You are on page 1of 25

Manyawar Kanshiram Engineering College O

Information Technology Ambedkar Nagar


A SEMINAR PRESENTATION ON

BIOMETRIC
AUTHENTICATION
PRESENTED BY
INTERNAL GUIDE
AMIT KUMAR
ROLL NO. 1373713007
INFORMATION TECHNOLOGY
B .Tech (4th Sem)

MS.MONICA MOURYA
(ASSISTANT PROFESSOR)

OUTLINE

What is Bio-metric?
Why Biometric Authentication?
Type of bio-metric
Frauds in industry
Identification vs. Authentication

What is Biometrics?
The Word biometrics is derived from greek words bios and metric;
which means life and measurement respectively.
Biometrics is a science and technology of measuring and statically
anyalyzing bioetrical data.

Know

Be

Have

Why Biometric
Application?

To prevent stealing of possessions that


mark the authorised person's identity e.g.
security badges, licenses, or properties
To prevent fraudulent acts like faking ID
badges or licenses.
To ensure safety and security, thus
decrease crime rates

Types of biometrics

Behavioural biometrics

Physical biometrics

Behavioural biometrics

Basically measure the characteristic


which is acquired naturally over a time.

Examples,
Speaker recognition, signature, etc

Physical biometric

It measure the inherent physical characteristics


on an individual.

Example:
Bertillon age :measure the body length (no
longer used)
Finger print
Facial recognition
Hand geometry
Iris scan
DNA

Types of Biometrics

Fingerprint
Face Recognition
Hand Geometry
Iris Scan
Voice Scan
Signature
Retina Scan
Infrared Face and Body Parts
Keystroke Dynamics
Odour
Ear
DNA

1D & 2D Biometrics
1D Biometrics

2D Biometrics (CCD,IR, Laser, Scanner)

FINGER RECONITION

A live acquisition of a
persons fingerprint.
Image Acquisition Image
Processing Template
Creation Template
Matching
Acquisition Devices:
Glass plate
Electronic
Ultrasound

Fingerprint Extraction and


Matching

and Scan

Typical systems measure 90 different


features:
Overall hand and finger width
Distance between joints
Bone structure
Primarily for access control:
Machine rooms
Olympics
Strengths:
No negative connotations nonintrusive
Reasonably robust systems
Weaknesses:
Accuracy is limited; can only be
used for 1-to-1 verification
Bulky scanner

Iris Scan

Image Acquisition Image


Processing Template Creation
Template Matching
Uses to date:
Physical access control
Computer authentication

Facial Scan
Principal Component Analysis

Based on video
Images
Templates can be
based on
previouslyrecorded images
Technologies:
Eigenface Approach
Feature Analysis
(Visionics)
Neural Network

Pattern Recognition Concept


Sensors

Extractors

Classifiers

Image- and
signal- pro.
algo.

Biometrics

Data Rep. Feature


1D (wav),
Vectors

Negotiato
r
Threshold

Scores

Voice, signature
acoustics, face,
2D (bmp,
fingerprint, iris,
tiff, png)
hand geometry, etc

Enrollment

Training
Submission

Decision:
Match,
Non-match,
Inconclusive

An Example:
A Multi-model System
Sensors

Extractors

Classifiers

Negotiator

Accept/
Reject

ID
Face
Face
Face
Extractor Feature MLP
2D (bmp)

AND

Voice
Voice
Voice
Extractor Feature MLP
1D (wav)

Objective: to build a hybrid and expandable biometric app. prototype


Potential: be a middleware and a research tool

Biometric Applications

Identification or Authentication (Scalability)


Semi-automatic or automatic
Subjects cooperative
Storage requirement constraints
User acceptability

Biometrics-enabled
Authentication Applications
1. Cell phones, Laptops, Work Stations, PDA &
Handheld device set.
2. Door, Car, Garage Access

3. ATM Access, Smart card

Image Source : http://www.voice-security.com/Apps.html

AADHAR CARD
The Unique Identification Authority of India
(UIDAI) is the agency of the Government of India
that is responsible for implementing Aadhaar.

Card has:
Biometric
Database Identifier

Biometrics-enabled
Identification Applications
1. Forensic : Criminal Tracking
e.g. Fingerprints, DNA Matching
2. Car park Surveillance
3. Frequent Customers Tracking

Frauds in industry happens in


the following situations:

Safety deposit boxes and vaults


Bank transaction like ATM withdrawals
Access to computers and emails
Credit Card purchase
Purchase of house, car, clothes or jewellery
Getting official documents like birth certificates
or passports
Obtaining court papers
Drivers licence
Getting into confidential workplace
writing Checks

Identification vs. Authentication


Identification

Authentication

It determines the identity of the


person.

It determines whether the person is


indeed who he claims to be.

No identity claim
Many-to-one mapping.
Cost of computation number of
record of users.

Identity claim from the user


One-to-one mapping.
The cost of computation is
independent of the number of
records of users.

Captured biometric signatures


come from a set of known
biometric feature stored in the
system.

Captured biometric signatures may


be unknown to the system.

Main Reference
http://en.wikipedia.org/wiki/Biometrics
http://www.quora.com/Whats-Indias-Aadhar-card-andhow-can-it-be-put-to-its-maximum-use
http://www.Our-Biometric-Future-SurveillanceCommunication/dp/0814732100
http://www.biometricupdate.com/201503/globalgovernment-biometrics-market-to-reach-10-2b-in2025-report

THANKS TO ALL

Queries

You might also like