Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
CSCI E-170: Computer Security, Privacy and Usability Hour #2: Biometrics.
(Biometrics Consortium)
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PALM VEIN TECHNOLOGY.
Chapter 13 Biometrics What you are
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Biometrics.
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Physical Security Secure the room Secure the machine – 6 ways.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Global Biometrics Market Size, Share, Global Trends, Analysis, Research Report and Forecast, Market Research Store.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT

Content Content 1.INTRODUCTION 2.A LITTLE BIT OF HISTORY 3.COUNTRIES APPLYING BIOMETRICS 4.BIOMETRICS DEVICES AND SYSTEM 5.BIOMETRICS PASSPORT 6.APPLICATION 7.ADVANTAGES & DISADVANTAGES 8.EXPECTATION 9.FUTURE SCOPE

INTRODUCTION TO BIOMETRICS INTRODUCTION TO BIOMETRICS “ BIOMETRICS” Science devoted to identify persons by automatic means taking as input biological and/or behavioral characteristics of a human being. Human characteristics which is used in biometrics :-  Universality  Performance  Uniqueness  Permanence  Collectivity  Acceptability

BIOMETRICS HISTORY BIOMETRICS HISTORY 1871 :- Adolphe Quetlet,Belgain mathematician and astronomer made a contribution to the modern use of biometrics with his treatise :- Adolphe Quetlet,Belgain mathematician and astronomer made a contribution to the modern use of biometrics with his treatise. 1882:-Adolphe Bertillon,frenh law of enforcement officer Develop a system to identify criminals. 1882:-Adolphe Bertillon,frenh law of enforcement officer Develop a system to identify criminals. 1888:-Jaun vucetich,Argentinean police officer was the 1 st to use dactyloscopy. 1888:-Jaun vucetich,Argentinean police officer was the 1 st to use dactyloscopy. Richard Edward Henry of Scotland yard, developed finger print system. Richard Edward Henry of Scotland yard, developed finger print system.

COUNTRIES APPLYING BIOMETRICS COUNTRIES APPLYING BIOMETRICS  United State  Germany  Brazil  Iraq  India  New Zealand  Australia  Canada  Israel

BIOMETRICS DEVICE AND SYSTEM Finger Print Scanners:- Finger Print Scanners:- ARCH RIGHT LOOP WHROL TRENTED ARCH

FINGERPRINT RECOGNITION:- Hand Geometry:-  91.65% Maximum recognition  4.18% Error Rate Palm Geometry:-  86.19% Maximum recognition  7.65% error Rate Finger Geometry:-  97.25% Maximum recognition  1.74% Error Rate

HAND GEOMETRY Hand Geometry:- Hand Geometry:-  Overall Hand and Finger Width  Distance Between joints  Bone Structure Primarily For Access Control:- Primarily For Access Control:-  Machine Rooms  Olympics Reasonably Robust System Reasonably Robust System But: But:  Best for 1to1 Verification

IRIS RECOGNTION  Iris is the annular portion between the dark pupil and white sclera.  It has got a rich texture information which could be exploited for a biometric recognition system exploited for a biometric recognition system

WHY IRIS ??  Its error rate is extremely low.  Iris a permanent biometric.  User acceptability is reasonable.  Real time biometric verification.  Less susceptible to spoofing.

VIOCE RECOGNTION  Distinctive w.r.t. to Vocal Chords, Vocal Tract, palate.  Works Over The telephone.  Non –Invasive ( can be used covertly)  Most system have Audio Hardware.  But:-  Background Noise. (e.g. airplanes)  Tapes Recording May be Used.  Identical twins Sound Alike.

FACE RECOGNITION Used in Many ID Document. Used in Many ID Document. Can be Applied Covertly. Can be Applied Covertly. But: But: Physiologic Changes Due to Growth And Aging. Physiologic Changes Due to Growth And Aging. Can be Altered By Surgery. Can be Altered By Surgery. Facial Hair, Hats….. Facial Hair, Hats…..

BIOMETRIC PASSPORT  It is known as E-Passport.  It uses contact less smart card technology.  To store biometric data on the contact less chip, it includes minimum of 32 kilobytes of Rom storage memory.  USA passport card are not Biometric Passport because it doesn't follow ICAO’S DOC 9303.

APPLICATION Health Care Health Care In Military In Military Telephony and other Domains Telephony and other Domains People with disabilities People with disabilities In vehicles for security In vehicles for security In Schools In Schools To find out the Criminal/terrorists To find out the Criminal/terrorists In intelligent Robotic In intelligent Robotic

ADVANTAGE To lower errors due to fatigue or environmental change. To lower errors due to fatigue or environmental change. Identifying a user in non presential service. Identifying a user in non presential service. It provide security. It provide security. Eliminate the security hole of pins and password. Eliminate the security hole of pins and password. Allowing the greater amount of user's, the excess to EID service. Allowing the greater amount of user's, the excess to EID service. It is comfort for user’s. It is comfort for user’s.

EXPECTATION  Known limitations: Lighting and angle can affect performance. Lighting and angle can affect performance. Biometric solutions are close to 100%, but not 100%, there Biometric solutions are close to 100%, but not 100%, there could still be false acceptance and false rejection. could still be false acceptance and false rejection.

THANK YOU FOR ATTENTION