biometrics secure world
Post on 08-Apr-2018
223 Views
Preview:
TRANSCRIPT
-
8/7/2019 BIOMETRICS SECURE WORLD
1/18
BIOMETRICS SECUREBIOMETRICS SECURE
WORLDWORLD A scientific technique to study handA scientific technique to study hand
geometry,fingerprints,Eye structuregeometry,fingerprints,Eye structure
,voice recognition etc, use for individuals,voice recognition etc, use for individualsidentification.identification.
Conventional system access using fewConventional system access using few
digit password is easier todigit password is easier to
crack as user have some basic computercrack as user have some basic computer
knowledge.knowledge.
-
8/7/2019 BIOMETRICS SECURE WORLD
2/18
Difficult to fake without help ofDifficult to fake without help of
owner.owner.
Easier to access as not require toEasier to access as not require toremember long sequenceremember long sequence
number,only put finger tip on sensor.number,only put finger tip on sensor.
This can be used in yourThis can be used in your
laptops,vehicles,home ,office,RNDlaptops,vehicles,home ,office,RNDorg,research lab etc.org,research lab etc.
-
8/7/2019 BIOMETRICS SECURE WORLD
3/18
HOW BIOMETRICSHOW BIOMETRICS
WORKS ?WORKS ? The concept of Biometrics is veryThe concept of Biometrics is very
simple.simple.
The system has PreThe system has Pre--stored data.stored data. When you approach the system yourWhen you approach the system your
finger is scanned and matched with afinger is scanned and matched with arecord of fingerprint already in itsrecord of fingerprint already in its
database.database. Only when match is found access isOnly when match is found access is
granted.granted.
-
8/7/2019 BIOMETRICS SECURE WORLD
4/18
BIOMETRICS
BIOMETRICS
FINGER PRINT
RECOGNITION
IRISH
SCAN
RETINA
SCAN
EYE
SCAN
FACIAL
RECOGNITION
SPEECH
RECOGNITION
BIOMETRICS
-
8/7/2019 BIOMETRICS SECURE WORLD
5/18
FINGER PRINTFINGER PRINT
SCANNINGSCANNING Different peopleDifferent people
have different sethave different setof finger print.of finger print.
A finger print isA finger print ismade up of ridgesmade up of ridgesand valleys.and valleys.
It need to get theIt need to get the
image of the printsimage of the printswhich are to bewhich are to beauthenticated andauthenticated andthen verifying thethen verifying thedata.data.
-
8/7/2019 BIOMETRICS SECURE WORLD
6/18
The commonly used method ofThe commonly used method of
scanning is optical scanning.scanning is optical scanning. An optical scanner has a CCD sensorAn optical scanner has a CCD sensor
similar to that used in a digitalsimilar to that used in a digitalcamera.There is an array of lightcamera.There is an array of light
sensitive diodes .When these diodessensitive diodes .When these diodescome in contact with light,theycome in contact with light,theygenerate electrical signal.generate electrical signal.
Each diode records a pixelEach diode records a pixel
representing the light it came inrepresenting the light it came incontact with.contact with.
-
8/7/2019 BIOMETRICS SECURE WORLD
7/18
An analog to digital converterAn analog to digital converterconverts the electrical signal toconverts the electrical signal togenerate digital representation ofgenerate digital representation ofimage.image.
The process begins as soon as youThe process begins as soon as youput your finger on the glass plate.put your finger on the glass plate.
The scanner has own source of lightThe scanner has own source of lightwhich illuminate the finger and CCDwhich illuminate the finger and CCD
inside it takes the picture of it.inside it takes the picture of it. It first checks the integrity of theIt first checks the integrity of the
image in terms ofimage in terms ofcontrast,sharpness and sheercontrast,sharpness and sheer
quality.quality.
-
8/7/2019 BIOMETRICS SECURE WORLD
8/18
How finger printHow finger print
recognition worksrecognition works
-
8/7/2019 BIOMETRICS SECURE WORLD
9/18
Matching of prints is a complexMatching of prints is a complex
process in itself and far fromprocess in itself and far from
superimposing method.superimposing method.
Scanner compare specificScanner compare specific
features of the fingerprint calledfeatures of the fingerprint called
minutiae,which are presentminutiae,which are presentwhere ridge line ends.where ridge line ends.
Depending on the algorithm aDepending on the algorithm a
specific number of minutiaespecific number of minutiaemust be matched for finger printmust be matched for finger print
to be accessedto be accessed
-
8/7/2019 BIOMETRICS SECURE WORLD
10/18
RETINAL SCANNINGRETINAL SCANNING For retina to be scanned theFor retina to be scanned the
user looks through a small holeuser looks through a small hole
in the scanning deice andin the scanning deice andfocuses on a particular point forfocuses on a particular point forthe time period for which a lowthe time period for which a lowintensity light and a CCDintensity light and a CCD
analyze a blood vessel at theanalyze a blood vessel at theback of eye for the matchingback of eye for the matchingpattern and validate personspattern and validate personsidentity.identity.
-
8/7/2019 BIOMETRICS SECURE WORLD
11/18
IRISH
SCANIRISH
SCAN The IRIS is the colored ringThe IRIS is the colored ring
surrounding the pupil.surrounding the pupil.
The scan analyses the featuresThe scan analyses the featuresexist in colored tissue.exist in colored tissue.
Over 200 points can be used forOver 200 points can be used for
comparison such ascomparison such asrings,furrows,freckles etc.rings,furrows,freckles etc.
It is a more unique than a fingerIt is a more unique than a fingerprint.print.
-
8/7/2019 BIOMETRICS SECURE WORLD
12/18
FACIAL RECOGNITIONFACIAL RECOGNITION
Every persons face has certainEvery persons face has certain
characteristic andcharacteristic and
distinguishable features.distinguishable features.
The software divide a face intoThe software divide a face into
80 nodes,some of common being80 nodes,some of common being
distance between eyes,width ofdistance between eyes,width ofnose,depth of eyenose,depth of eye
sockets,cheekbones,jaw linessockets,cheekbones,jaw lines
and chin.and chin.
-
8/7/2019 BIOMETRICS SECURE WORLD
13/18
The system generally need 14The system generally need 14--2525
nodes in order to obtain positivenodes in order to obtain positive
ID.ID.
A database is created with theA database is created with the
algorithm,which goes through thealgorithm,which goes through the
characteristic of face and storecharacteristic of face and storethem as string of number calledthem as string of number called
face print.face print.
-
8/7/2019 BIOMETRICS SECURE WORLD
14/18
Once camera encountered theOnce camera encountered the
face it starts scanning and takeface it starts scanning and take
the measurements.the measurements.
Once face is detected itOnce face is detected it
determine the heads size anddetermine the heads size and
position,generally it is 40 degreeposition,generally it is 40 degreetowards camera.towards camera.
-
8/7/2019 BIOMETRICS SECURE WORLD
15/18
The algorithm then converts theThe algorithm then converts the
face into a face print based onface into a face print based on
pre defined criteria programmedpre defined criteria programmedinto the algorithm.into the algorithm.
This new data is then used as aThis new data is then used as a
filter to sort through database offilter to sort through database offaces come up with match.faces come up with match.
-
8/7/2019 BIOMETRICS SECURE WORLD
16/18
FACIAL RECOGNITIONFACIAL RECOGNITION
-
8/7/2019 BIOMETRICS SECURE WORLD
17/18
VOICE RECOGNITION
VOICE RECOGNITION
Every person has a uniqueEvery person has a uniquespeech pattern.This is work byspeech pattern.This is work byfirst store the voice pattern thenfirst store the voice pattern thenit is used as database toit is used as database toauthenticate a subject.authenticate a subject.
Voice recognition work recordingVoice recognition work recording
the physical characteristic ofthe physical characteristic ofvocal tract,the harmonic andvocal tract,the harmonic andresonant frequencies and convertresonant frequencies and convertit into audio file called voiceit into audio file called voice
print.print.
-
8/7/2019 BIOMETRICS SECURE WORLD
18/18
INSTALLATATIONINSTALLATATION It is no longer limited to defenseIt is no longer limited to defense
establishment or sensitiveestablishment or sensitive
areas.areas. It is installed in officesIt is installed in offices
Devices like laptops,ThumbDevices like laptops,Thumb
drives,gadgets etc.drives,gadgets etc. Locking systems in Home,Locking systems in Home,Automobiles etc.Automobiles etc.
top related