Biometrics
-
Upload
rajan-kumar -
Category
Documents
-
view
362 -
download
1
description
Transcript of Biometrics
A Seminar Presentation on “BIOMETRICS”
The Password You’ll Never Forget
-SURUCHI SNEHA B.Tech VIIIth sem(ECE) Roll no- 06ESBEC105
What Is Biometrics?
The automated identification or verification of human identity through physiological and behavioral traits.
Biometrics is derived from the Greek words bios, meaning life and metron, meaning measure.
History of Biometrics
Francis Galton was one of the founder of biometrics.
In 1892 he invented the first system for fingerprinting.
Biometric System
Identification v/s Authentication
A biometric system can work in following two modes-
1. Identification-determines the identity of the person by performing a one-to-many comparison to establish an individual’s identity.
2. Authentication-decides whether the person is indeed who he claims to be by performing a one-to-one comparison to determine whether the claim is true or not.
Biometric Categories
A biometric is divided into two classes-1. Physiological-measures the inherent
physical characteristics of an individual. For example, fingerprints and iris patterns, as well as facial features, hand geometry and retinal blood vessels.
2. Behavioral -measures the characteristics which are acquired naturally over a time For example, voice (speaker verification)
\FingerprintFingerprint It is the oldest method which has been successfully used in numerous applications. Everyone have unique, immutable fingerprints. A fingerprint is made of a series of ridges & furrows on the surface of the finger. The uniqueness can be determined by the pattern of ridges & furrows.
Iris ScanIris Scan
It is the region of the eye which is bounded by pupil. The complex iris texture carries very distinctive information useful for person recognition. Each iris is distinctive and it is extremely difficult to tamper the texture of iris surgically.
Face RecognitionFace RecognitionFace Recognition
Facial recognition systems are built on computer programs thatanalyze images of human faces for the purpose to identify them. The programs take a facial image, measure characteristics such asthe distance between the eyes, the length of the nose, and the angle of the jaw, and create a unique file called a "template." Using templates, the software then compares that image with another image and produces a score that measures how similar the images are to each other.
Voice RecognitionVoice Recognition
Voice recognition technology utilizes the distinctive aspects of the voice to verify the identity of individuals. Voice is a combination of physiological and behavioral biometrics. The physiological characteristics of human speech are invariant for an individual, but the behavioral part of the speech of a person changes over time due to age, medical conditions, emotional state, etc. Voice is also not very distinctive and may not be appropriate for large-scale identification.
This biometric approach uses the geometric form of the hand for confirming an individual’s identity. Because human hands are not unique, specific
features must be combined to assure verification.
Hand geometryHand geometry
SignatureSignature
Signature verification is the process used to recognize an individual’s hand-written signature. This is done by analyzing the shape, speed, stroke, pen pressure and timing information during the act of signing. Signatures are a behavioral biometric.
Retina ScanRetina Scan
Retinal scans record the pattern of blood vessels at the back of the eyeball. These patterns are also highly distinctive and even identical twins have distinctive patterns.
Accuracy
1. False acceptance rate (FAR)-when the system incorrectly matches a sample to a template.
2. False rejection rate (FRR)-when the system incorrectly rejects a valid sample.
3. Failure to Enroll (FTE or FTER)-measures the rate at which individuals are unable to enroll in a biometric system because the system is unable to sufficiently distinguish the individual’s biometrics.
Applications
The applications of biometrics can be divided into the following three main groups:
Commercial- ATM, credit card. Government -driver’s license, border control,
passport. Forensic-criminal investigation, terrorist
identification.
Advantages
No need to remember passwords or carry tokens.
Unauthorized access to personal data can be prevented.
Fraudulent use of ATMs, credit cards can be prevented.
It is reliable. It is easy to use so convenient for users. Cannot be lost, stolen or forgotten.
Disadvantages
Many biometric systems are designed to operate only with specific types of biometric sensors.
Biometric systems is not able to accommodate changes to the biometric over time which may be caused by ageing, illness or injury.
Biometric templates should also be protected by encryption.
The effectiveness of the sample collection process is strongly influenced by environmental conditions such as lighting.
Limitations
Noise in sensed data- a fingerprint with a scar, or a voice altered by cold.
Intra-class variations- when a user interact incorrectly with the sensor.
Spoof attacks- anyone may attempt to spoof the biometric trait of a legitimate enrolled user in order to circumvent the system using the signature & the voice.
Future of Biometrics
‘Bio-Processor-chip’ is available which can recognize the bacteria that can cause diseases- spread through blood, saliva.
It will be integrated into our daily lives. Door locks (with knob and handle) that
contain a fingerprint sensor Cars Safes
Conclusion
Technologies are growing rapidly, but at the same time security breaches and transaction frauds are also in the increase world over. All agencies who are in need of security, surveillance and safety are adopting biometrics as it is a technology used for identification and verification purposes. But authentication methods may be prone to errors. So, reliable user authentication must ensure that an attacker cannot masquerade as a legitimate user. Biometrics is uniquely bound to individuals and may offer organizations a stronger method of authentication but a prudent balance must be achieved between security and privacy.
THANK YOU
?