biometrics presen
TRANSCRIPT
-
7/31/2019 Biometrics Presen
1/18
BY
P.BHANU KIRAN
A PRESENTATION ON
BIOMETRICS
-
7/31/2019 Biometrics Presen
2/18
is the technique of using
unique, non-transferable, physicalcharacteristics, such as fingerprints, togain entry for personal identification.This replaces pin codes and passwords,which can be forgotten, lost or stolen.Biometric IDs cannot be transferred.
-
7/31/2019 Biometrics Presen
3/18
NEED OF BIOMETRICS!!
Now-a-days we are facing majority ofcrimes related to security issues and these
arise due to the leakage of passwords orillegal authentication.
At one end, there is a continuous and
tremendous improvement in the lifestyle ofHumans while at the other end; thetechnological crimes are increasing rapidly.
-
7/31/2019 Biometrics Presen
4/18
THERE must be a solution ???
Technologies capable of identifying each person uniquelyneed to be developed. The only powerful solution for the
problem of illegal authentication is Biometrics.
-
7/31/2019 Biometrics Presen
5/18
METHODOLOGIES OF BIOMETRICS
RETINA
An established technologywhere the unique patterns of the
retina are scanned by a low
intensity light source via an
optical coupler
-
7/31/2019 Biometrics Presen
6/18
FACE RECOGNITION
Facial scanning involves
scanning of the entire face
and checking of critical pointsand areas in the face with thetemplate. This method is not
completely reliable and so it
is used in association withanother biometric technique
-
7/31/2019 Biometrics Presen
7/18
SIGNATURE RECOGNITION
Signature verification devices
have proved to be reasonably
accurate. . Signatureverification analyzes the way
a user signs her name.
Signing features such as
speed, velocity, and pressureare as important as the
finished signature's static
shape
-
7/31/2019 Biometrics Presen
8/18
Voice recognition
Voice authentication is notbased on voice recognition buton voice-to-print
authentication, where complextechnology transforms voiceinto text. Voice biometrics hasthe most potential for growth,
because it requires no newhardwaremost PCs alreadycontain a microphone.
-
7/31/2019 Biometrics Presen
9/18
Hand recognition
Hand geometry is concerned withmeasuring the physical characteristicsof the users hand and fingers, HandGeometry scanning systems scan the
size, length, thickness and surface of ausers hand (including fingers), in orderto verify the user. Unlike otherbiometrics, such as fingerprints andretina scanning, hand geometry
cannot be guaranteed as unique;hence, hand geometry is not anidentification technique, but rather averification technique.
-
7/31/2019 Biometrics Presen
10/18
Finger print verification
Finger based scanning is oneof the oldest methods usedfor verification. Fingerprints,unique and immunable for allare made of series of ridgesand furrows on the surface ofthe finger. These ridges and
furrows determine theuniqueness of thefingerprints.
-
7/31/2019 Biometrics Presen
11/18
How does it works
Whilst individual biometric
devices and systems
have their own operating
methodology, there are
some generalisations one
can make as to what
typically happens within abiometricsystems
implementation.
-
7/31/2019 Biometrics Presen
12/18
Biometrics implementation
Obviously, before we can verify an individuals
identity via a biometric we must first capture a
sample of the chosen biometric. This sample isreferred to as a biometric template and is thereference data against which subsequent
samples provided at verification time are
compared. A number of samples are usuallycaptured during enrolment (typically three) in
order to arrive at a truly representative template
via an averaging process.
-
7/31/2019 Biometrics Presen
13/18
The template is then referenced against anidentifier (typically a PIN or card number if used in
conjunction with existing access control tokens) inorder to recall it ready for comparison with a live
sample at the transaction point.
IT INVOLVESStoring the template within biometric device
The verification process requires the user to claim an identity by
either entering a PIN or presenting a token, and then verify thisclaim by providing a live biometric to be compared against theclaimed reference template. There will be a resulting match or nomatch accordingly .
-
7/31/2019 Biometrics Presen
14/18
Comparision of biometric
techniques
-
7/31/2019 Biometrics Presen
15/18
advantages
Biometric identification provide a unique identification.Biometrics is more reliable and efficient in distinguishing
between a specific individual and an imposter.
Biometric identification protects customers against theft
and fraud.Identification of the individuals is based on the individuals
unique physical and biological qualities that can not be
traded, shared, lost or stolen
It is much efficient than the (PIN) personal identification
number or token-based authentication techniques.
After all it cant be forgotten or lost.
-
7/31/2019 Biometrics Presen
16/18
disadvantages
Biometric system may not give an accurate identification.
Cost of the implementation tools is too high (such as finger print
sensors are extremely expensive).
The cost of the storing biometric templates and of the computing
power required to process and match biometric measurement is quite
high.
There are some techniques like DNA profiling which is complicated
and time taking process.
Change of hair style in facial recognition, wearing glasses, and light
intensity in retina scanning may effect the authentication process.
-
7/31/2019 Biometrics Presen
17/18
Future enhancement
The application of biometrics in near future will be in ATM Machineswhere the leading banks will use biometrics as a general means of
combating card fraud.
Apart from these this technology is going to make place in internettransaction, telephone transaction, and will be used as public identity
cards.
Some vendors have built a fingerprint sensor directly into
the smart card reader, which in turn passes the biometric tothe smart card for verification.
-
7/31/2019 Biometrics Presen
18/18
conclusion
At its infancy, current biometric technology is stillconsidered immature to completely replace password andother authentication schemes
Although the challenges confronting biometrics aremany, none of these is going to stop the progress ofbiometrics being used as authentication and identificationtools
A wiser approach would be to prepare the peoplementally and psychologically for the new technology, makefurther improvements to the technology