Download presentation
Presentation is loading. Please wait.
Published byCleopatra Samantha Clarke Modified over 9 years ago
1
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY
2
Traditional Security Approaches Magnetic cards/Pins Human guards Usernames/passwords Locks & keys
3
Traditional security systems are highly secured Un
4
Biometrics...... Computerized methods of instantly recognizing people based on unique physical or behavioral characteristics
5
Tasks of Biometric Technologies: Identification Captures a person’s biometric information and looks for a match Answers question “Who are you?” Answers question “Are you the one we are looking for?”
6
Types of Biometrics Biometrics Behavioral biometrics Physical biometric Voice recognition Signature verification Keystroke dynamics Finger printing Face recognition Iris scanning Retina scanning Hand geometry
7
1.Behavioral biometrics Behavioral biometrics basically measures the characteristics which are acquired naturally over a time. It is generally used for verification. e.g. Voice recognition Signature verification Keystroke dynamics
8
1.1 Voice recognition Here voice of person is stored in the database as a password. When the same voice with same pitch is recognized then a match will occur.
9
1.2 Signature verification the signature of the person is stored in the database. When the same signature is found means a match occurs then that is accepted.
10
1.3 Keystroke dynamics Here the speed of typing or writing is measured and stored in a database. When a perfect match occurs with the typing speed then accepted.
11
2 Physical biometric Physical biometrics measures the inherent physical characteristics on an individual.
12
2.1 Fingerprinting Finger printing takes an image (either using ink or a digital scan) of a person's fingertips and records its characteristics. Whorls, arches, and loops are recorded along with the patterns of ridges, furrows, and minutiae. This information may then be processed or stored as an image or as an encoded computer algorithm to be compared with other fingerprint records for finding the match. Fingerprinting Devices
13
2.2 Face recognition Facial recognition analyzes the characteristics of a person's face images input through a digital video camera. It measures the overall facial structure, including distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used as a comparison when a user stands before the camera.
14
2.3 Iris scanning Iris scans analyze the features that exist in the colored tissue surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles. The scans use a regular video camera style and can be done from further away than a retinal scan. It will work through glasses fine and in fact has the ability to create an accurate enough measurement that it can be used for identification purposes, and not just verification.
15
2.4Retina scanning Retinal scanning analyses the layer of blood vessels at the back of the eye. Scanning involves using a low- intensity light source and an optical coupler and can read the patterns at a great level of accuracy. It does require the user to remove glasses, place their eye close to the device, and focus on a certain point. Whether the accuracy can outweigh the public discomfort is yet to be seen.
16
2.5 Hand geometry Hand goemetry involves the measurement and analysis of the shape of one's hand. It is a fairly simple procedure and is surprisingly accurate. Though it requires special hardware to use, it can be easily integrated into other devices or systems.
17
Biometrics Comparison
18
Future Biometrics Instant DNA testing Brain wave scanning
19
Instant DNA testing DNA are the genetic materials which controls the characteristic of every living organism. DNA test is made for various purposes like crime detection,paternityn ess.
20
Brain wave scanning A scanner measures brain responses to a stimuli. When one is asked a question which one knows the true answer, that answer comes first to mind automatically. Even if the individual has already prepared and rehearsed a lie, it is still necessary to think past the true answer and access the lie. This extra activity is easily measured on a brain scan..
21
Advantage of biometrics Increase security - Provide a convenient and low-cost additional tier of security. Reduce fraud by employing hard-to-forge technologies and materials. Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. Unequivocally link an individual to transaction Reduce password administration costs. Offer significant cost savings or increasing
22
When will biometric technologies by available Available now from a number of vendors Fingerprinting devices sell for around $75 Iris scanning devices start at around $200 Face recognition systems start at around $10,000 Prices expected to continue falling by as much as 50% by 2012.
23
Who is involved with biometrics locally? JK paper mill uses finger printing technology for their engineers. IBM and lenevo installed fingerprinting for time and attendance monitoring NASA experiments with using biometrics to allow engineers to control space flights from home computers Compaq offers several fingerprinting devices
24
Conclusion… In the context of ever increasing technology which we apply in our day today life, Security is of outmost importance which can easily and efficiently be solved by the application of biometric technology. Biometric is a unique and measurable characteristic of a human being used to identify an individual. A key characteristic of a biometric access system is that it must operate in real-time. As Biometrics uses our body parts or our behavior for security purpose. So we can conclude that “Person’s security exists As long as person lives”
25
Your questions are welcome!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.