Top Banner
BIOMETRICS Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 1 PAPER PRESENTATION ON “BIOMETRICS” AT VADU COLLEGE JUTH KELAVANI MANDAL SANCHALIT College Of Computer & Management Studies, Vadu BY CHAUHAN SALMANKHAN V. SYBCA ROLL No. 217 MERCHANT COLLEGE OF MANAGEMENT STUDIES & RESEARCH, VISNAGAR
18

BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

Mar 10, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 1

PAPER PRESENTATION ON

“BIOMETRICS”

AT

VADU COLLEGE JUTH KELAVANI MANDAL SANCHALIT

College Of Computer & Management Studies, Vadu

BY

CHAUHAN SALMANKHAN V.

SYBCA ROLL No. 217

MERCHANT COLLEGE OF MANAGEMENT STUDIES & RESEARCH, VISNAGAR

Page 2: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 2

“Biometrics Authentication Offers One Of The Highest Levels Of Security In Regards To User Verification.”

WHAT IS BIOMERTRIC ?

"Biometics" come from the Greek words "bio"èèèè life and "metric" èèèèto measure.

-Biometric is the technique of using unique, non-transferable, physical characteristics, such as fingerprints, iris, retina, face recognition etc. to gain entry after personal identification. -This replaces pin codes and passwords, which can be forgotten, lost or stolen. Biometric IDs are the ID’s that are non-transferable. -Biometric measure individual’s unique physical or behavioral characteristics to recognize or authenticate or to grant their identity. -Biometric involves directly the human being for the identification or verification. -Traditionally many security systems employ the verification technique rather than the identification which is the main aim of Biometric. -Although it doesn’t totally remove the pin/password but with that tool it provide a very strong security system. -Biometric is technology used for measuring and analyzing a person's unique characteristics.

Page 3: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 3

THE SECURITY FIELDS USES THREE DIFFRENT TYPES OF AUTHENTICATION:

ð Something you know—a password, PIN, or piece of personal information (such as your mother's maiden name)

ð something you have—a card key, smart card, or token (like a Secured card)

ð Something you are—a Biometric

CHARACTERSTIC GOVERNIG THE BIOMETRICS :

Uniqueness – How well the biometric separates individually from another.

Performance – How well a biometric resists aging.

Collectability – Ease of acquisition for measurement.

Performance – Accuracy, speed, and robustness of technology used.

Acceptability – Degree of approval of a technology.

Circumvention – Ease of use of a substitute.

Biometric characteristics can be divided into two main categories:

(i)Psychological

(ii)Behavioral.

(i) Physiological are based on the shape of the body. Fingerprints are one of the Physiological

Page 4: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 4

traits that have been used for more than 100 years. Other physiological traits are face recognition, hand geometry and iris recognition.

(ii) Behavioral characteristics are related to the behavior of a person. The signature is a widely used form of identification and verification. Other behavior approaches are voice recognition and keystroke behavior. Other biometrics being researched and developed are based on retina, hand veins,faciial thermo gram that is face recognation, and palm prints.

A Biometric System Is An Automated System Capable Of:

1. Capturing a Biometric sample from an end user

2. Extracting and processing the Biometric data from that sample

3. Storing the extracted information in a database

4. Comparing the Biometric data with data contained in one or more reference

Page 5: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 5

5. Deciding how well they match and indicating whether or not an identification or verification of identity has been achieved.

USE OF BIOMETRIC:

Biometric is used for identification and verification

Identification:

It is determination who the person is. It involves trying to find a match for a person's Biometric data in a database containing records of people and that characteristic. This method is time demanding and a large amount of processing power, especially if the database is very large is also required.

Verification:

It is determination if a person is really they say they are. It involves comparing a user's Biometric data to the previously recorded data for that person to ensure that this is the same person. This method requires less processing power and time, and is used for access control (to buildings or data).

TYPES / METHODOLOGIES USED IN BIOMETRICS:-

1. RETINA

2. IRIS

3. FACE

4. SIGNATURE

5. HAND RECOGNITION

Page 6: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 6

6. FINGERPRINT VERIFICATION

1. RETINA

PRINCIPLES OF RETINA BIOMETRIC

-The blood vessels at the back of the eye differs from eye to eye and person to person and thus they have a unique pattern

HOW DOES RETINA BIOMETRIC WORKS ?

-Retina scans require that the person removes their glasses, place their eye close to the scanner, stare at a specific point,and remain steady, and focus on a specified location for approximately 10 to 15 seconds until the scan is completed.

Page 7: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 7

BENIFITS OF RETINA BIOMETRIC SYSTEMS

-Highly accurate

APPLICATIONS OF RETINA BIOMETRIC

-Retina Biometric systems are suited for environments requiring maximum security, such as Government, military and banking. Retina Biometric systems have been in use for military applications since the early 70’s .

2. IRIS

Page 8: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 8

PRINCIPLES OF IRIS BIOMETRIC

-It is the only internal human organ visible from the outside and is protected by the cornea.

-The iris of the eye has a unique pattern, from eye to eye and person to person.

HOW DOES IRIS BIOMETRIC WORKS ?

-Glasses, contact lenses, and even eye surgery does not change the characteristics of the iris.

-To prevent an image / photo of the iris from being used instead of a real "live" eye, iris scanning systems will vary the light and check that the pupil dilates or contracts.

BENIFITS OF IRIS BIOMETRICS

-Highly accurate: There is no known case of a false acceptance for iris recognition

- Not intrusive and hygienic - no physical contact required

DRAWBACKS OF RETINA BIOMETRIC SYSTEMS

-The user must hold still while the scan is taking place

APPLICATIONS OF IRIS BIOMETRIC SYSTEMS

-Applications include: Identity cards and passports, border control and other Government programmes, prison security, database access and computer login, hospital security, schools, aviation security, controlling access to restricted areas, buildings and homes.

Page 9: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 9

3. FACE

PRINCIPLES OF FACE BIOMETRIC SYSTEMS

-The dimensions, proportions and physical attributes of a person's face are unique.

Page 10: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 10

HOW DOES FACE BIOMETRIC SYSTEMS WORKS ?

- Biometric facial recognition systems will measure and analyze the overall structure, shape and porportions of the face: Distance between the eyes, nose, mouth, and jaw edges; upper outlines of the eye sockets, the sides of the mouth, the location of the nose and eyes, the area surrounding the cheekbones.

- To prevent an image / photo of the face or a mask from being used, face Biometric systems will require the user to smile, blink, or nod their head. Also, facial thermographs can be used to record the heat of the face (which won't be affected by a mask).

-The main facial recognition methods are: feature analysis, neural network, eigenfaces, and automatic face processing.

BENIFITS OF FACE BIOMETRIC SYSTEMS

-Not intrusive, can be done from a distance, even without the user being aware of it (for instance when scanning the entrance to a bank or a high security area).

DRAWBACKS OF FACE BIOMETRIC SYSTEMS

-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's face by wearing a mask, a nose extension, etc.

- User perceptions / civil liberty: Most people are uncomfortable with having their picture taken.

APPLICATIONS OF FACE BIOMETRIC SYSTEMS

-Access to restricted areas and buildings, banks, embassies, military sites, airports, law enforcement.

Page 11: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 11

4. SIGNATURE

HOW DOES SIGNATURE BIOMETRIC SYSTEM WORKS ?

-Biometric signature recognition systems will measure and analyze the physical activity of signing, such as the stroke order, the pressure applied and the speed.

-Some systems may also compare visual images of signatures, but the core of a signature Biometric system is behavioral, i.e. how it is signed rather than visual, i.e. the image of the signature.

BENIFITS OF SIGNATURE BIOMETRIC SYSTEM WORKS

-While it is easy to copy the image of a signature, it is extremely difficult to mimic the behavior of signing

-Low False Acceptance Rates (FAR)

- People are used to sign documents, so signature recognition systems are not perceived to be invasive

WEAKNESSES OF SIGNATURE BIOMETRIC SYSTEM WORKS

-People may not always sign in a consistent manner

Page 12: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 12

APPLICATIONS OF SIGNATURE BIOMETRIC SYSTEM WORKS

-Access to documents, contract / agreement execution, acknowledgement of goods or services received, banking services

5. HAND RECOGNITION

PRINCIPLE OF HAND BIOMETRIC

-An individual's hand does not significantly change after a certain age. Unlike fingerprints, the human hand isn't unique. Individual hand features are not descriptive enough for identification. However, hand Biometric recognition systems are accurate for verification purposes when combining various individual features and measurements of fingers and hands.

Page 13: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 13

HOW DOES HAND BIOMETRIC SYSTEM WORKS ?

-Biometric hand recognition systems measure and analyze the overall structure, shape and proportions of the hand. e.g. length, width and thickness of hand, fingers and joints; characteristics of the skin surface such as creases and ridges

-As hand Biometric rely on hand and finger geometry, the system will also work with dirty hands

-The device checks its database for verification of the user.

- The process normally only takes a few seconds to enroll, the users places his or her hand palm down on the reader's surface.

Benefits of hand Biometric systems

-Easy to use

DRAWBACKS OF HAND BIOMETRIC SYSTEM

-Lack of accuracy, so it can only be used for verification

-Fairly expensive, compared with fingerprint systems

APPLICATIONS OF SIGNATURE BIOMETRIC SYSTEM

-Hand Biometric systems are currently among the most widely used Biometric technologies.

-Time and attendance

-Access to restricted areas and buildings: Hand Biometric systems are currently used in apartment buildings,

Page 14: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 14

offices, airports, day care centers, welfare agencies, hospitals, and immigration facilities

4. FINGERPRINT VERIFICATION

HOW DOES FINGERPRINT BIOMETRIC WORKS ?

-The main technologies used to capture the fingerprint image with sufficient detail are optical, silicon, and ultrasound.

-Minutia matching compares specific details within the fingerprint ridges. At registration (also called enrollment), the minutia points are located, together with their relative positions to each other and their directions. At the matching stage, the fingerprint image is processed to extract its minutia points, which are then compared with the registered template.

BENIFITS OF FINGERPRINT BIOMETRIC SYSTEM

-Easy to use Cheap Small size Low power Non-intrusive Large database already available

Page 15: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 15

APPLICATINONS OF FINGERPRINT BIOMETRIC SYSTEM

-Fingerprint sensors are best for devices such as cell phones, USB flash drives, notebook computers and other applications where price, size, cost and low power are key requirements.

-Fingerprint Biometric systems are also used for law enforcement, background searches to screen job applicants, healthcare and welfare.

FUTURE OF BIOMETRIC

- Biometrics holds a great promise for private, public and governmental agencies. The reality is that biometrics is the future of the security industry and is quickly becoming recognized as the most accurate identification technology in the market. Developers of biometric technology continue to search for easier and cost-effective means to secure user implementation. Companies adding biometrics to enhance the security of e-business systems hope to add value to user verification while maintaining customer satisfaction and accuracy. Biometrics products are becoming more flexible, capable of serving different purposes, or being used in tandem, accomplishing more than authentication.

STANDARDIZATION:

-Standards are emerging to provide a common software interface, to allow sharing of Biometric templates, and to permit effective comparison and evaluation of different Biometric technologies. Another draft standard is the Common Biometric Exchange File Format, which defines a common means of exchanging and storing templates collected from a variety of Biometric devices.

Page 16: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 16

HYBRID TECHNOLOGY:

-One of the more interesting uses of Biometric involves combining Biometric with smart cards and publickey infrastructure (PKI). Vendors enhance security by placing more Biometric functions directly on the smart card. Some vendors have built a fingerprint sensor directly into the smart card reader, which in turn passes the Biometric to the smart card for verification. PKI uses public- and private-key cryptography for user identification and authentication. It is mathematically more secure, and it can be used across the Internet.

CONCLUSION:

-At its infancy, current Biometric technology is still considered immature to completely replace password and other authentication schemes. Security wise, Biometric technology shows vulnerabilities that can be easily exploited for wrongful purposes. Biometric itself is by nature complicated and distinctively secured to each unique identity. It is the imperfect design of the system and its elements that produces the security holes. Hence, to achieve higher security performance, the design of Biometric system should take into consideration the possible vulnerabilities of the processes and algorithms of the system for the whole life cycle, namely data collection, data transmission, storage, templates comparison and susceptibility of the system to physical human attack. Another challenge confronting Biometric is the fact that people are not ready to accept the technology in its etenity. Due to the far-reaching impact of Biometric data misuse, any irresponsible use of the technology could be destructive to the society and would certainly compromise the privacy rights of people. Thus, regulations are needed to control and manage the implementation of Biometric. 3-factors authentication,

Page 17: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 17

microchip implantation and DNA profiling are among the many that deserve attention. Although the challenges confronting Biometric are many, none of these is going to stop the progress of Biometric being used as authentication and identification tools. This is not the time to argue whether Biometric should be used widely or not in the future. A wiser approach would be to prepare the people mentally and psychologically for the new technology, make further improvements to the technology itself and think of how to properly use Biometric for everybody’s benefit.

REFERENCES:

http://www.biomatricnewsportal.com/biomatrics_definition.asp http://www.biomatricgroup.com/reports/public/reports/biomatric_definition.html http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=74

http://www.cippic.ca/biomatrics/

http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=72 http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=72 http://www.wepapers.com/tags/Biomatrics http://www.sciencedaily.com/gallery/matter_energy/biomatric/

DNA BIOMETRICS by SANDRA MAESTRE

Page 18: BIOMETRICS – MERCHANT COLLEGE OF …...-Face Biometric systems are more suited for authentication than for identification purposes, as it is easy to change the proportion of one's

BIOMETRICS

Presented by: Chauhan SalmanKhan V. (MCMSR, Visnagar) Page 18

IMAGES REFERENCES:

http://www.defenseindustrydaily.com/images/MISC_Fingerprint_Biometric_DSU_lg.jpg

http://openpit.files.wordpress.com/2009/10/biometrics.jpg

http://www.theage.com.au/ffximage/2007/09/01/BIOMETRICS_narrowweb__300x360,0.jpg

http://misbiometrics.wdfiles.com/local--files/start/Biometrics_traits_classification[1].png

http://images.inc.com/inctechnology/security/20070305.jpg

http://www.homeland1.com/data/biometrics.jpg

http://w1.siemens.com/press/pool/de/pressebilder/2009/photonews/300dpi/pn200907/pn200907-04_300dpi.jpg