a86eseminar on biometrics

Post on 20-Jan-2015

2.207 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

A SEMINAR ON

BIOMETRICS FOR RECOGNITION

Submitted by-:Priyanka sehgalBCA-6-A80103219052Submitted to-:Mrs Jyoti Sharma

Presentation Outlines

Traditional methods of security

Need for biometrics

Biometrics recognition techniques

How biometrics work

Applications

INTRODUCTION

• ATMs• Cellular phones• Smart cards• Desktop PCs• Workstations• Computer networks

PINs and passwords may be forgotten,

Token-based identification methods such as passports and driver’s licenses may be forged, stolen, or lost.

TRADITIONAL SECURITY METHODS

Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics .

WHAT IS BIOMETRICS ?

• BIO-Physical or Behavioral

• METRICS-To measure characteristics

Physical biometrics:

Fingerprint Facial recognition/face location Hand geometry Iris scan Retinal scan

Fingerprint recognition

Steps to Facial Recognition

1.Capture image

2. Find face in image

3. Extract features (store template)

4. Compare templates

5. Declare matches

Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers.

Hand Geometry

Iris recognition

Iris scanning measures the iris pattern in the coloured part of the eye,

RETINAL SCAN

Behavioral biometrics:

Speaker/voice recognition: Analyzing vocal behaviorSignature/handwriting: Analyzing signature dynamics Keystroke/patterning: Measuring the time spacing of typed words

Signature Verification : an automated method of measuring an individual’s signature. This technology examines speed,direction, and pressure of writing; the time that the stylus is in and out of contact with the “paper.

Speaker / Voice Recognition:Voice or speaker recognition uses vocal characteristics to identify individuals. A telephone or microphone can serve as asensor,

Keystroke Dynamics:

Keystroke dynamics is an automated method of examining an individual’s keystrokes on a keyboard.

This technology examines such dynamicsas speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys.

Prevent unauthorized access to ATMs, Cellular phones, Smart cards, Desktop PCs, Workstations, Computer network.Criminal identification,prison security.Electronic commerce,Electronic banking.Airport security,voter cards,civilian applications.

APPLICATIONS

Conclusion:

Biometric is an emerging area with many opportunities for growth.

Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past.

top related