Seetu
-
Upload
seetumishra2511 -
Category
Education
-
view
108 -
download
0
description
Transcript of Seetu
![Page 1: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/1.jpg)
Presented byP.Srinivas ( 07W81A0542)M.Anusha (07W81A0507)
A PAPER PRESENTATIONA PAPER PRESENTATION ONON
BIOMETRICS TECHNOLOGYBIOMETRICS TECHNOLOGY
Presented By:Seetu mishracse: 2nd yrArjun college of tech & science
![Page 2: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/2.jpg)
1.Introduction2.Security and Authentication3.Methods of verification
1. Psychological verificationa) Finger Printb) Hand Print.c) Face Measurement.d) Retinal Scanninge) DNA Analysis.
• Behavioral verification1. Typing.2. Signature.3. Voice.
a)Identification.b)Applications.c)Advantages .d)Limitations.e)Conclusion.f)1st UID project in maharastrag)References
![Page 3: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/3.jpg)
1. Biometrics is derived from the conjunction of the Greek words bios and metrics that mean life and to measure respectively.
2. Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity.
3. A Biometrics system is actually a pattern recognition system that utilizes various patterns like iris patterns, retina patterns and biological traits like fingerprints, facial geometry, voice recognition and hand recognition etc….
Functionality of Biometric device:1. First , it checks whether we are who we claim we are
i.e. It sets off to verify our identity.2. Second, it tries to find out who we are, i.e. It sets off to
establish an identity.3. Biometrics goes far from the traditional systems and
thus helps in tightening internet security
![Page 4: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/4.jpg)
Authentication is the process of Giving PermissionsExample:-Microsoft SQL Server uses permissions to enforce database securitySQL Server's permissions system recognizes four types of users: the SA, database owners, database object owners, and other users of the database.
![Page 5: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/5.jpg)
Methods of Verification
Psychological verificationPsychological verification
Behavioural verification Behavioural verification
![Page 6: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/6.jpg)
![Page 7: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/7.jpg)
Fingerprint:Fingerprint:It involves the user placing his finger over a glass-plate, which resides over a high-resolution camera, which uses optical or electromagnetic means to take its snapshot. The software analysis your finger for pattern such as loops, worls and arches
Pros:a. This technology is neither too expensive nor does it require extensive user training.
b. It also simple to implement.c. Finger print system has FAR<0.5%d. It is oldest known technique that is still used in criminal records and forensic.
Cons:1.Any injures of fingers effect more.
![Page 8: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/8.jpg)
Hand print:
It compares a 3D image of the users hand to that present in the system database. It is somewhat similar to finger print verification.
Pros:a. Accuracy is better than
fingerprint.b. Cheap and easy to deploy.
Cons:a) Complex in usage.b) Implementation is expensive.c) Any damages to hand effect
more.Applications:
San Francisco International AirportImmigration facilitiesDay Care Centers
![Page 9: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/9.jpg)
Face measurement:
Measuring this is as simple as taking a picture and analyzing the image from a security video capture. This technique enables the computer to use your face as your password and matching these to an existing database
Pros:a. Mot continents at public
places.creams also effect the measurements.
b. Less expensive.
Cons:Inaccurate is affected by changes in lighting, age, and movement, glass.Face
![Page 10: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/10.jpg)
Retinal scans:Retinal scans:
It involves imaging of the blood vessels in the retina of the eye when infrared light of a certain frequency and wavelength is incident upon it.this energy is absorbed by the blood vessels is different in different individuals. The retinal iris patterns are unique to individuals than any biometric yet devised.
The retina is an internal part of the eye located at the back of the eye and is get of thin nerve which sense the light coming through a camera, pupil, eye lenses. The pattern of blood vessels which makeup retina are unique to each individual i.e., <1.2 inch.
![Page 11: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/11.jpg)
Pros:a. Accurate with no false match in 2 million
people.b. It s sophisticated process.
Cons:Expensive, difficult to deploy and use.Focus of light effect measurements.
Retinal scans:
Applications:High-end security: military, power plans
![Page 12: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/12.jpg)
DNA Analysis: It involves in checking the DNA pattern
of a human used when physical characteristics are unrecognizable. It is used to identify people, who are died, to find out the relationship like identifying Childs natural parents.
This is one Biometric that is judicially accepted. No human have identified DNA patterns except in twins. Advantages:
a. DNA samples can be collected from toothbrush, clothes. Disadvantages:
DNA testing takes longer time than other methods.Twins have same DNA.Researchers produce same DNA.
![Page 13: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/13.jpg)
![Page 14: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/14.jpg)
Typing:Some systems measure things you do in addition to the things you are, you will notice that your typing has a certain pattern. Some letters follow others in quick succession, while others take longer.
Software called Bio password is available for less than $100.It integrates with Windows 2000.Windows NT.Login to provide this authentication without the need for any additional software. This measure is a behavioral characteristic of a person.
![Page 15: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/15.jpg)
Some qualities looked into include acceleration rates, direction, and pressure and stroke length. Here mainly concentrate on pressures. This pressures stored in back end for future significations. Disadvantages:
a. The disadvantage with the technology lies in the randomness or the consistency with which a user makes his signature. If pressures are not tally with stored pressure in the database
Signature:
ApplicationsAccess to documentsExecution of contractsBanking services
![Page 16: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/16.jpg)
It involves in the recognition of the voice of the individual. Pros:It is inexpensive.It also works through telephone.Some person mimicry with other person voices.Cons:
a. One can mimic the voice of the individual. Biometric does not guarantee security. It simply offers ore convenient and reliable means of identification and authentication
Voice
Applications:Call CentersLaw enforcement – house arrest authenticationElectronic commerceCustomer authentication for service calls
![Page 17: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/17.jpg)
Percentage Of Usage Of VerificationsPercentage Of Usage Of Verifications
![Page 18: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/18.jpg)
It is a process of recognition and involves taking the biometric data and searching for the match in the database asking it a slow process that it is more prone to errors. It involves confirming your identity and the biometric systems have to match your data with only one, single record.
Depending on the technique used, Biometric have varying levels of accuracy .The system might let you pass in one attempt on Monday and require five on Tuesday.
The accuracy of any biometric system is measured in terms of FAR and FRR.
FAR (False Acceptance Rates):Where an imposer is accepted as a match. It is a probability of falsely
accepting a metric as a match.
FRR (False Rejection Rates):Where a legal match is denied. Where the system sails to recognize an
authentic Bio-signature.As FRR increases, the FAR goes down and vice versa.
Almost all biometric systems can be adjusted to varying levels of strictness to create a variation in FAR and FRR. For a system to be successful, both have to be with in acceptable low limits.
Identification
![Page 19: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/19.jpg)
Applications
Computer networksComputer networks
Cellular phone
industry
Internet Banking
Multi national
companies
Voting Solutions
Network security and authenicatio
n
Network security and authenicatio
n
![Page 20: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/20.jpg)
Advantages
1. It provide good security mechanism than all other security methods
2. It never fails in security constraints.3. In public locations such as banks and airports a large number
of people transit every day including known criminals. 4. Face recognition systems attached to video surveillance
systems are supposed to help catch them.
![Page 21: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/21.jpg)
1st UPI PROJECT IN MAHARASTRA
The worlds first ID project on biometric data is used to provide unique identification numbers for India billion plus citizens rolled out on Wednesday with prime minister Man Mohan Singh & UPS chief Sonia Gandhi. Handling over the 1st set of 12 digit no to 10 tribals .It is a biometric based data including from fingerprint & iris scan is being used 1st time in the world to provide cost effective, nationally valid & verifiable single source of id proof through an authentication infrastructure.
![Page 22: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/22.jpg)
Limitations
1. It needs high memory space in the back end.
2. Collect data for security is difficult3. Some times fails the security with right
users4. Any time data loose in database high
effect for security mechanism.5. So many equipments are needed for
provide this technology.6. It highly expensive
![Page 23: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/23.jpg)
Conclusions
Security is not just about putting big locks on the front door; it also involves making sure all the windows are shut.
Each one can be individually fooled, but the comparison makes the system more secure as a whole.
Biometrics are have its own advantages and disadvantages. It high expensive but it provide good security.
Money is not important than security. It is more useful for confidential maters.
![Page 24: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/24.jpg)
i. http://Biometrics.com
ii.http://whitepapers.com
iii.http://www.milesresearch.com
iv.http://microsoft/biometrics.com
v.D.c paper 30th september 2010
References
![Page 25: Seetu](https://reader035.fdocuments.in/reader035/viewer/2022062406/558ec5ce1a28ab6b628b4664/html5/thumbnails/25.jpg)