0% found this document useful (0 votes)
24 views

Biometric Identification Systems

This document discusses biometric identification systems and fingerprint matching. It defines biometrics as technologies that measure and analyze physiological or behavioral characteristics that are unique to individuals. These characteristics can be used to verify or identify a person. The document then discusses problems with current security systems like passwords and introduces different biometric systems including fingerprint recognition. It provides terminology around identification and verification in biometric systems and discusses factors like accuracy, vulnerability to fraud, ease of use, applicability to populations, and speed of verification. Finally, it asks how a system captures and analyzes a fingerprint image for matching.

Uploaded by

tomarsvani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Biometric Identification Systems

This document discusses biometric identification systems and fingerprint matching. It defines biometrics as technologies that measure and analyze physiological or behavioral characteristics that are unique to individuals. These characteristics can be used to verify or identify a person. The document then discusses problems with current security systems like passwords and introduces different biometric systems including fingerprint recognition. It provides terminology around identification and verification in biometric systems and discusses factors like accuracy, vulnerability to fraud, ease of use, applicability to populations, and speed of verification. Finally, it asks how a system captures and analyzes a fingerprint image for matching.

Uploaded by

tomarsvani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Biometric Identification

systems

Suryakant Mishra
Assistant Professor
Department of Zoology and Forensic Science
Kurukshetra University
The term "biometrics" is derived from the Greek
words bio (life) and metric (to measure).
ƒ
For our use, biometrics refers to technologies for
measuring and analyzing a person's physiological
or behavioral characteristics.
These characteristics are unique to individuals
hence can be used to verify or identify a person.
Problems with current security systems
With increasing use of IT technology and need to protect data,
we have multiple accounts/passwords.
• We can only remember so many passwords, so we end up
using things we know to create them (birthdays, wife/girlfriends
name, dog, cat…)
• Its is easy to crack passwords, because most of our passwords
are weak!
• If we create strong passwords (that should be meaningless to
us) we will forget them! And there is no way to remember
multiple such password
Different Biometrics sytems

Facial imaging Retina Scan


and thermograms DNA
Fingerprint Signatures recognition
Voice Gait pattern
recognition Key strokes/typing
Palmprint dynamics
Hand Geometry
Iris recognition.
Terminology

Identification:
– Match a person’s biometrics against a
database to figure out his identity by
finding the closest match.
– Commonly referred to as 1:N matching
– ‘Criminal Watch-list’ application scenarios
Verification:
– The person claims to be ‘Deepak’, system
must match and compare his biometrics with
‘Deepak’s stored Biometrics.
– If they match, then user is ‘verified’ or
authenticated that he is indeed ‘Deepak’
– Access control application scenarios.
– Typically referred as 1:1 matching.
Accuracy:
There are two types of error that a biometric
identification system can make:
(1) it can assess that two samples from different
individuals are the same, and
(2) it can assess that two samples from the same
individuals are different.
The first of these errors is termed a false match or a
false accept error. The second of these errors is
termed a false non-match or a false reject error.
Vulnerability to fraud:

The types of fraud that may be committed depend


on whether the application is cooperative or non
cooperative. In cooperative applications (i.e., the
impostor tries to obtain a false match),
technologies may be fooled by devices such as
pictures, tape recordings, or artificial limbs.
Ease of use:
Ease of use is especially important in unattended
environments and for non-habituated applications.
In addition to the simplicity of the method, this
factor assesses the social acceptability of the
technology
Applicability to entire population.

there are some people who cannot provide the


biometric information required by the technology.

Exmple : roughly .5 to 1% of the population cannot


provide finger images, either because of accident or
injury, or because their fingers are worn due to their
occupation or age.
Speed of verification.

The speed with which two samples can be


compared is especially important
Fingerprint Matching

How Does a Biometric Identification System Capture and


Analyze a Finger image?

You might also like