Top Banner
Presented by P.Srinivas ( 07W81A0542) M.Anusha (07W81A0507) A PAPER A PAPER PRESENTATION PRESENTATION ON ON BIOMETRICS TECHNOLOGY BIOMETRICS TECHNOLOGY Presented By: Seetu mishra cse: 2nd yr Arjun college of tech & science
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Seetu

Presented byP.Srinivas ( 07W81A0542)M.Anusha (07W81A0507)

A PAPER PRESENTATIONA PAPER PRESENTATION ONON

BIOMETRICS TECHNOLOGYBIOMETRICS TECHNOLOGY

Presented By:Seetu mishracse: 2nd yrArjun college of tech & science

Page 2: Seetu

1.Introduction2.Security and Authentication3.Methods of verification

1. Psychological verificationa) Finger Printb) Hand Print.c) Face Measurement.d) Retinal Scanninge) DNA Analysis.

• Behavioral verification1. Typing.2. Signature.3. Voice.

a)Identification.b)Applications.c)Advantages .d)Limitations.e)Conclusion.f)1st UID project in maharastrag)References

Page 3: Seetu

1. Biometrics is derived from the conjunction of the Greek words bios and metrics that mean life and to measure respectively.

2. Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity.

3. A Biometrics system is actually a pattern recognition system that utilizes various patterns like iris patterns, retina patterns and biological traits like fingerprints, facial geometry, voice recognition and hand recognition etc….

Functionality of Biometric device:1. First , it checks whether we are who we claim we are

i.e. It sets off to verify our identity.2. Second, it tries to find out who we are, i.e. It sets off to

establish an identity.3. Biometrics goes far from the traditional systems and

thus helps in tightening internet security

Page 4: Seetu

Authentication is the process of Giving PermissionsExample:-Microsoft SQL Server uses permissions to enforce database securitySQL Server's permissions system recognizes four types of users: the SA, database owners, database object owners, and other users of the database.

Page 5: Seetu

Methods of Verification

Psychological verificationPsychological verification

Behavioural verification Behavioural verification

Page 6: Seetu
Page 7: Seetu

Fingerprint:Fingerprint:It involves the user placing his finger over a glass-plate, which resides over a high-resolution camera, which uses optical or electromagnetic means to take its snapshot. The software analysis your finger for pattern such as loops, worls and arches

Pros:a. This technology is neither too expensive nor does it require extensive user training.

b. It also simple to implement.c. Finger print system has FAR<0.5%d. It is oldest known technique that is still used in criminal records and forensic. 

Cons:1.Any injures of fingers effect more. 

Page 8: Seetu

Hand print:

It compares a 3D image of the users hand to that present in the system database. It is somewhat similar to finger print verification.

Pros:a. Accuracy is better than

fingerprint.b. Cheap and easy to deploy.

 Cons:a) Complex in usage.b) Implementation is expensive.c) Any damages to hand effect

more.Applications:

San Francisco International AirportImmigration facilitiesDay Care Centers

Page 9: Seetu

Face measurement:

Measuring this is as simple as taking a picture and analyzing the image from a security video capture. This technique enables the computer to use your face as your password and matching these to an existing database

Pros:a. Mot continents at public

places.creams also effect the measurements.

b. Less expensive. 

Cons:Inaccurate is affected by changes in lighting, age, and movement, glass.Face

 

Page 10: Seetu

Retinal scans:Retinal scans:

It involves imaging of the blood vessels in the retina of the eye when infrared light of a certain frequency and wavelength is incident upon it.this energy is absorbed by the blood vessels is different in different individuals.  The retinal iris patterns are unique to individuals than any biometric yet devised. 

The retina is an internal part of the eye located at the back of the eye and is get of thin nerve which sense the light coming through a camera, pupil, eye lenses.  The pattern of blood vessels which makeup retina are unique to each individual i.e., <1.2 inch.

Page 11: Seetu

Pros:a. Accurate with no false match in 2 million

people.b. It s sophisticated process.

 Cons:Expensive, difficult to deploy and use.Focus of light effect measurements.

 

Retinal scans:

Applications:High-end security: military, power plans

Page 12: Seetu

DNA Analysis: It involves in checking the DNA pattern

of a human used when physical characteristics are unrecognizable. It is used to identify people, who are died, to find out the relationship like identifying Childs natural parents. 

This is one Biometric that is judicially accepted. No human have identified DNA patterns except in twins. Advantages:

a. DNA samples can be collected from toothbrush, clothes. Disadvantages:

DNA testing takes longer time than other methods.Twins have same DNA.Researchers produce same DNA.

Page 13: Seetu
Page 14: Seetu

Typing:Some systems measure things you do in addition to the things you are, you will notice that your typing has a certain pattern. Some letters follow others in quick succession, while others take longer.

Software called Bio password is available for less than $100.It integrates with Windows 2000.Windows NT.Login to provide this authentication without the need for any additional software. This measure is a behavioral characteristic of a person.

Page 15: Seetu

Some qualities looked into include acceleration rates, direction, and pressure and stroke length. Here mainly concentrate on pressures. This pressures stored in back end for future significations.  Disadvantages:

a. The disadvantage with the technology lies in the randomness or the consistency with which a user makes his signature. If pressures are not tally with stored pressure in the database

Signature:

ApplicationsAccess to documentsExecution of contractsBanking services

Page 16: Seetu

It involves in the recognition of the voice of the individual. Pros:It is inexpensive.It also works through telephone.Some person mimicry with other person voices.Cons:

a. One can mimic the voice of the individual. Biometric does not guarantee security. It simply offers ore convenient and reliable means of identification and authentication

Voice

Applications:Call CentersLaw enforcement – house arrest authenticationElectronic commerceCustomer authentication for service calls

Page 17: Seetu

Percentage Of Usage Of VerificationsPercentage Of Usage Of Verifications

Page 18: Seetu

It is a process of recognition and involves taking the biometric data and searching for the match in the database asking it a slow process that it is more prone to errors. It involves confirming your identity and the biometric systems have to match your data with only one, single record.

Depending on the technique used, Biometric have varying levels of accuracy .The system might let you pass in one attempt on Monday and require five on Tuesday.

The accuracy of any biometric system is measured in terms of FAR and FRR.

FAR (False Acceptance Rates):Where an imposer is accepted as a match. It is a probability of falsely

accepting a metric as a match.

FRR (False Rejection Rates):Where a legal match is denied. Where the system sails to recognize an

authentic Bio-signature.As FRR increases, the FAR goes down and vice versa.

Almost all biometric systems can be adjusted to varying levels of strictness to create a variation in FAR and FRR. For a system to be successful, both have to be with in acceptable low limits.

Identification 

Page 19: Seetu

Applications

Computer networksComputer networks

Cellular phone

industry

Internet Banking

Multi national

companies

Voting Solutions

Network security and authenicatio

n

Network security and authenicatio

n

Page 20: Seetu

Advantages

1. It provide good security mechanism than all other security methods

2. It never fails in security constraints.3. In public locations such as banks and airports a large number

of people transit every day including known criminals. 4. Face recognition systems attached to video surveillance

systems are supposed to help catch them.

Page 21: Seetu

1st UPI PROJECT IN MAHARASTRA

The worlds first ID project on biometric data is used to provide unique identification numbers for India billion plus citizens rolled out on Wednesday with prime minister Man Mohan Singh & UPS chief Sonia Gandhi. Handling over the 1st set of 12 digit no to 10 tribals .It is a biometric based data including from fingerprint & iris scan is being used 1st time in the world to provide cost effective, nationally valid & verifiable single source of id proof through an authentication infrastructure.

Page 22: Seetu

Limitations

1. It needs high memory space in the back end.

2. Collect data for security is difficult3. Some times fails the security with right

users4. Any time data loose in database high

effect for security mechanism.5. So many equipments are needed for

provide this technology.6. It highly expensive

Page 23: Seetu

Conclusions

Security is not just about putting big locks on the front door; it also involves making sure all the windows are shut.

Each one can be individually fooled, but the comparison makes the system more secure as a whole.

Biometrics are have its own advantages and disadvantages. It high expensive but it provide good security.

Money is not important than security. It is more useful for confidential maters.  

Page 24: Seetu

i. http://Biometrics.com

ii.http://whitepapers.com

iii.http://www.milesresearch.com

iv.http://microsoft/biometrics.com

v.D.c paper 30th september 2010

References

Page 25: Seetu