Bio Metrics
Bio Metrics
Bio Metrics
ON
BIO METRICS
SUBMITTED BY:
Advantages:
• Low cost biometric technology
• Low volume, low throughput openings
• High security environments
Application:
Access Control
● HAND GEOMETRY:
Recognition Systems' biometric HandReaders
simultaneously analyze more than 31,000 points and instantaneously
records more than 90 separate measurements of an individual's hand-
including length, width, thickness and surface area-to verify that the
person using the device is really who he or she claims to be. The Hand
Reader compares this information with a "template" of the individual's
hand that has previously been stored in the reader, on a server or on a
card. Once the person has been identified as a valid user, a door can be
opened, access can be provided, or time recorded. The reading and
verification process takes less than a second with impeccable reliability
Applications:
•Time & Attendance • Identity Verification • Access
Control
Advantages:
• High volume, high throughput openings
• Maintains industry leading performance in harsh
environments
• High security environments
•Identity Verification
● FACIALTECHNO
LOGY:
Recognition Systems' face recognition readers analyze faces based on
the found face and eyes position. The method involved in this is as
follows:
>Any kind of data source is used for input it is either a still image, a
video stream
or a connection to a face image database.
>Normalization: based on the found face and eyes position, the image is
scaled,
rotated and finally presented at a fixed size
>Preprocessing: standard techniques applied like histogram equalizations,
intensity normalization
>The images are analyzed to determine the position and size of one or
more faces.
The eyes centers are located and marked. Images including eyes
positions are
taken as Primary Facial Data.
>Characteristics of the face are extracted and represented as a vector in
n-dimensional spaces are similarity of faces is the distance of two
vectors. The
vectors represent the Secondary Facial Data and are used for fast
comparisons.
>Secondary Facial Data can be stored in a central database or on a token
storage
device, like a smartcard
>In case the Secondary Facial Data is stored on a smartcard, only
verification is
possible.
IDENTIFICATION MODE: The presented data is used to scan a data base
for
most similar faces the most similar reference data is taken as an
evidence of the
person’s identity.
VERIFICATION MODE: The presented facial data is compared to data read
from the database or token, based on the similarity threshold the identity
is confirmed.
APPLICATIONS:
Physicalaccesscontrol LogicalAccessControl
SurveillanceSystems Point
ofSalesSystems
●IRIS RECOGNITION:
Iris recognition is the most powerful biometric technology. The
iris is the plainly visible, colored ring that surrounds the pupil. It is a
muscular structure that controls the amount of light entering the eye, with
intricate details that can be
CONCLUSION:
BIBLIOGRAPHY
1. www.irrsi.com
2. www.irsecurityandsafety.com
3. www.fingerprintlock.com
4. www.neurotechnologija.com
5. www.cognitec-systems.de