Biometrics
Biometrics
Welcome To Group 4Our group membersP.M.G.W.N. Bandara IT79D.M.C.C. Disanayake IT64W.P.R.M. Lahiru IT69W.R. BerengerIT67ShamikaIT80Sameera WijekumaraIT76What is BiometricsDefinition:Automated measurement of Physiological and/or behavioral characteristics to determine or authenticate identity
Biometrics is a security solution based on something you know, have, and are:KnowPassword, PINHaveKey, Smart CardAreFingerprint, Face, Iris
Automated measurementNo human involvement.Comparison takes place in Real-Time.DNA is not a Biometric
Physiological and/or behavioral characteristics
Behavioral:
User speaks.Signs name
Physiological:
FingerprintHandEyesFace
determine or authenticate identity
Verification Systems
More accurate.Less expensive.Faster.More limited in function.Requires more effort by user.
Biometrics HistoryThe earliest form of Biometrics appeared on the scene back in the 1800'sbiometrics system have only become available over the last few decades , due to significant advances in the fields of computer processing many of these few automated techniques , however , are based in ideas that were originally conceived hundreds , even thousands of years ago. Bertillon estimated that the odds of duplicate records were 286,435,456 to 1 if 14 traits were used. This was the primary system of criminal identification used during the 19th century.
Biometrics HistoryIntroduction
Why Biometrics?Why Biometrics?Passwords are not reliable.Too many Can be stolenForgottenProtect Sensitive InformationBankingMedical
Biometrics-ApplicationsCell phones, Laptops, Work Stations, PDA & Handheld device set.
2.Door, Car, Garage Access
3.ATM Access, Smart card
Biometrics-enabled Authentication Applications
Image Source : http://www.voice-security.com/Apps.html
Biometrics-enabled Identification ApplicationsCriminel Trackinge.g. Fingerprints, DNA Matching
Car Park Surveillance
Frequent Customer Tracking
Application by TechnologiesBiometrics
Vendors
Market Share
Applications
Fingerprint
90
34%
Law enforcement; civil government; enterprise security; medical and financial transactions
Hand Geometry
-
26%
Time and attendance systems, physical access
Face Recognition
12
15%
Transaction authentication; picture ID duplication prevention; surveillance
Voice Authentication
32
11%
Security, V-commerce
Iris Recognition
1
9%
Banking, access control
Commercial ProductsThe HeadThe EyeThe FaceThe VoiceEye-DentifyIri ScanSensarIridianVisionicsMiros
INTELLiTRAKQVoiceVoicePrint NuanceThe HandThe FingerprintHand GeometryBehavioralIdentixBioMouseThe FingerChipVeridicomAdvanced BiometricsRecognition SystemsBioPasswordCyberSignPenOpOther InformationBertillonageInternational Biometric GroupPalmistry16Source: http://library.thinkquest.org/28062/link.html
Biometric Authentication Percentages By Chris DeVoney & David Hakala, Sm@rt Partner http://www.zdnet.com/sp/stories/issue/0,4537,2664300-8,00.htmlHow biometric workHow biometric workBiometrics work by recording and comparing biometric characteristics.There are two type for biometric recognition
IdentificationVerification
IdentificationIt mean identify and analyze the humane unique characteristic. It can divided in two types
BehavioralPhysiologicalIdentify Methods
FingerprintFace RecognitionSignatureIris ScanHand
VerificationFirstly collects data and information convert to digital format.
Then process the information and keep it. Because that need to compare with new biometric data
After check and compare with new biometric data with data storage.
Finally recognize whether that information are real
E.g.- In ATM machine verify your pass word or finger mark & If it is true then you can withdraw money.
Bio metrics devicesBio metrics devicesThere are many types of bio metrics devicesCommonly using 5 types of devicesIris scannerFinger print scannerFacial BiometricsVoice RecognitionOther
iris scannerThis scanner use for identify humens iris
Finger print Scanner
Private and government sectors is using Finger print devicesEarlier days used ink and paper method
Facial Biometrics
Each and every persons have different and unique face.Use series of images for identify persons
Voice Recognition
Some computer systems have voice recognition methodVoice recognition is not the same as speech recognition, it is speaker recognition
Other
Biomatrix...FINGERPRINTS
ADVANTAGESA long-used method that is familiar and generally quick perform. Fingerprints are unique. A set of 10 prints yields highly accurate results. Cheap and easy to use.
DISADVANTAGES
Some people have poor prints because of injury,age, disease or occupation. Requires physical contact with a sensor and may have negative connotations because of use by lawenforcement.
HAND GEOMETRY..ADVANTAGES.
Fast and easy to use. Rugged and works welloutdoors.
DISADVANTAGES.Not suited for picking someone out of a large group. Sensors are large and relatively expensive
SPEECHVERIFICATION.ADVANTAGES.
Can use standard microphone or telephone handset and existing telephone lines.
DISADVANTAGES
Background noise, illness or stress can affect voice samples. Most accurate if similar instruments capture voice samples at enrollment and verification points. Not suited for picking someone out of a large group.
Thank You!!