You are on page 1of 43

SUBMITTED BY

15-ARID-1690
15-ARID-1805
Biometric System
 The term “biometrics” is derived from
the Greek words “bio” (life) and
“metrics” (to measure).
 Automated method
 Pattern recognition system
 Specific physiological or behavioral
characteristics
Traditional System

Whereas traditional means


of access control include
token based identification
systems, such as a driver's
license or passport, and knowledge based
identification systems, such as a passwords
personal identification
Traditional System
HOW Biometric System WORKS

 The hardware captures the salient


human characteristic
 The software interprets the resulting
data and determines acceptability.
CHARACTERISTICS USED

 Fingerprints
 Facial features
 Writing patterns
 Iris patterns
 Hand geometry
 DNA
Finger Print
Stages

 Fingerprint Scanning

 Fingerprint Matching

 Identification
Advantages

 Very high accuracy.


 Is the most economical biometric PC
user authentication technique.
 It is one of the most developed
biometrics technique.
 Easy to use.
Disadvantages

 It can make mistakes with the dryness or dirty


of the finger’s skin, as well as with the age (is
not appropriate with children, because the
size of their fingerprint changes quickly).
 Image captured at 500 dots per inch (dpi).
Resolution: 8 bits per pixel. A 500 dpi
fingerprint image at 8 bits per pixel
demands a large memory space, 240
Kbytes approximately .
Door Lock
Iris recognition
IRIS RECOGNITION

 Pattern recognition technique


 Identification by mathematical
analysis of the random pattern
 Based upon the qualities of the Iris
Iris Properties

 High degree of Randomness


 No two Iris are alike
 Stable in a persons life
 Doesn't vary with changes
Iris is a protected internal organ whose
random texture is stable throughout life
Advantages
 Very high accuracy.
 Verification time is generally less than 5
seconds
 Disadvantages
 Very expensive
 A lot of memory for the data to be stored.
IRIS DEVICES
Facial recognition
 A facial recognition system is a computer
application for automatically identifying or
verifying a person from a digital image or a video
frame from a video source
Advantages
 Non intrusive
 Cheap technology.
 Disadvantages
 2D recognition is affected by changes in
lighting ,the person’s hair, the age, and
if the person wear glasses.
 
DNA
DNA
 DNA profiling (also called DNA testing,
DNA typing, or genetic fingerprinting) is a
technique employed by forensic scientists to
assist in the identification of individuals by
their respective DNA profiles.
 
Advantages

 Very high accuracy.


 It impossible that the system made
mistakes.

Disadvantages
 Very expensive.
Signature Recognition
Signature Recognition

Signature recognition is a behavioral biometric.


It can be operated in two different ways
1. Static
2. Dynamic
Advantages
 Non intrusive.
 Little time of verification (about five seconds).
 Cheap technology.
 Disadvantage
 Signature verification is designed to verify
subjects based on the traits of their unique
signature. As a result, individuals who do not
sign their names in a consistent manner may have
difficulty enrolling and verifying in signature
verification.
 Error rate: 1 in 50.
Hand Geometry

 Overall hand and finger width


 Distance between joints
 Bone structure
Advantages
 Though it requires special hardware to use, it can
be easily integrated into other devices or systems.
 It has no public attitude problems as it is
associated most commonly with authorized access .
Disadvantages
 Very expensive
 It is not valid for arthritic person, since they
cannot put the hand on the scanner properly.
Biometric Applications
 Voting system
 Internet transaction
 Banking system
 Time and attendance reporting
 ATM transaction verification
 security alarm control
 Verification of signatures

 identity checks
 Process control security
 Cellular telephone security
Biometric Voting/ Electronic Voting
Traditional Voting System

Traditional voting system has four phase


 Authentication
 Vote
 Vote counting
 Verification
Biometric voting system
 Electronic voting
 Electronic vote counting
 Electronic voting machine
 Time and date
 Result
Internet transactions
• The most obvious use of biometrics
for network security is for secure
workstation logons for a workstation
connected to a network.
• The main use of Biometric network
security will be to replace the current
password system.
• Additional security over the current
multi-factor authentication system
used in Internet banking to perform
transactions from a PC or a tablet.
 
Biometric in the financial transactions
on social networking site:

• ID and password
authentication on Facebook.
Can be easily captured using
the webcam and microphone
available in computers
• Major advantage of using
biometrics . Users can easily
replacing their traditional
Facebook user ID and
password login combination
with a fully biometric one.
• WAP enabled mobile phone provides the
Security measures on internet by the biometrics data use
 

facilities to consumers to shop online.


• Credit cards continue to be an efficient tool
for online money transactions.
• Make configurations to that effect in her/his
account. system through their voiceprint
Biometric in Banking
Traditional System

Handwritten signature lost their place.


 Greater need for a highly secure identification
and personal verification.
 Biometric system provide security for banks
consumer against theft, hacking and
eavesdropping etc..
Benefits of Biometric Security
measure
 Provide authentication of large number of
individuals by measure their particular
characteristics.
 Concept of security verification has undergoes a
dynamic shift.
 The efficiency of any scientific technology in
many folds better then the performance of manual
effort for a particular vocation.
 Factor of Authenticity .Factor of Price. Factor of
time. Factor of Standardization. Factor of
Reliability. Public Acceptance
Factor of Authenticity

Factor of Price
Factor of time

Factor of
Standardization
Public Acceptance

Factor of
Reliability
Conclusion
 Biometric systems have ensured to automate the task
of recognition through different hand geometry, voice
prints and iris pattern techniques. The error rate is
extremely low in such authentication schemes. In
order to constantly defeat any attempt of hacking the
personal and confidential information of the
commercial organizations, biometrics technology has
to constantly upgrade and improve its standards and
protocols. Hope so after some coming years Pakistan
also have the improved or advance technology of
biometric in every field, INSHALLAH

You might also like