Biometric authentication system

13
Presented by- MANOJ KUMAR

Transcript of Biometric authentication system

Page 1: Biometric authentication system

Presented by-

MANOJ KUMAR

Page 2: Biometric authentication system

Traditional methods involving passwords and PIN

numbers

Biometrics highest level of security

Page 3: Biometric authentication system

Automated method

Pattern recognition system

Specific physiological or behavioral characteristics

Page 4: Biometric authentication system

Forget passwords…

Forget PIN numbers…

Forget all your security concerns ...

Page 5: Biometric authentication system

Fingerprint recognition

Facial recognition

Iris

Hand geometry

Retina

Signature dynamics

Speaker recognition

Page 6: Biometric authentication system

Fingerprint recognition is one of the popular biometric

authentication techniques. It refers to the automated

method of verifying a match between two fingerprint

images.

Fingerprint Recognition is commonly employed in

forensic science to support criminal investigations, and

in biometric systems such as civilian and commercial

identification devices.

Page 7: Biometric authentication system

Facial recognition is the most natural means of the

biometric identification.

A facial recognition device is one that views an image

or video of a person and compares it to one that is in the

database.

A facial recognition system is a computer

applications for automatically identifying or verifying a

person from a digital image or a video frame from

a video source. One of the ways to do this is by

comparing selected facial features from the image and a

facial database.

Page 8: Biometric authentication system

The iris is the colored ring of textured tussue that

surrounds the pupil of the eye.

Iris recognition is an automated method

of biometric identification that uses mathematical

pattern-recognition techniques on video images of

the irides of an individual's eyes, whose complex

random patterns are unique and can be seen from some

distance.

Page 9: Biometric authentication system

It is a biometric that identifies users by the shape of their hands.

It involves analyzing and measuring the shape of the hand. Thisbiometric offers a good balance of performance characteristicsand is relatively easy to use. It might be suitable where there aremore users or where users access the system infrequently andare perhaps less disciplined in their approach to the system.

Accuracy can be very high if desired and flexible performancetuning and configuration can accommodate a wide range ofapplications. Organizations are using hand geometry readers invarious scenarios, including time and attendance recording,where they have proved extremely popular. Ease of integrationinto other systems and processes, coupled with ease of use,makes hand geometry an obvious first step for many biometricprojects

Page 10: Biometric authentication system

Retina based biometric involves analyzing the layer of

blood vessels situated at the back of the eye. An

established technology, this technique involves using a

low-intensity light source through an optical coupler to

scan the unique patterns of the retina. Retinal scanning

can be quite accurate but does require the user to look

into a receptacle and focus on a given point. This is not

particularly convenient if you wear glasses or are

concerned about having close contact with the reading

device. For these reasons, retinal scanning is not warmly

accepted by all users, even though the technology itselfcan work well.

Page 11: Biometric authentication system

Biometric signatures are based upon recording various

characteristics of one’s signing style to carry out the

process of identification in the future.

Amount of pressure employed, angle of writing,

formation of letters and other traits, which are

categorized as behavioral biometrics, form the basis of

biometric signature recognition technology

Page 12: Biometric authentication system

Speaker recognition is the process of automaticallyrecognizing who is speaking on the basis of individualinformation included in speech signals

It can be divided into Speaker Identification and SpeakerVerification

Speaker identification determines which registeredspeaker provides a given utterance from amongst a setof known speakers

Speaker verification accepts or rejects the identity claimof a speaker - is the speaker the person they say theyare?

Page 13: Biometric authentication system

Fingerprints are the patterns formed on the epidermis of

the fingertip. The fingerprints are of three types: arch,

loop and whorl.

Fig1 : Arch Fig2:Loop Fig3 : Whorl