Biometrics Technology

Post on 06-May-2015

12620 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

what do you know about Biometrics and how it works?

Transcript

Biometrics Technology

• something you know, like a password, PIN, or code.

• something you have, like a swipe card, smart card, token, or key.

• something you are, which is biometrics.

three main types of authentication available today are:

What is a biometric?

Biometrics • Is the term given to the use of

biological traits

OR

behavioral characteristics

to identify an individual. 

Characteristics

The common Physical characteristics are: Fingerprint Face Retina Iris Vein pattern, and Hand and finger geometry

Characteristics

Behavioral characteristics are:

Keystroke dynamics Voice Gait, and Signature dynamics

The Biometric importance

The security is needed in every place.

Alleviate the existing problems, Like those which can be taken, stolen, borrowed or even forgotten.

The Biometric importance (Cont.)

Improves convenience, security, and privacy.

The first and most critical link in the security chain.

presented to counteract security threats.

Biometrics History

The term "biometrics" is derived from the Greek words

(life) and metric means (to measure).

bio which means

Biometrics History (Cont.)

the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century.

Biometrics History (Cont.) In the 1890s, 'Bertillonage', created a method of bodily

measurement with the criminals who repeated the crimes with different names and looks.

Biometrics History (Cont.)

After this, finger printing, which was developed by Richard Edward Henry of Scotland Yard.

Biometrics Process

No

Yes

BiometricData Collection

TransmissionQuality

Sufficient?

Yes

Template Match

Signal Processing, Feature Extraction,

Representation

Database

Generate Template

DecisionConfidence?

new biometric sample is requested. No

Physical Characteristics

Fingerprint Recognition:

Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual.

Database

Fingerprint Recognition steps:

Face Recognition: Face recognition uses the visible physical

structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual.

Face recognition process:

Database

Input face image

Extraction of face image

Extraction of face features

Positive

negative

Iris Identification: The iris is the colored ring of textured tissue

that surrounds the pupil of the eye.

Iris Identification Steps:

Database

Input of face image

Detection of eye regions

Put iris in focusRecognition of

iris pattern

accept

reject

Veins Recognition:

Venial Recognition: A system for Identification using a person’s unique vein patterns.

Veins as a biometrics tool involve the measurement of the blood vessels on the back of your hand.

Vein Recognition System:

Database

Input of palm picture

The output picture

Generate veins structure

match

Not match

Behavioral Characteristics

Voice Recognition:

Voice Recognition: is the Identification using the acoustic features of speech that have been found to differ between individuals.

Voice Identification System

Database

Construct voice reference template

Signature Identification:

Signature identification: is the analyses of the way a user signs his or her name.

The process used by a biometric system to verify a signature is called dynamic signature verification (DSV).

• the angle at which the pen is held,

• the number of times the pen is lifted,

• the time it takes to write the entire signature,

the pressure exerted by the person while signing,

the variations in the speed with which different parts of the signature are written.

Signature Verification Process (Cont.)

Biometric trait

Signature Verification Process

Database

Profile

Movies to Real World

Applications of Biometric

Applications of Biometric

Access control :• Disney World (fingerprint scanner).

• Child day care centers ( hand geometry systems )

Applications of Biometric (Cont.)

Time and attendance management:• Hospitals (hand geometry systems)

Other Applications

Airports:• Heathrow airport (iris recognition)

ATMs:• (face recognition)

Other Applications (Cont.)

Pc access: • GM and Hertz (voice identification technology)

to protect their computer facilities.

• Fujitsu has developed a mouse that can verify a person's identity by recognizing his pattern of blood veins.

Other Applications (Cont.)

Prisons: Fujitsu has developed a mouse that can verify a

person's identity by recognizing his pattern of blood veins.

Advantages of biometrics

1. Uniqueness

2. Universality

3. Permanence

4. Measurability

5. User friendliness

6. Accuracy

7. Comfort

Disadvantages of Biometrics

1. costly.

2. Facial imaging can also hinder accurate identifications.

3. Missing body part problem.

Disadvantages of Biometrics (Cont.)

4. False acceptances and rejections.

5. The amount of comfort.6. The scanning of eye is fearful.

7. The nervousness that people feel about the scanners identification.

Future Prospects

Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are:

1. Ear shape identification.

2. Body odor identification.

3. Body salinity identification.

4. EEG Fingerprint

5. DNA matching

Conclusion

Not perfect yet.

Successful applications.

Decreasing costs and increasing

convenience.

Increasing both privacy and identity security.

The field of biometrics is evolving.

Benefit from this technology .

References:

•The Biometric Consortium - http://www.biometrics.org/ •National Institute of Standards and Technology - http://www.nist.gov/ •The Biometric Catalog - http://www.biometricscatalog.org/ •ITPro - http://www.computer.org/ •Georgia Institute of Technology - http://www.gatech.edu/•http://www.biometricgroup.com/abio1/technology/researchtechnology.htm•http://www.conspiracyarchive.com/images/biometrics.jpg•http://www.information-security-topics.org/information_security_index/Vhttp://www.bromba.com/faq/fpfaqe.htm

top related