Seminar Report On Biometric Authentication
Seminar Report On Biometric Authentication
AKA
by
EBT1/00726/19
Table of Contents
INTRODUCTION...............................................................................................................................2
BACKGROUND OF STUDY.............................................................................................................2
ANALYSIS...........................................................................................................................................4
Types of biometrics systems............................................................................................................4
i. Facial recognition.................................................................................................................4
ii. Fingerprint recognition.......................................................................................................4
iii. Iris recognition.................................................................................................................4
iv. Verification by the use of signatures...............................................................................4
v. Hand geometry.....................................................................................................................4
Security issue of biometrics and its solution..................................................................................5
CONCLUSION....................................................................................................................................5
INTRODUCTION
Biometric authentication is a security procedure that uses unique biological characteristics of
individuals such as retinas, irises, voices, facial characteristics, and fingerprints to verify
people are who they say they are. This procedure is used to manage physical and digital
resources such as buildings, rooms, and various devices
BACKGROUND OF STUDY
Traditionally two major types of authentications have been used, the knowledge base and the
token based. In knowledge base peoples use something they know to identify them; these
includes the passwords. Token based use something you have to recognize you, these
includes the smart cards, physical keys etc. the weakness of these systems is that passwords
can be forgotten and tokens get lost, stolen or duplicated.
With the advent of Biometrics, level of security has improved because the users are
authenticated by their physical traits which they belong to them alone. When it comes to
safety the first step is verification, and afterward, authentication is done.
In modern world mobile devices such as smartphones helps us to handle our tasks from
wherever we are able to connect to the internet. Due to many services that are provided the
user uses the biometrics to authenticate them. These makes it a better method of
authentication since the use doesn’t need to create a bunch of passwords which may be
forgotten.
Biometric has become the most convenient method of authentication and identification
because it uses the physical characteristics of an individual. The convenience is because the
physical traits cannot be forgotten as the passwords do.
i. Facial recognition
Our facial structure is the primary approach that people leverage to remember each other. It is
also a well exposed biometric technology that is used for human identification and
authentication. Now when we have high-quality cameras with the ability to zoom, it is also
likely to recognize a subject from the distance, making facial recognition also suitable for
security and surveillance applications.
ii. Fingerprint recognition
The Fingerprint recognition is one of the oldest and, an efficient biometrics method since
fingerprints have long been recognized as an accurate and primary identification method as
the fingerprints of different individuals are not the same. Like all the other biometrics
technology, it identifies and verifies a person's fingerprint with data saved in it beforehand. It
uses the patters of the people’s fingertips to identify them.
In this system the patterns of the iris are used to identify and verify a person.
The systems identify a person by the unique patters made by a person’s signature.
v. Hand geometry.
The system identifies and verifies an individual according to the shape and the size of their
hand.
Security issue of biometrics and its solution
Biometrics seem secure on the surface. After all, you’re the only one with your ears, eyes,
and fingerprint. But that doesn’t necessarily make it more secure than passwords. A password
is inherently private because you are the only one who knows it. Of course, hackers can
acquire it by brute force attacks or phishing, but generally, people can’t access it. On the
other hand, biometrics are inherently public.
The goal of MFA is to create a layered defence that makes it more difficult for an
unauthorized person to access a target, such as a physical location, computing device,
network or database. If one factor is compromised or broken, the attacker still has at least one
or more barriers to breach before successfully breaking into the target.
CONCLUSION
Biometric authentication system has proven to be the most essential part of modern security
systems by being reliable and convenient method of identification and authentication. With
increased advancement in technology biometrics are likely to become even more adopted and
accepted method of authentication and identification in the years to come. For the acceptance
of the biometrics as the best method of authentication and identification high security must be
incorporated to avoid vulnerabilities from the attackers.