Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

(Biometrics Consortium)
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
PALM VEIN TECHNOLOGY.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics in the Banking Industry
Challenge/Response Authentication
Biometrics Security in Banking Systems Image processing in ATM
A device tat transfers data from the outside world into a computer
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Input Devices.
Challenge/Response Authentication
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Biometric Security Palm Vein Technology
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics Reg: AMP/HNDIT/F/F/E/2013/067

Content What is Biometrics. Biometrics-Applications. Why Biometrics?. How biometric work. Bio metrics devices Advantage and Disadvantages

What is Biometrics Definition: “Automated measurement of Physiological and/or behavioral characteristics to determine or authenticate identity” Biometrics is a security solution based on something you know, have, and are: Know Password, PIN Have Key, Smart Card Are Fingerprint, Face, Iris

Automated measurement” No human involvement. Comparison takes place in Real-Time.

Physiological and/or behavioral characteristics Behavioral: User speaks. Signs name Physiological: Fingerprint Hand Eyes Face

determine or authenticate identity Verification Systems More accurate. Less expensive. Faster. More limited in function. Requires more effort by user.

Why Biometrics?

Why Biometrics? Passwords are not reliable. Too many Can be stolen Forgotten Protect Sensitive Information Banking Medical

Biometrics-Applications

Biometrics-enabled Authentication Applications Cell phones, Laptops, Work Stations, PDA & Handheld device set. 2. Door, Car, Garage Access 3. ATM Access, Smart card Image Source : http://www.voice-security.com/Apps.html

Biometrics-enabled Identification Applications Criminel Tracking e.g. Fingerprints, DNA Matching Car Park Surveillance Frequent Customer Tracking

How biometric work

How biometric work Biometrics work by recording and comparing biometric characteristics. There are two type for biometric recognition Identification Verification

Identification Behavioral Physiological It mean identify and analyze the humane unique characteristic. It can divided in two types Behavioral Physiological

Identify Methods Fingerprint Face Recognition Signature Iris Scan Hand

Biometrics Verification Firstly collects data and information convert to digital format.

Then process the information and keep it Then process the information and keep it. Because that need to compare with new biometric data

After check and compare with new biometric data with data storage.

Finally recognize whether that information are real E.g.- In ATM machine verify your pass word or finger mark & If it is true then you can withdraw money.

Bio metrics devices

Bio metrics devices There are many types of bio metrics devices Commonly using 5 types of devices Iris scanner Finger print scanner Facial Biometrics Voice Recognition Other

iris scanner This scanner use for identify humens iris

Finger print Scanner Private and government sectors is using Finger print devices Earlier days used ink and paper method

Facial Biometrics Each and every persons have different and unique face. Use series of images for identify persons

Voice Recognition Some computer systems have voice recognition method Voice recognition is not the same as speech recognition, it is speaker recognition

Other

Advantages and Disadvantages

Biomatrix. ADVANTAGES DISADVANTAGES FINGERPRINTS ADVANTAGES A long-used method that is familiar and generally quick perform. Fingerprints are unique. A set of 10 prints yields highly accurate results. Cheap and easy to use. DISADVANTAGES Some people have poor prints because of injury, age, disease or occupation. Requires physical contact with a sensor and may have negative connotations because of use by law enforcement. . .

HAND GEOMETRY DISADVANTAGES. ADVANTAGES. Not suited for picking someone out of a large group. Sensors are large and relatively expensive ADVANTAGES. Fast and easy to use. Rugged and works well outdoors. . .

SPEECH VERIFICATION ADVANTAGES. Can use standard microphone or telephone handset and existing telephone lines. DISADVANTAGES Background noise, illness or stress can affect voice samples. Most accurate if similar instruments capture voice samples at enrollment and verification points. Not suited for picking someone out of a large group. .

Thank You!!