Biometrics

23
A Seminar Presentation on BIOMETRICSThe Password You’ll Never Forget -SURUCHI SNEHA B.Tech VIIIth sem(ECE) Roll no- 06ESBEC105

description

 

Transcript of Biometrics

Page 1: Biometrics

A Seminar Presentation on “BIOMETRICS”

The Password You’ll Never Forget

-SURUCHI SNEHA B.Tech VIIIth sem(ECE) Roll no- 06ESBEC105

Page 2: Biometrics

What Is Biometrics?

The automated identification or verification of human identity through physiological and behavioral traits.

Biometrics is derived from the Greek words bios, meaning life and metron, meaning measure.

Page 3: Biometrics

History of Biometrics

Francis Galton was one of the founder of biometrics.

In 1892 he invented the first system for fingerprinting.

Page 4: Biometrics

Biometric System

Page 5: Biometrics
Page 6: Biometrics

Identification v/s Authentication

A biometric system can work in following two modes-

1. Identification-determines the identity of the person by performing a one-to-many comparison to establish an individual’s identity.

2. Authentication-decides whether the person is indeed who he claims to be by performing a one-to-one comparison to determine whether the claim is true or not.

Page 7: Biometrics

Biometric Categories

A biometric is divided into two classes-1. Physiological-measures the inherent

physical characteristics of an individual. For example, fingerprints and iris patterns, as well as facial features, hand geometry and retinal blood vessels.

2. Behavioral -measures the characteristics which are acquired naturally over a time For example, voice (speaker verification)

Page 8: Biometrics

\FingerprintFingerprint It is the oldest method which has been successfully used in numerous applications. Everyone have unique, immutable fingerprints. A fingerprint is made of a series of ridges & furrows on the surface of the finger. The uniqueness can be determined by the pattern of ridges & furrows.

Page 9: Biometrics

Iris ScanIris Scan

It is the region of the eye which is bounded by pupil. The complex iris texture carries very distinctive information useful for person recognition. Each iris is distinctive and it is extremely difficult to tamper the texture of iris surgically.

Page 10: Biometrics

Face RecognitionFace RecognitionFace Recognition

Facial recognition systems are built on computer programs thatanalyze images of human faces for the purpose to identify them. The programs take a facial image, measure characteristics such asthe distance between the eyes, the length of the nose, and the angle of the jaw, and create a unique file called a "template." Using templates, the software then compares that image with another image and produces a score that measures how similar the images are to each other.

Page 11: Biometrics

Voice RecognitionVoice Recognition

Voice recognition technology utilizes the distinctive aspects of the voice to verify the identity of individuals. Voice is a combination of physiological and behavioral biometrics. The physiological characteristics of human speech are invariant for an individual, but the behavioral part of the speech of a person changes over time due to age, medical conditions, emotional state, etc. Voice is also not very distinctive and may not be appropriate for large-scale identification.

Page 12: Biometrics

This biometric approach uses the geometric form of the hand for confirming an individual’s identity. Because human hands are not unique, specific

features must be combined to assure verification.

Hand geometryHand geometry

Page 13: Biometrics

SignatureSignature

Signature verification is the process used to recognize an individual’s hand-written signature. This is done by analyzing the shape, speed, stroke, pen pressure and timing information during the act of signing. Signatures are a behavioral biometric.

Page 14: Biometrics

Retina ScanRetina Scan

Retinal scans record the pattern of blood vessels at the back of the eyeball. These patterns are also highly distinctive and even identical twins have distinctive patterns.

Page 15: Biometrics

Accuracy

1. False acceptance rate (FAR)-when the system incorrectly matches a sample to a template.

2. False rejection rate (FRR)-when the system incorrectly rejects a valid sample.

3. Failure to Enroll (FTE or FTER)-measures the rate at which individuals are unable to enroll in a biometric system because the system is unable to sufficiently distinguish the individual’s biometrics.

Page 16: Biometrics

Applications

The applications of biometrics can be divided into the following three main groups:

Commercial- ATM, credit card. Government -driver’s license, border control,

passport. Forensic-criminal investigation, terrorist

identification.

Page 17: Biometrics

Advantages

No need to remember passwords or carry tokens.

Unauthorized access to personal data can be prevented.

Fraudulent use of ATMs, credit cards can be prevented.

It is reliable. It is easy to use so convenient for users. Cannot be lost, stolen or forgotten.

Page 18: Biometrics

Disadvantages

Many biometric systems are designed to operate only with specific types of biometric sensors.

Biometric systems is not able to accommodate changes to the biometric over time which may be caused by ageing, illness or injury.

Biometric templates should also be protected by encryption.

The effectiveness of the sample collection process is strongly influenced by environmental conditions such as lighting.

Page 19: Biometrics

Limitations

Noise in sensed data- a fingerprint with a scar, or a voice altered by cold.

Intra-class variations- when a user interact incorrectly with the sensor.

Spoof attacks- anyone may attempt to spoof the biometric trait of a legitimate enrolled user in order to circumvent the system using the signature & the voice.

Page 20: Biometrics

Future of Biometrics

‘Bio-Processor-chip’ is available which can recognize the bacteria that can cause diseases- spread through blood, saliva.

It will be integrated into our daily lives. Door locks (with knob and handle) that

contain a fingerprint sensor Cars Safes

Page 21: Biometrics

Conclusion

Technologies are growing rapidly, but at the same time security breaches and transaction frauds are also in the increase world over. All agencies who are in need of security, surveillance and safety are adopting biometrics as it is a technology used for identification and verification purposes. But authentication methods may be prone to errors. So, reliable user authentication must ensure that an attacker cannot masquerade as a legitimate user. Biometrics is uniquely bound to individuals and may offer organizations a stronger method of authentication but a prudent balance must be achieved between security and privacy.

Page 22: Biometrics

THANK YOU

Page 23: Biometrics

?