biometric ppt
TRANSCRIPT
M.Kumarasamy college of engineering.
TOPIC:Biometric
Done by,•B.Nishkal kanna•B.Ajith chandran•G.Naresh•M.Janani •M.Geetha priya
Guided by,S.Keerthi(AP of CSE)
• The automated use behavioral and physiological characteristics to determine or verify an identity.
Biometrics Avoids…
Passwords complexness like,Too many Can be stolenForgotten
Protect Information for,BankingMedical
Biometrics types
Know Password, PIN
Have Key, Smart Card
show Fingerprint, Face, Iris
• Biometrics is a security solution based on something you know, have, and show:
Facts!!!
• Has been used since 14th century in China• efficient and trusted
• Will never leave at home
• Fingerprints are unique• Everyone is born with one
• 80% of public has biometric recorded
Types of Biometrics
Fingerprint recognition:
Finger recognition device:
Fingerprint Patterns to recognise you
6 classes of patterns
Fingerprint Patterns
• Minutiae
Fact….
• Finger print was recognized by binary digits o’s & 1’s.
Fingerprint Patterns
• Two main technologies to capture image of the fingerprint
• Optical – use light refracted through a prism• Capacitive-based – detect voltage changes in
skin.
Advanced Minutiae
• Feature Extractor• Capture Image• Enhance Ridge• Extract Minutiae
Advanced Minutiae-2
• Matcher• Used to match fingerprint• Trade-off between speed and performance• Group minutiae and categorize by type
Identification vs. AuthenticationIdentification •Who are you?
• comparison• Slower• Scan all memory in database
Authentication •Are you John Smith?
• 1 : 1 comparison• Faster• Scan one template
Security• Several sensors to detect fake
fingerprints
• Cannot steal from previous• user• Cannot use cut off finger
• Temperature• Pulse• Heartbeat sensors• Blood flow
Iriscode protection
IrisCode device:
IrisCode
OVERVIEW OF IrisCode SYSTEM
Concerns / Possible improvements
High cost of implementation•Person has to be “physically” present.•Capture images independent of surroundings and environment / Techniques for dark eyes.•Non-ideal iris images
Inconsistent Iris size
Pupil Dilation
Eye Rotation
SEGMENTATION
• Detecting the pupil edges• Detecting the iris edges• Extracting the iris region
Canny Edge Detection Algorithm
Advantages
• Uniqueness of iris patterns hence improved accuracy.
• Highly protected, internal organ of the eye• Stability : Standardness of iris patterns.• Non-invasive : Relatively easy to be acquired.• Speed : Smaller template size so large databases
can be easily stored and checked.• Cannot be easily forged or modified.
Face recognition:
FaceRecognition device:
Face Recognition
• Face is the most common biometric used by humans• Applications• Static• mug-shot verification• Challenges:
• automatically locate the face • illumination conditions• facial expressions• aging effects
Face Recognition Difficulties….
• Identify similar facesintra-class variability due to:
• head pose• illumination conditions• expressions• facial accessories• aging effects
Inter-class Similarity
• Different persons may have very• similar appearance
Twins Father and son
Intra-class Variability
• variations in pose, expression,color and brightness
Face Detection Algorithm
Face Localization
Lighting Compensation
Skin Color Detection
Variance-based Segmentation
Connected Component &Grouping
Face Boundary Detection
Verifying/ WeightingEyes-Mouth Triangles
Eye/ Mouth Detection
Facial Feature Detection
Input Image
Output Image
Voice recognition:
Definition• Speech recognition: converting an acoustic signal, captured
by a microphone or a telephone, to a set of words.
Speech Processing
• Signal processing:• Convert the audio wave into a
sequence of feature vectors
• Speech recognition:• Decode the sequence of feature
vectors into a sequence of words
• Semantic interpretation:• Determine the meaning of the
recognized words
Dialog Management
• Goal: determine what to accomplish in response to user• Answer user question• Gives further information• Confirm/Clarify to user• Notify invalid query
• Interface between user/language processing components.
Speech Recognition and Call Centres
• Automate services, lower payroll
• Shorten time on hold• Shorten agent and client call
time• Reduce fraud• Improve customer service
Interesting fact…!!!
• Voice recognition generally works on the principle of binary tree
Conclusion
• BIOMETRIC-Want to protect information
• IRISCODE-scans orbitally over the iris
• FINGERPRINTS-Fingerprints are unique; can verify
• FACE-identify using shapes
• VOICE-identify using frequency range
Thank you
Queries time…?.?.?.?.?