Top Banner
By- Sachin Yadav I.T. 3 rd year Biometrics
24
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Biometrics

By-

Sachin Yadav

I.T. 3rd year

Biometrics

Page 2: Biometrics

The term "biometrics" is derived from the Greek

words bio (life) and metric (to measure).

In other words we can say that biometrics are technologies for measuring and analyzing a person's physiological or behavioral characteristics. These characteristics are unique

to individuals hence can be used to verify or identify a person.

INTRODUCTION

Page 3: Biometrics

Based on Passwords, or ID/Swap cards

Can be Lost. Can be forgotten. Worse! Can be stolen and used by a thief/intruder to access your data,

bank accounts, cards etc….

Problems with current securitysystems…

Page 4: Biometrics

Face recognitionFingerprintVoice recognitionPalm print Hand GeometryIris recognitionRetina ScanDNA Signatures Gait recognitionKeystroke

Some Examples of DifferentBiometrics

Page 5: Biometrics

Effectiveness

Criteria for selecting a biometrics system

Page 6: Biometrics

Effectiveness : The basic measure of any authentication

solution is accuracy . Improper rejection of individuals who should have been successfully authenticated. It results in user frustration and time lost in reauthenticating must still be part of the measurement of overall effectiveness.

Criteria for selecting a biometrics system

Page 7: Biometrics

Effectiveness Ease of deployment and use

Criteria for selecting a biometrics system

Page 8: Biometrics

Ease of deployment and use : No technology can be effective unless and

until Its operational and in regular use . The solution should be easy to deploy and maintain & shouldn’t require significant changes to business processes.

Criteria for selecting a biometrics system

Page 9: Biometrics

Effectiveness Ease of deployment and useEnterprise-wide capability

Criteria for selecting a biometrics system

Page 10: Biometrics

Enterprise-wide capability : while an organization may deploy an

authentication solution to meet a single need today . It make sense early in the selection process to look at where and how the use of biometrics expanded to meet future needs .

Criteria for selecting a biometrics system

Page 11: Biometrics

Effectiveness Ease of deployment and useEnterprise-wide capabilityEconomic consideration

Criteria for selecting a biometrics system

Page 12: Biometrics

Economic consideration : Keeping cost under control is important

even when budgets aren’t under the strain they are today .

Criteria for selecting a biometrics system

Page 13: Biometrics

Commercial applications such as computer network login , electronic data security , e-commerce, internet access, ATM , credit card, physical access control, medical records management and distance learning.

Government applications such as national ID cards, driver’s license , social security , border control and passport control.

Forensic applications such as corpse identification , criminal investigation and missing children.

Biometrics airport security devices are also deployed at some of the world’s famous airport to enhance the security standards.

Applications of biometrics system

Page 14: Biometrics

a) Finger print verification system : - Manufactured by Digital persona - Used for Computer & network login. b)Fingerprint based point of sale (POS) terminal : - Manufactured by Indivos. - Verifies the customers before charging their credit cards & speed up payment in retail shops , restaurants & cafetrias .

Page 15: Biometrics

c) Finger print based door lock -Manufactured by Bio thentica d) Immigration & Naturalization service accelerated service system (INSPASS) - Which is installed at major airports in U.S. is based on hand geometry verification technology.

Page 16: Biometrics

e) Border passage system using iris recognition at london's heathrow airport.

f) Ben Gurion airport in Tel Aviv(Israel) - Uses express card entry kiosk fitted with Hand geometry System for security and immigration .

Page 17: Biometrics

Identification:– Match a person’s biometrics against a database to figure out his identity by Finding the closest match .– Commonly referred to as 1:N matching– ‘Criminal Watch-list’ application scenarios .

Applications and terminology

Page 18: Biometrics

Verification:– The person claims to be ‘John’, system must match and compare his/hers biometrics with John’s stored Biometrics.– If they match, then user is ‘verified’ or authenticated that he is indeed ‘John’– Access control application scenarios.– Typically referred as 1:1 matching

Applications and terminology

Page 19: Biometrics

1) Iris-based ATM

2)Smart card with fingerprints

3)Fingerprint at check-out counter

4)Face scan at airports

Page 20: Biometrics

Advantages of biometrics systemEnhanced securityCan’t copiedCan’t be share Convenience/controlAccuracyCan’t be lostReduced paper workCosts

Page 21: Biometrics

1) Recognition errors : There are two types of recognition errors first

is False accept rate (FAR) and second is False Reject rate (FRR). A false Accept is when a non matching pair of biometrics data is wrongly . False Reject is when a matching pair of biometrics data is wrongly rejected.

2) Compromised biometric data : Paradoxically , the greatest strength of

biometrics is at the same time its greatest liability. The pattern such as Iris , Retina or palm vein remain the same throughout your life. So user has a limited no. of biometric features.

Issues related to Biometrics system

Page 22: Biometrics

3) Attacks : There are so many Ways to bypass

biometrics system Such as presenting fake biometrics or a

copy at sensor for instance a fake finger or fake mask .

Issues related to Biometrics system

Page 23: Biometrics

ANY QUERY !

Page 24: Biometrics

THANK YOU