An Introduction
to
BIOMETRICS
Agenda
• Introduction To Biometrics
• Definition Of Biometrics
• Mode Of Biometrics
• Type Of Biometrics
• Fingerprint Recognition
• Application
How Can I Know Who You Are ?
How Can You Prove it ?
Identifying Individuals
There are three common ways of identifying an
individual's identity
•Token ---- What the individual has
An Identification Card, Badge, Magnetic Strip Card
•Secret/Knowledge ---- What the individual
Knows/Owns
A Password or Personal Identification Number (PIN)
•Biometrics ---- What the individual is or does
Biometrics …….. The Definition
“The Automated reorganization of individuals
based on their behavioral and Biological
characteristics.”
The term “ Biometrics” is derived from the Greek
words Bio ( Means ‘Life’ ) and Metric (means
‘To Measure’ )
Biometrics …….. The Truth
• Universal : Each person should have the
specific Biometric character.
• Unique (Just Distinguishable) : Any two
people should be sufficiently different in terms of the
characteristics.
• Collectible : Biometric characters must be
obtainable.
• Permanent : Characters remain invariable over
time, allowing for repeatable measures.
How It Works
Type Of Biometrics
• Biological • Behavioral
Face Signature
Finger Keystroke
Hand Voice
Iris Gait
Vein
Retina
Imaging
Ear
Odor
SECURITY AT
YOUR
FINGERTIP
Fingerprint Recognition
Fingerprint recognition is a Biometric technique
which use different characteristics of a person’s
fingerprint.
The use of fingerprints as a means of
identification were first used by the Chinese in
500 B.C.
Details About Fingerprint
Tool Used
Finger Token is essentially a personal password
storage tool with all the capabilities required for
fingerprint authentication—scanning fingerprints,
storing fingerprint reference data, and matching
the verification.
Digital Fingerprint
Any image data can be converted into digital
information with the combination of “0” and “1”. In this
case, even though we convert a fingerprint into digital
data, the property of uniqueness of a fingerprint is still
valid.
< Conversion without loss>
> 00011101101010000111101
Eg.
< Conversion with allowing loss >
0 1 1 0 0 1 1
Fig..Conversion of fingerprint to Binary data
The second row of binary fingerprint is created by
taking every third bit of the first row of full conversion
of original fingerprint. Therefore a fingerprint can be
converted into unlimited number of new digital
fingerprint.
Pattern Matching
Have a digitalized target data & digitalize the fingerprint ;
now we should enter pattern-mapping phase
To map the pattern of the fingerprint into the data, we use a
brute-force matching between the fingerprint and the data.
Starting from the first bit of fingerprint, step by step find the
maximum length of bits of fingerprint that is matching with
the content bits of the data.
Eg.
For eg: there are two
sequence of binary
information one is for
fingerprint and other for
data.
Overall Process
Pattern
Encoding
Fingerprint Scanning
1001
1111
0001
1101
Mapping+Fingerprint
Pattern
Mapping
01010101
01110110
0101010 0100110 010101 1001
01110100
0111011 0111011 011101 1111
01010111
0111010 0001010 011101 0001
0101011 0101011 010101 1101
Distribution Extract
Create Data to other users Fingerprint
Applications
Forensics
Information system/computer network security
Electronic commerce and electronic banking
Fingerprint-based national ID systems
Fingerprint-based voter and driver registration
Others
Face Recognition
Based on location and shape of
facial attributes such as the eyes,
eyebrows, nose, lips and chin, as
well as their relationship to each
other
Hand Recognition
Based on measurements of the hand
Iris Recognition
Iris is the area between
the pupil and the sclera.
Iris carries very
distinctive information. 1
in (10)78 – chance of
someone having an
identical iris as you.
Others
Vein Recognition
•Finger based
•Top of hand based
•Palm
Keystroke Recognition
How an individual types on a keyboard
Voice Recognition
•Text dependent Keystroke press time
Voice recognition system is based
on utterances of a fixed pre-
determined phrase
• Text independent
Voice recognition system recognizes Keystroke latency time
the speaker independent of what
they say
Pros & Cons
• Pros: • Cons
The uniqueness Still very expensive
of biometric
attributes The hardware and
software must be
No question of integrated properly
forgetting passwords
System may not
More difficult to recognize a valid user
replicate a biometric
feature at the data Biometric
acquisition stage authentication gives a
likelihood of a match
Fusion
When more than one biometric is combined,
fusion occurs.
Multi-modal
Conclusion
Most security breaches are due to weak
authentication…….
Is Biometrics the answer ?
Thank
you