You are on page 1of 20

A Seminar report On BIOMETRICS SECURITY SYSTEM

Submitted to:
Kurukshetra University, Kurukshetra In partial to fulfillment of the requirement for the award of degree Master Of Computer Application (MCA) (Session: 2009-2010)

Under the supervision of:


Mrs. Mona Seghal
(Lect. of MCA dept.)

Submitted by:
Prabhjot singh
MCA 1st Semester Roll No. 116

Guru Nanak Khalsa Institute of Technology and Management Studies


Yamuna Nagar

A password can be stolen or it can be broken. However, biological part cant

Survey
Introduction Why we use BIOMETRICS? How the whole process works? Techniques in it. Fingerprint scan Face scan Iris scan Retina scan Voice scan

Indian Initiatives Dark side

Conclusion References

1. Heavy web users have an average of 21 passwords; 81% of users select a common password and 30% write their passwords down or store them in a file. (2002 NTA Monitor Password Survey) 2. A recent survey found 70% of those asked said that they would reveal their computer passwords for a bar of chocolate. Sweet! (Technology Review, March 2005, p. 78) 3. The nineteen 9/11 hijackers had a total of 63 valid driver licenses. 4. ~5 million identity thefts in U.S. in 2004 5. 6.7 million Victims of credit card fraud last year.

The statistical analysis of biological data Or Biometrics is the science of recognition of a person based on a physiological characteristic. The methods of recognition include fingerprints, speech, face, retina, iris, handwritten signature, hand geometry, and wrist veins. Biometrics implies automatic methods for identifying a person on the basis of some biological or behavioral characteristic of the person. Many biological characteristics, such as fingerprints, and behavioral characteristics, such as voice patterns, are distinctive to each person. Therefore, biometrics is more reliable and

more capable in distinguishing between a specific individual and an impostor than any technique based on an identification (ID) document or a password. The word

biometrics comes from the Greek words bios (life) and metrikos (measure). In computer technology, biometrics relates to identityconfirmation and security techniques that rely on measurable, individual biological characteristics. For example, fingerprints, handprints, or voice patterns might be used to enable access to a computer, to a room, or to an electronic commerce account.

PHYSICALLY PRESENT OBVIATES THE NEED TO REMEMBER PASSWORD RESTRICT ACCESS REPLACE PINS & PASSWORDS TOKENS EASILY LOST &

PASSWORDS FORGOTTEN

There are various types of biometrics techniques present these days some of which are as: 1. Finger prints scan 2. Hand geometry scan 3. Eyes scan (Iris scan or Retina scan) 4. Voice scan
5.

Face scan

6.

DNA scan etc.

The process of authenticating people based on their fingerprints is fingerprint recognition. Of all the techniques successfully used used today, in fingerprints based recognition is the oldest method, which has been numerous applications. Everyone is known to have unique, immutable fingerprints. This method or technique is based on certain unique features such as the edges, channels and ridges of fingerprints.

Face recognition technique records face images through a digital video camera and analyses facial characteristics like the distance between eyes, nose, mouth and jaw edges. These measurements are broken into facial planes and retained in a database, further used for comparison.

Iris recognition analyses features like rings, furrows and freckles existing in the colored tissue surrounding the pupil. The scans use a regular video camera and works through glasses and contact lenses. The image of the iris can be directly taken by making the user position his eye within the field of a single narrow angle camera. This is done by observing a visual feedback via a mirror. The isolated iris pattern obtained is then demodulated to extract its phase information.

Retina Recognition

technology uses infrared

scanning and compares images of the blood vessels in the back of the eye, the choroidal vasculature. The eyes inherent isolation and protection from the body is a benefit. Retina scan is used in high-end security applications like military installations and power plants.

Voice Recognition combines physiological and behavioral factors to produce speech patterns that can be captured by speech processing technology Inherent properties of the speaker like fundamental frequency, nasal tone, cadence, inflection, etc. are used for speech authentication.

Bio Enable Technologies, Pune, is a software company that develops biometric products to cater to the tough Indian working conditions and environments. The firm has developed intelligent biometric solutions for physical access control, banking transaction, timing and attendance applications. Siemens Information Systems Ltd (SISL), Bangalore, has developed a text- independent autonomous speech recognition system to identify and authorize a speaker by analyzing his voice.

Central

Forensic

Science

Laboratories,

Chandigarh, uses this system to track down and identify criminals by comparing their voice samples using SISL software. Biometric Society of India (INBIOS), affiliated to the International Society of Computational Biology (ISCB) provides innovative professional solutions and services dedicated to bioinformatics.

False rejection False acceptance Finger print Face Voice rate 2% 10% 5-10% rate 2% 1% 2-5%

At New York airport, an average of ~ 200,000 passengers passes through daily. There would be 4,000 falsely rejected passengers per day for fingerprints, 20,000 for face and 30,000 for voice.

"Police in Malaysia are hunting for members of a violent gang who chopped off a car owner's finger to get round the vehicle's hi-tech security system. The car, a Mercedes S- class, was

protected by a fingerprint recognition system." BBC News, 31 March, 2005

In gist, the concerns over biometrics are not without reason. Biometrics can certainly be a powerful security tool to combat fake. In the end, it is up to the people to decide whether the price of losing their anonymity is justified in order to gain the comfort of security.

www.google.com www.wikipedia.com www.biometrics.org www.griaulebiometrics.com


www.voice-commands.com www.science.howstuffworks.com

You might also like