0% found this document useful (0 votes)
89 views

Biometrics: Sreenu S. Kamath VIII Semester Information Science

Biometrics uses physiological or behavioral characteristics to identify individuals. Common biometric traits include fingerprints, iris scans, facial recognition, and voice recognition. The biometric data is captured, a template is created, and comparisons are made against existing templates to determine a match. Fingerprinting has been used for centuries in China and became popular with police in the late 1800s. Now many biometrics are used for security including fingerprint, iris, facial recognition, and others. Applications include network security, banking, law enforcement, and access control. Benefits are convenience over passwords but challenges include reliability of some traits and privacy concerns.

Uploaded by

Sreenu Kamath
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views

Biometrics: Sreenu S. Kamath VIII Semester Information Science

Biometrics uses physiological or behavioral characteristics to identify individuals. Common biometric traits include fingerprints, iris scans, facial recognition, and voice recognition. The biometric data is captured, a template is created, and comparisons are made against existing templates to determine a match. Fingerprinting has been used for centuries in China and became popular with police in the late 1800s. Now many biometrics are used for security including fingerprint, iris, facial recognition, and others. Applications include network security, banking, law enforcement, and access control. Benefits are convenience over passwords but challenges include reliability of some traits and privacy concerns.

Uploaded by

Sreenu Kamath
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

BIOMETRICS

Sreenu S. Kamath
VIII Semester
Information Science
Introduction

Biometrics is the automated identification, or verification of human
identity through the measurement of repeatable physiological, or
behavioral characteristics.


BIO=Pertaining to biology; METRICS=Science and art of measurement

Recognizing a person based on a physiological or behavioral


characteristic.
Continued..
1.Physiological characteristic
 fingerprint recognition
 retinal and iris scanning
 facial recognition
 hand geometry
2.Behavioral techniques
 handwriting recognition,
 voice or speech recognition
 keystroke dynamics.
What does it do?
In all automated systems, biometrics carries out the
following activities :
Capture: The biometric data is captured, digitized
and entered into a database.
Extraction: A template is created using this
measurable unique data.
Comparison: The template is compared with a new
sample.
Match/Non-Match: The existing template matches
the new sample or it does not.
BACKGROUND OF THE INVENTION
Chinese Precursor:

1. finger printing in China in 14th century.


2. stamped children's palm prints and footprints on
paper with ink to distinguish the young children
from one another.
BACKGROUND OF THE INVENTION

 European Origins:

1. Until late 1800s, identification largely relied upon


"photographic memory.“
2. In the 1890s, an anthropologist developed a method of
multiple body measurements.
3. it quickly faded the police started using finger printing,
which was developed by Richard Edward Henry of
Scotland Yard, essentially reverting to the same methods
used by the Chinese for years.
BACKGROUND OF THE INVENTION
Modern Times:
1. Moved from a single method (fingerprinting) to
more than ten discreet methods.
2. Company's improve their methods as the technology
available to them advances.
3. Prices for the hardware required continue to fall.
4. Public concern over privacy issues grow as the
industry grows.
5. Continuous drafting of Laws and regulations.
FIELD OF INVENTION
method for securing information and denying access
to intruders.
Safety and security are the key words today
Biometrics touches all sectors and spheres of the
industry. Be it medical, legal, defense, corporate
information, or even personal vital data.
The use of the human body unique features the only
way to be assured of safety in today’s scenario.
WORKING

Devices consist of a scanning device, software, and a
database.

Software identifies specific points of data as match
points. These are processed using an algorithm into
a value that can be compared with biometric data in
the database.

All Biometric authentications require comparing a
registered or enrolled biometric sample against a
newly captured biometric sample.
WORKING
Enrollment Mode:
1. A sample of the biometric trait is captured,
processed by a computer, and stored for later
comparison.
2. Biometric recognition can be used in Identification
mode
Verification Mode:
1. biometric system authenticates a person’s claimed
identity from their previously enrolled pattern.
2. In most computer access or network access
environments, verification mode would be used.
Biometric Trait
Hardware Sensor
Fingerprint (Minutia) capacitive, optic, thermal, acoustic, pressure
sensitive
Signature (dynamic) Tablet
Facial Structure Camera
Iris pattern Camera
Retina Camera
Hand geometry Camera
Finger geometry Camera
Vein structure of the back of the Hand Camera
Ear form Camera
Voice (Timbre) Microphone
DNA Chemical Lab
Odours Chemical sensors
Keyboard Strokes Keyboard
Comparison: Password Keyboard
Methods of Biometric Identification
The basic software is used for analysis and matching
with already-stored data.
For this after the hardware has captured the tangible
proof of the person, it transfers the same to the
computer’s processing unit.
This is then converted to binary code comprising 0
and 1.
Only when the input matches with the codes stored in
the computer is the person allowed access. Eg. In voice
print
FINGERPRINT

The patterns of friction ridges and valleys on an individual's


fingertips are unique to that individual.
unique for each finger of a person including identical twins.
One of the most commercially available biometric
technologies, fingerprint recognition devices for desktop
and laptop access are now widely available.
So users no longer need to type passwords - instead, only a
touch provides instant access.
 Fingerprint systems can also be used in identification
mode.
IRIS RECOGNITION
 Iris patterns are thought unique.
 Obtained through a video-based image acquisition system.
 Systems based on iris recognition have substantially
decreased in price.
 Technology works well in both verification and
identification modes.
 Current systems can be used even in the presence of
eyeglasses and contact lenses.
 Iris recognition has been demonstrated to work with
individuals from different ethnic groups and nationalities
FACEPRINT

Can be done in a number of different ways such as by capturing an
image of the face in the visible spectrum using an inexpensive camera
or by using the infrared patterns of facial heat emission.

Facial recognition in visible light typically model key features from the
central portion of a facial image.


Challenges
1. reducing the impact of variable lighting and detecting a mask or
photograph.
2.Some may require a stationary or posed user in order to capture the
image.
Major benefits of facial recognition are that it is non-intrusive, hands-
free, continuous and accepted by most users.
FACEPRINT
Hand Geometry
These methods of personal authentication are well established.
Hand recognition has been available for over twenty years.
To achieve personal authentication, a system may measure
either physical characteristics of the fingers or the hands..
One interesting characteristic is that some systems require a
small biometric sample (a few bytes).
Hand geometry has gained acceptance in a range of
applications.
It can found in physical access control in commercial and
residential applications, in time and attendance systems and in
general personal authentication applications
Signature Recognition
Based on the dynamics of making the signature,i.e.,
acceleration rates, directions, pressure, stroke length,
etc., rather than a direct comparison of the signature
after it has been written.
The problems with signature recognition lie in the
means of obtaining the measurements used in the
recognition process and the repeatability of the
signature.
APPLICATION
Enterprise-wide network security infrastructures for checking
misappropriation and information pilferage.
Financial sector for secure electronic banking, investing and
other financial transactions for verification of usage and
application of funds.
Law enforcement.
Health & Social services.
Biometric Time Clocks to control employee timekeeping.
Biometric access control systems to provide strong security at
entrances.
For securing access to pc's and providing single logon facilities.
Strengths and weaknesses
Benefits
1. No Need to Remember Passwords
2. Access to Personal Data Can be Prevented:
3. Fraudulent Use of ATMs, Credit Cards Can be Prevented

 Drawbacks:
1. User dependent
2. Personal Motivation
3. Implementation must be protected against replay
attacks, keyboard dummies
CONCLUSION
Result of human need for security and authenticated.
As the technology progresses, nearly everything can be
duplicated and hacked.
But what remains same throughout is the human body
and its unique composition that makes it so very
powerful medium of security and safety.
As is the way, this has given shape to worldwide usage
and interoperability of Biometrics.
THANK YOU

You might also like