biometrics naved & adi

Upload: bob-bin

Post on 07-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Biometrics naved & adi

    1/25

    1

    BIOMETRICSA REPORT ON BIOMETRICS BY

    Aditya Mayekar.

    Naved Bichu

  • 8/3/2019 Biometrics naved & adi

    2/25

    2

    BIOMETRICSINTRODUCTION

    Biometrics involves measuring an individuals unique

    physical or behavioral characteristics to determine or verify

    their identity. Common physical biometrics include

    fingerprints, hand or palm geometry, face, iris or retina.

    The most widely used physical biometric is fingerprint.

    Behavioral biometrics include signature, voice (with a

    physical aspect), keystroke pattern and gait. Of this class

    the most developed technologies are signature and voice.

  • 8/3/2019 Biometrics naved & adi

    3/25

    3

    TYPES OF BIOMETRICS

    FINGER PRINT SCANNING

    RETINAL SCANNING

    IRIS SCANNING FACIAL SCANNING

    VOICE SCANNING

    DNA FINGERPRINTING

  • 8/3/2019 Biometrics naved & adi

    4/25

    4

    BIOMETRICS

    How biometric process works.

    System has some prestored data.

    The fingerprint is scanned.

  • 8/3/2019 Biometrics naved & adi

    5/25

    5

    HOW BIOMETRIC PROCESS

    WORKS

  • 8/3/2019 Biometrics naved & adi

    6/25

    6

    BIOMETRICS

    Scanning

    The system matches the scanned data with the stored data and

    gives the appropriate result

    Access is granted only when match is found.

    Biometrics system is highly reliable.

  • 8/3/2019 Biometrics naved & adi

    7/25

    7

    BIOMETRICS

    Positive identification.

    Is this person known to system

    Authenticity of a person can be verified with

    high certainty.

  • 8/3/2019 Biometrics naved & adi

    8/25

    8

    BIOMETRIC

    Fingerprint Scanning

    Humans have fingerprints for the exact same

    reason that tires have treads.

    Different people have entirely sets of

    fingerprints which enables identification.

    A fingerprint is made up of ridges and valleys

    (lines and the gaps separating them).

  • 8/3/2019 Biometrics naved & adi

    9/25

    9

    BIOMETRIC

    Fingerprint Scanning

    The most commonly used

    method of scanning is optical

    scanning.

    An optical scanner has a CCDsensor similar to thrones used

    in digital cameras.

    An ADC system in the

    scanner processes the electric

    signals to generate digital

    representations of the image.

  • 8/3/2019 Biometrics naved & adi

    10/25

    10

    BIOMETRIC

    Fingerprint Scanning

    The process begins the

    time you place your

    finger on the glass plate.

    The scanner has its ownsource of light which

    illuminate the finger and

    the CCD inside takes

    picture of finger.

    Matching of prints is a

    fairly complex process.

  • 8/3/2019 Biometrics naved & adi

    11/25

    11

    BIOMETRIC

    Iris Scan

    Iris Scan, though relating tothe eye uses a completelydifferent method ofidentification.

    The iris is the coloured ringsurrounding the pupil.

    The scan analyses thefeatures that exist in thecoloured tissue.

    Over 200 points can be usedfor comparison such as therings, furrows and freckles.

  • 8/3/2019 Biometrics naved & adi

    12/25

    12

    BIOMETRIC

    Iris Scan

    Iris recognition is a method of biometric identificationbased on high-resolution images of the iris is of anindividuals eyes.

    An Iris-recognition algorithm first has to identify theapproximately concentric circular outer boundaries ofthe iris and the pupil in a photo of an eye.

    Using a small camera, an iris-recognition system

    photographs one or both eyes and converts the smalldetails in the iris stromal pattern into a bit pattern thatis suitabe for unambiguous positive identification of anindividual.

    BIOMETRICS

  • 8/3/2019 Biometrics naved & adi

    13/25

    13

    BIOMETRICS

    DNA

    Introduction Recently included in biometrics

    Serves as full set of building blocks for each person and itsunique

    Humans share 99.9% of DNA

    DNA is a large molecule whose shape resemble a double helixwhich looks like a ladder twisted in a spiral

    Each molecule consists a string of nucleotide

    Composition of each molecule of nucleotides

    a) Sugar molecule

    b) Phosphate molecule

    c) Nitrogenous base

  • 8/3/2019 Biometrics naved & adi

    14/25

    14

    BIOMETRICS

    BasesThe use of DNA in biometricapplication focuses on thenitrogenous bases

    Adenine (A)

    Cytosine (C)

    Guanine (G)

    Thymine (T)

    Adenine pairs with Thymine andCytosine

    with guanine

    DNA is measured in unit called nt(nucleotides)

    BIOMETRICS

  • 8/3/2019 Biometrics naved & adi

    15/25

    15

    BIOMETRICS

    Electrophoresis

    The DNA is sequencedusing a technique knownas Electrophoresis

    What is electrophoresis ?a) electrophoresis is theprocess in which themolecule is separated

    into its two constituentsstrands and placed at oneend of the of gelatin likegel

  • 8/3/2019 Biometrics naved & adi

    16/25

    16

    BIOMETRICS

    Retinal Scanning Introduction

    a) It is very old technology

    b) For the retina to be scanned theuser looks through the hole inthe scanning device

    c) A low intensity light fall on theretina which scandalize the layerof blood vessel at the back of theeye for matching patterns

    Use

    a) It is use for security purpose History

    a) This technology started in 1930s

  • 8/3/2019 Biometrics naved & adi

    17/25

    17

    BIOMETRICS

    Facial Recognition The camera pans around looking

    for face. The minute it encountersa face, it starts scanning it andproceeds to identifying the variousnode and taking measurement ifpossible.

    Once the face is detected thesystem determine the heads sizeand position

    The algorithm then converts theface into a face print based onpredefined criteria programmed

    into the algorithm The new data is then used as a

    filter to sort through the databaseof faces at super fast speed tocome up with a match

  • 8/3/2019 Biometrics naved & adi

    18/25

    18

    BIOMETRICS

    Voice Recognition

    It works by storing voice patterns, and then

    using them as database to authenticate a subject.

    It works by noting a persons voice and converts

    it into a audio file.

    The phrase should be 1 to 1.5 seconds in length.

    The subject is asked to close the phrase and

    repeat it.

  • 8/3/2019 Biometrics naved & adi

    19/25

    19

    BIOMETRICS

    Voice Recognition

    Voice Recognition can use plain audio sources(telephones, cell phones etc..) to authenticate the user.

    Voice Recognition is often confused with speechrecognition.

    If the subject has a sour throat or suffering from cold italters the voice quite considerably.

    Outside noise like horns blaring, people screaming, thesystem might refuse to authenticate the user.

  • 8/3/2019 Biometrics naved & adi

    20/25

    20

    MARKETSHARE OF BIOMETRIC

    METHODS

  • 8/3/2019 Biometrics naved & adi

    21/25

    21

  • 8/3/2019 Biometrics naved & adi

    22/25

    22

    BIOMETRICS

    Merits

    A lot of products in modern day worldincorporate one or other form of Biometricsecurity.

    Microsoft recently launched a fingerprintscanner, compatible with Windows XP.

    India has few companies dedicated toBiometrics-based product development.

  • 8/3/2019 Biometrics naved & adi

    23/25

    23

    BIOMETRICS

    Merits

    The Tirupati Temple in Andhra Pradesh hasdeployed Biometrics for crowd control.

    A pilot project is on in US where instead ofswiping your credit card, you simply put yourthumb in the fingerprint scanner in the ATM.

    Biometrics can certainly be a powerful securitytool to combat terrorism.

  • 8/3/2019 Biometrics naved & adi

    24/25

    24

    BIOMETRICS

    Demerits

    Biometrics can prove a potential threat to privacy.

    Using various security cameras deployed on road ourmovements from office to work would not remainprivate.

    You find a truckload of sites on internet giving detailedinstructions on how to go about about fakingfingerprints.

  • 8/3/2019 Biometrics naved & adi

    25/25

    25

    BIOMETRICS

    Conclusion

    Unique identification potential of biometrics can

    help identifying criminal, eliminating fraud.

    It is highly reliable.