page 13: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

13

Aadhaar

One-time standardized Aadhaar enrollment establishes uniqueness of resident via ‘biometric de-duplication’

• Only one Aadhaar number per eligible individual

Online Authentication is provided by UIDAI• Demographic Data (Name, Address, DOB, Gender)• Biometric Data (Fingerprint, Iris, Face)

Aadhaar :subject to online authentication is proof of ID

Aadhaar enrollment / Update = KYC

Aadhaar No. Issued, stored in Auth. Server

“Verification” of KYC (Authentication)

Page 14: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Applications Area of Biometric

Page 15: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Advantages of biometrics

Page 16: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Disadvantages of Biometrics

Page 17: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.

Conclusion

Page 18: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075.