At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 

Slides:



Advertisements
Similar presentations
Model: TA
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRIC VOTING SYSTEM
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS. SCOPE Biometrics – Still an Evolving Technology Biometrics – Past and Present How It Works? Machines for Bio Measurements Future Aspects Benefits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
PALM VEIN TECHNOLOGY.
The Role of Computers in Surveillance ~ Katie Hatland.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Biometrics: Voice Recognition
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Background established on June 18, 1951 Universal Bank since 1994 publicly listed as “SECB” has one of the lowest non- performing loan ratios (NPL) capital.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Libraries have begun to see the value of biometrics M. G
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
Presentation transcript:

At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits  Biometrics in Future  Conclusion

INTRODUCTION Thousands of years earlier physiological parameters such as scars, complexion, eye color, height, moles, etc are used to identify the individuals. The idea of measuring individual physical characteristics seemed to stick and the parallel development of fingerprinting became the international methodology among police forces for identity verification. After the September 11th terrorist attack, Biometrics has gained prominence as being more reliable than current technologies, for people identification.

DEFINITION Biometrics involves identifying a person based on a unique physical characteristic that is different from any other person. Biometrics can be either ‘innate’ such as fingerprints, face or iris; or ‘behavioral’ such as handwriting, gait or typing style. Biometric characteristics are measured using sensors that produce data values that can then be processed by a computer using specialized algorithms for analysis and comparison. Biometric system is the integrated biometric hardware and software used to conduct biometric identification or verification.

HOW BIOMETRIC SYSTEMS WORK?

Generalisations for Biometric Systems ♦ Enrollment ♦ Template Storage ♦ The Network ♦ Verification ♦ Transaction Storage ♦ The Network (again)

POPULAR BIOMETRIC METHODOLOGIES 1.Fingerprint Identification: * Fingerprint Matching * Fingerprint Classification 2.Speaker Recognition 3.Facial Recognition: * Eigen Faces * Local Feature Analysis * Neural Networks

FINGERPRINT MATCHING

FINGERPRINT CLASSIFICATION

SPEAKER RECOGNITION

FACIAL RECOGNITION

EIGEN FACES Vector Face space PIN or bar code LOCAL FEATURE ANALYSIS * B uilding blocks *Face Print NEURAL NETWORKS #Eigen Faces #Neurons recognize pattern

MULTI BIOMETRICS

APPLICATIONS Time Attendance Access control Identification card and Immigration checks Police records, Patient management in hospitals Customer Identification, Loyalty programs Security systems and Preventing Identity theft Membership management in clubs, libraries etc.

FUTURE APPLICATIONS ► ATM MACHINE USE ► WORKSTATION AND NETWORK ACCESS ► TRAVEL AND TOURISM ELEPHONE TRANSACTIONS

REAL-TIME APPLICATION U.K. AIRPORT TESTS PASSENGER EYE ID’s

BENEFITS Increased security when controlling access to confidential data and IT systems Reduced risk of fraudulent use of identity by employees Enhanced user convenience Increased costs savings due to reduced password maintenance costs User convenience due to no passwords to remember or reset and faster login Privacy – ability to transact anonymously

DEMERITS × An automatic personal identification system based solely on fingerprints or faces is often not able to meet the system performance requirements. × In case of face recognition, face will sometimes change with time or injury, and that poses a problem × Face recognition is fast but not reliable. × Fingerprint verification is reliable but inefficient in database retrieval. × Some voice recognition systems has some problems since the voice changes with a human’s mood and illness and background noise poses some problems.