Biometrics Based Authentication AKASH

21
Prepared By : AKASH DEEP MAURYA 1351110002

Transcript of Biometrics Based Authentication AKASH

Page 1: Biometrics Based Authentication AKASH

Prepared By :

AKASH DEEP

MAURYA

1351110002

Page 2: Biometrics Based Authentication AKASH

Presentation Outlines

Authentication & Its types

Biometric & Why use it ?

Characteristics & Modes

Working of Biometric System

Different Techniques

Comparison b/w Different techniques

Application of Biometric Authentication

Limitations

Conclusion

References

Page 3: Biometrics Based Authentication AKASH

Authentication

Act of confirming something or giving

privileges to access something.

Process of giving someone identity-he or she

can access that particular application or data.

For e.g. : Giving identity-card to a student of

an institute.

Page 4: Biometrics Based Authentication AKASH

Types of Authentication

Passwords, PIN

Smart card or Swipe card

Biometric

Page 5: Biometrics Based Authentication AKASH

Biometric

“ something that you are ”

Two Greek words Bio(Life) and Metric(To Measure).

Measures and Analyzes - biological traits - human being.

Automated recognition of an individual - behavioral or physical characteristics.

Provides privacy to personal data & high security to confidential, financial transactions.

Page 6: Biometrics Based Authentication AKASH

Why Biometric ?

Identity theft is not possible

Password remembrance problem does not exist

Cannot be predicted or hacked

Cannot be shared

Perceived as more secure

Accuracy

Page 7: Biometrics Based Authentication AKASH

Characteristics of a Biometric

Recognizing an individual based on two main characteristics :

Physical characteristics are related to physical shape of the

body. For e.g. Fingerprint, face, hand geometry, iris etc.

Behavioral characteristics are related to the behavior of a

person. For e.g. Voice pitch, speaking style, typing rhythm,

signature etc.

Page 8: Biometrics Based Authentication AKASH

Modes of Biometric System

Identification

One-to-many comparison.

It search for a sample against a database of templates.

It identifies an unknown individual.

For e.g. Who is “x” ?

Verification

One-to-one comparison.

It compares a sample against a single stored template.

It verifies the individual’s identity.

For e.g. Is this “x” ?

Page 9: Biometrics Based Authentication AKASH

Working process

Enrollment : In this stage, Information captured-sensing

device-stored in database for later comparison. When someone

uses biometric for the first time then the stage is called

enrollment.

Authentication : Registered biometric sample during the

enrollment process are matched against newly capturing

biometric sample.

Page 10: Biometrics Based Authentication AKASH

Working of Biometric System

Steps :

Capturing

Pre-processing

Feature Extraction

Template Creation

Matcher/Comparison

Application Device

Page 11: Biometrics Based Authentication AKASH

Different biometric technique

Fingerprint technology :

Oldest and most widely used.

Registered points are located and compared.

Optical sensors are used for scanning purpose.

Affects by impression angle, pressure, dirt, moisture etc.

It can be used for many applications like pc login security,

voting system, attendance system etc.

Page 12: Biometrics Based Authentication AKASH

Face Recognition Technology :

For automatic identification or verification of a person from a

digital image.

These include the position/size/shape of the eyes, nose,

cheekbones and jaw line.

Page 13: Biometrics Based Authentication AKASH

Iris Recognition Technology :

It measures the iris pattern of the eye i.e. the colored part of

the eye that surrounds the pupil.

The iris scanner analyzes features like rings, furrows, and

freckles existing in the colored tissue surrounding pupil.

Iris pattern is not changed over years or by glasses, contact

lenses.

Page 14: Biometrics Based Authentication AKASH

Hand Geometry Technology :

Uses hand images for identification or verification.

Person identification utilizes hand images to extract a number

of features such as length, width, thickness, finger area etc.

Measures the digits of the hand and compares to those

collected at the time of enrollment.

Places hand on the system which takes the three dimensional

image of the hand.

Page 15: Biometrics Based Authentication AKASH

Voice Recognition Technology :

Validate user’s claimed identity using

their voice.

It uses the pitch, pattern, tone,

frequency, rhythm of speech for

identification purposes.

A telephone or microphone can act as a

sensor.

Page 16: Biometrics Based Authentication AKASH

Comparison between Different

Technique

Page 17: Biometrics Based Authentication AKASH

Applications Limitations

Criminal identification

Internet Banking

Attendance system

Airport, Bank security

PC login security

Prevents unauthorized access to

private data.

Presence of noise in the sensed

data.

Variations in the enrolled data

i.e. change in age, disease,

environment etc.

Non-universality

It is an expensive security

solution.

Page 18: Biometrics Based Authentication AKASH

Conclusion

Security of e-commerce or e-government sites -

Enhanced

The Greatest strength of the biometric system is that

they does not change over time so it is much more

efficient than other traditional security mechanism.

Accuracy, performance, effectiveness & suitability of

the security systems can be increased.

Page 19: Biometrics Based Authentication AKASH

References

Wikipedia :

http:en.Wikipedia.org/wiki/Biometric_authentication

Google Search Engine

Page 20: Biometrics Based Authentication AKASH
Page 21: Biometrics Based Authentication AKASH