Biometrics: KRITIKA GUPTA (110028) SHUBHAM GARG (110020) Cs-A

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 39

BIOMETRICS

KRITIKA GUPTA (110028) SHUBHAM GARG(110020) CS-A

CONTENTS
1. Definition 2. Categories 3. Characteristics 4.Working principle 5. Modalities 6. Biometric devices 7.Advantages 8. Disadvantages 9. Companies 10.Future Scope 11.Conclusion 12.References

Biometrics
Definition
Identification of humans by their characteristics or traits used in computer science as a form of identification and access control Biometrics identifiers are used to label and describe individuals

Biometrics can be sorted into two classes: PHYSIOLOGICAL Face ,fingerprints ,hand geometry , iris recognition ,DNA BEHAVIORAL

Signature and voice

Universality Uniqueness Permanence Collectibility Performance Acceptability Circumvention

MODES
Identity is claimed and the comparison process is limited to checking the reference corresponding to this identity.

In identification, no claim of identity is necessary and the system searches its reference database to find if a stored reference matches the biometric characteristics recorded.

FINGERPRINT RECOGNITION
method of verifying a match between two human fingerprints

ARCH

WHORL

LOOP

Ridge endings ,bifurcations on a persons finger to plot points is minutiae

RIDGES

BIFURCATIONS

Building door locks Authorization at ATMs Voter registration

High level of accuracy Relatively inexpensive Most developed biometrics with more history , research and design

FACE RECOGNITION

It involves recognizing people byFacial Features Face Geometry

FEATURES
Stable-Remains unchanged throughout one's lifetime Unique -Same code is nearly impossible Flexible-Easily integrates into existing security systems or operates as a standalone Reliable-Not susceptible to theft, loss or compromise

Verified by including the parameters likeSpeed Pressure Accleration Rhythm Movements in the air

Also known as speaker recognition


Used for identification of person who is speaking by characteristics of their voices

Iris scanner
Face camera Fingerprint Scanner

Iris Scanner
Perform recognition detection of a persons identity by

mathematical analysis of the random patterns that are visible within the iris of an eye from some distance.
Use infrared light to illuminate the iris without causing

harm to the subject.

Face Camera
A face camera is a webcam with 2 Mpx or above It can take a clear crisp photograph of the face.

Fingerprint Scanner
It is an electronic device used to capture a digital image of

the fingerprint pattern.


This scan is digitally processed to create a biometric

template which is stored and used for matching.

Advantages
Government:

AFIS biometric identification system is the ideal platform for governments seeking to build and implement identity management solutions for projects such as: border control, e-Passports, voter registration, national identification cards, and public safety. Public Safety: Corrections departments are using hybrid biometrics software to avoid duplicate booking entries, track inmate movements and prevent false releases.

Point of Sale:
RightPunch is PC-based biometric time and attendance system that enables customers to: Increase productivity Reduce payroll error rates Increase security and efficiency by eliminating ID cards and PINS

HealthCare: The healthcare biometrics solution for patient identification, it allows hospitals to retrieve a patient's electronic health record with one biometric scan without having to enter any additional information like a driver's license, social security number or DOB. Banking: Banks, financial institutions, and banking software developers utilize biometric technology to verify customer identities for secure payment transactions, protect sensitive customer information, eliminate passwords with biometric single sign on protection and prevent customer and employee fraud.

No more forgotten or stolen passswords Positive and accurate identification High level security Safe and user friendly

Applications
The applications of biometrics can be divided into the following three main groups. Commercial -applications such as computer network login, electronic data security, e-commerce, Internet access, ATM, credit card, physical access control, cellularphone, PDA, medical records management, and distance learning. Government -applications such as national ID card, correctional facility, drivers license, social security, welfare disbursement, border control, and passport control. Forensic- applications such as corpse identification, criminal investigation, terrorist identification, parenthood determination, and missing children.

Disadvantages
Biometric techniques are expensive Fingerprint technology may not be effective if the subject

has dirty, deformed, or cut hands Iris technology may not be effective if the subject has a bad eye Voice technology may be affected by infections, also background noise can interfere with voice recognition systems.

Companies Using Biometric Techniques


Accenture
Accenture is helping leading governments and businesses

use biometric security systems to protect citizens and customers-and their data-while improving efficiency, thus accelerating progress toward high performance. The Accenture Travel Security Services solution uses biometrics to integrate the entire travel process for the benefit of travelers, airports and border control.

Other Companies
3M-Cogent Daon Tampa Raytheon

Future Scope
Improvement of the technologies the reduction of the prices for hardware and

software Biometric authentication can and probably will be used in many areas, for example ATMs, access to Personal Computers,mobile phones,access to buildings and cars and many more

It is now being used almost in every area. Biometric safes and biometric locks, provides security to the homeowners. Biometric access control systems, providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities.Various types of biometric systems are being used to achieve various functionalities.

www.google.co.in en.wikipedia.org www.exsight.com www.uidai.gov.in www.xyzmo.com www.softpro.de www.irisid.com www.webopedia.com

You might also like