You are on page 1of 21

BIOMETRICS

AUTHENTICATION

BY,
ANUBHAV MAINI
PRANKUL JAINI
B.C.C.A II
INTRODUCTION
 Securing personal privacy and deterring identity theft
are national priorities. These goals are essential to our
democracy and our economy, and inherently
important to our citizens.

 A large percentage of the people are involved in


finding a solution that can protect their privacy and
prevent their identity from being stolen and misused.
SOLUTION

BIOMETRICS is one such technology,


that promises to overcome all
security related issues .
WHAT ACTUALLY BIOMETRIC IS??
Biometrics refers to technologies for measuring and
analyzing a person's physiological or behavioural
characteristics, such as:
 VOICE PATTERN
 FACIAL PATTERNS
 FINGERPRINTS
for identification
and verification
purposes.
DEFINITION
BIO = PERTAINING TO BIOLOGY &
METRICS = SCIENCE OR ART OF MEASUREMENT

 Generally, the study of measurable biological


characteristics.
 In computer security, biometrics refers to
authentication techniques that rely on measurable
physical characteristics that can be automatically
checked.
WHY BIOMETRICS ???
 With numerous devices, traditional paradigm of user name and
password based scenarios are not practical.
 Only authorized users should have access to data and services.
 Biometrics provide an unobtrusive and convenient authentication
mechanism.
 Advantages of biometrics:
 Uniqueness
 No need to remember passwords or carry tokens
 Biometrics cannot be lost, stolen or forgotten
 More secure than a long password
 Solves repudiation problem
 Not susceptible to traditional dictionary attacks
TWO MAIN USES
 IDENTFICATION
-figure out “Who a person is?”
-determining the identity of a suspect.

 VERIFICATION
-answer the question “Is this the person?”
-used for accessing places or information.
TYPES OF BIOMETRICS
BIOMETRICS

Behavioral Physical
Voice recognition Facial recognition
Signature Iris scan
Keystroke Retinal scan
Finger print
DNA
How it Works????
 DIGITAL SENSOR
 SIGNAL PROCESSING ALGORITHMS
 DATA STORAGE
 MATCHING ALGORITHM
 DECISION PROCESS
BIOMETRICS IDENTIFICATION
 VOICE RECOGNITION
 FINGER PRINT
 IRIS PATTERN
 HAND GEOMETRY
 RETINAL SCAN
 KEYSTROKE DYNAMICS
 FACIAL RECOGNITION
 SIGNATURE RECOGNITION
 DNA SCAN RECOGNITION
FINGERPRINT RECOGNITION

 Finger print is also called finger scanning.


 To scan the finger print, a special kind of scanner that can work with
optical rays is used.
 it fetches the diagram of finger print & delivers it to the computer where a
special programmer measures the distance between the special features &
that print.
 Here, those special features are core, split, island, end &delta. Most
fingerprint data takes up around 250kb
FINGERPRINT SCAN PROCESS
A VIDEO SHOWING FINGERPRINT
ACCESS TO OPEN THE DOOR
General Biometric System
Biometric
Feature Extraction
Sensor

Database
Enrollment

Biometric
Feature Extraction
Sensor

Matching
ID : 8809
Authentication
Result
APPLICATION OF BIOMETRICS
 Biometric Time Clocks or Biometric time and attendance systems, which
are being increasingly used in various organisations    to control employee
timekeeping.
 Biometric safes and biometric locks, provides security to the homeowners.
 Biometric access control systems, providing strong security at entrances.
 Biometric systems are also developed for securing access to pc's and
providing single logon facilities.
 Wireless biometrics for high end security and providing safer transactions
from wireless devices like PDA's, etc.
 Applications of biometrics technology in identifying DNA patterns for
identifying criminals, etc.
 Biometrics airport security devices are also deployed at some of the
world's famous airports to enhance the security standards .
AUTHENTICATION CAN BE DONE BY
 Fingerprint only (needs a fingerprint reader)
 Face only (needs a webcam/camera)
 Fingerprint and Face (needs a fingerprint reader
and a webcam/camera)
BIOMETRICS IN SMART CARD SYSTEM
 Biometrics add an
additional layer of security to
a smart card system
 Smart cards provide the
“something you have”factor.
 The “Something you know”is
usually a PIN
 Integrating a finger print
scanner into a smart card reader
increases security by adding
“something you are”
BIOMETRICS IN INDIA
 India which is perpetually under the threat of
terrorism and security breach, is gearing up to adopt
various biometric methods.
It is used in :
 Defense and Security Industry
 Police Administration
 Home Affairs (IDs)
 Libraries
CONCLUSION
 Technology is growing rapidly, but at the same time
security breaches and transaction frauds are also in the
increase world over. All agencies including Libraries
who are in need of security, surveillance and safety
have to adopt biometrics.
 “THE FUTURE DEPENDS ON WHAT WE DO IN
THE PRESENT”
-MAHATMA GANDHIJI-
 Let us hope for a safe and secure future!!!

You might also like