BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
(Biometrics Consortium)
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PALM VEIN TECHNOLOGY.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
BIOMETRICS.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Jim Parson Secure Systems Administration. History Babylonian business transactions included fingerprints 500 B.C. Chinese - tracked young children 14th.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Biometrics Security in Banking Systems Image processing in ATM
Hand Geometry Recognition
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
Presentation transcript:

BIOMETRICS By Lt Cdr V Pravin 05IT6019

BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...

BIOMETRICS  Introduction  General system  Finger Print  Iris  Performance & Application  Conclusion

WHAT IS BIOMETRICS?  Automated method  Pattern recognition system  Specific physiological or behavioral characteristics

WHY USE IT?  Traditional methods involving passwords and PIN numbers  Biometrics highest level of security

CHARACTERISTICS USED Fingerprints Fingerprints Voiceprints Voiceprints Facial features Facial features Writing patterns Writing patterns Iris patterns Iris patterns Hand geometry Hand geometry

BIOMETRIC SYSTEM  Data Collection  Transmission  Signal Processing  Data Storage  Decision

BIOMETRIC SYSTEM

The hardware captures the salient human characteristic The software interprets the resulting data and determines acceptability. HOW IT WORKS HOW IT WORKS

FINGER PRINT  Oldest form of Biometrics  Highly Reliable  Uses distinctive features of fingers

FINGERPRINT  Finger-scan biometrics is based on the distinctive characteristics of the human fingerprint  A fingerprint image is read from a capture device  Features are extracted from the image  A template is created for comparison

FINGER PRINT RECOGNITION  Global features  Local features

 Pattern Area  Core Point  Delta  Line types  Ridge Count  Ridge Patterns GLOBAL FEATURES

BASIC RIDGE PATTERNS  Loop  Arch  Whorl

LOOP, ARCH AND WHORL

STAGES   Fingerprint Scanning   Fingerprint Matching   Identification

FINGERPRINT SCANNING  It’s the acquisition and recognition of a person’s fingerprint characteristics for identification purposes

IMAGE CAPTURE  Optical  Thermal  Capacitance  Ultra Sound

IMAGE ACQUISITON

MINUTIA MATCHING

BRIDGE CODE

SPUR CODE

PROCESS

PROCESS

FINGERPRINT PC LOCK

FINGERPRINT DOOR LOCK

IRIS RECOGINITION

IRIS RECOGNITION Pattern recognition technique Pattern recognition technique Identification by mathematical analysis of the random patterns. Identification by mathematical analysis of the random patterns. Based upon the qualities of the Iris Based upon the qualities of the Iris

Iris is a protected internal organ whose random texture is stable throughout life Iris is a protected internal organ whose random texture is stable throughout life

IRIS PROPERTIES High degree of Randomness No two Iris are alike Stable in a persons life Doesn't vary with changes

IRIS SCAN  Camera at close proximity  Captures photograph  Uses Infra red light to illuminate  High resolution photograph

IRIS SCAN IMAGE

IRIS CODE  Localization of inner and outer boundaries  Pattern of 512 bytes  Complete and Compact description  More complete than features of DNA

IRIS SYTEM Pre processing Feature- extraction Identification Verification Stored templates Uniform distribution Reject Accept Iris scan image capture Iris localization Iris code comparison

IRIS RECOGNITION  Database of millions of records  Iris code generated is compared  Searching algorithm based on Properties of Iris  Order of a few seconds

AVIATION – IRIS DEVICES

BIOMETRIC PERFORMANCE FAR The FAR is the chance that someone other than you is granted access to your account. The FAR is the chance that someone other than you is granted access to your account. Low false acceptance rate is most important when security is the priority Low false acceptance rate is most important when security is the priority

BIOMETRIC PERFORMANCE FRR The FRR is the probability that are not authenticated to access your account. The FRR is the probability that are not authenticated to access your account. A low FRR is required when convenience is the important factor A low FRR is required when convenience is the important factor

FINGERPRINT PERFORMANCE  FAR - As low as 1 in 1,000,00  FRR –around 4%

IRIS PERFORMANCE  FAR - As low as 1 in 1,000,000  FRR –around 2%

APPLICATIONS  Criminal identification  Prison security  ATM  Aviation security  Border crossing controls  Database access

SOME BIOMETRICS STILL IN DEVELOPMENT  Scent  Ear Shape  Finger nail bed  Facial 3D

REFERENCES