authentication using biometrics
TRANSCRIPT
Submitted by:-
Isha Ranjan
12EARIT026
Information Technology
Authentication depends on :-
• What we have :- Smart cards
• What we know :- Passwords
• What we are :- Biometrics
Lets Define !
“A biometric is a physiological
or behavioral characteristic of a
human being that can distinguish
one person from another and that
theoretically can be used for
identification or verification of
identity.”
Why Biometrics?
Identity thefts
Something we know can be
stolen
Predicted or hacked
Reliability on manual
verification
Biometric Authentication Process :-
Two step process:-
• Acquisition• Creation of Master characteristics• Storage of Master characteristics
Comparison of data•Acquisition(s)•Comparison•Decision
Storing of Data
Application Categories :-
Biometric applications available today
are categorized into 2 sectors :-
Psychological :- Iris, Fingerprints,
Hand, Retinal and Face recognition
Behavioral :- Voice, Typing pattern,
Signature
Fingerprint techniques :-
Optical
Capacitive
Ultrasonic
Fingerprint recognition :-
Divides print into loops, whorls and arch
Calculates minutiae points (ridge endings)
Comparisons
Authentication
Storage of Master Characteristics :-
Retinal Scanning :-
User looks straight into retinal reader
Scan using low intensity infrared light
Beam of light traces a standardized path
on the retina
retinal blood vessels absorb light more
readily than the surrounding tissue
The pattern is digitized and stored in
a database
Iris Scanner :-
Iris recognition uses camera technology
with subtle infrared illumination
It acquire images of the detail rich
structures of the iris
Digital templates encoded from these
patterns by mathematical and statistical
algorithms allow unambiguous positive
identification of an individual
Face recognition :-
Facial recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face.
These features are then used to search for other images with matching features.
A probe image is then compared with the face data.
Recognition algorithms can be divided into two main approaches :-
• geometric :- looks at distinguishing features
• photometric :- statistical approach that distils an image into values and compares the values with templates to eliminate variances.
Geometric :-
Photometric :-
Statistical approach
that distils an image
into values and
compares the values
with templates to
eliminate variances.
Behavioral :-
Voice
Signature
Typing pattern
Voice Recognition :-
It is identification of a person
from characteristics of voice.
Characteristics like voice pitch,
speaking style, pauses etc.
Each voice recognition system
has two phases:
• Enrolment
• Verification
Enrolment :-
The speaker's voice is recorded.
A number of features are extracted
to form a voice print.
Verification :-
A speech sample or "utterance" is
compared against a previously
created voice print
Signature Recognition :-
Signature verification analyzes the way a user signs her name.
Signature measures (dynamic)
Speed
Pressure
Handwriting Style
Two types of digital handwritten
signature authentication :-
Static :- Comparison between one scanned
signature and another scanned signature, or
a scanned signature against an ink signature
using advance algorithms.
Dynamic :- Data is captured along with the
X,Y,T and P Coordinates of the signor from
the signing device. To create a biometric
template from which dynamic signatures can
be authenticated
Current applications :-
Banks
Mobile Phones
Attendance System
Forensic Science Department
Immigration facilities across
countries
Conclusion :-
While biometrics technology provides a strong user authentication solution, there are other variables to be considered in the authentication protocol. When a high level of security is needed, it is recommended that you combine other authentication factors with biometrics. When you combine what you know, what you have, and what you are, you will have achieved the highest level of security across multiple applications and systems. According to information made available by the International Biometrics Group, “there is no one right biometrics technology for every application.”