You are on page 1of 5

Vidya Jyothi Institute of Technology

(Autonomous)
Aziz Nagar, Hyderabad -500075

A Technical Seminar Report


on

BIOMETRIC SECURITY SYSTEMS

Submitted for partial fulfillment of the requirements for the award of the degree
of

BACHELOR OF TECHNOLOGY

IN

COMPUTER SCIENCE & ENGINEERING

BY

B .AJAY KUMAR (15911A0506)

Department of Computer Science & Engineering


VIDYA JYOTHI INSTITUTE OF TECHNOLOGY
(Autonomous)
Himayathnagar (vi), C.B. Post, R.R Dist. 500075

CERTIFICATE

This is to certify that the technical seminar report entitled “BIOMETRIC SECURITY
SYSTEMS” is a bonafide report carried out by B.Ajay Kumar(15911A0506), in partial
fulfillment of the requirements for the award of degree of BACHELOR OF TECHNOLOGY IN
COMPUTER SCIENCE & ENGINEERING to be awarded by the JAWAHARLAL NEHRU
TECHNOLOGICAL UNIVERSITY, Hyderabad.
The content in this report has not been submitted to any other university or institute for the
award of any degree or diploma.

Seminar Co-ordinators : Head of the Department

1.B.Thikkanna Asst. Professor, CSE Dr. B. Vijaya Kumar


2.D.Venkateswarlu Assoc. Professor, CSE. Professor
Department of CSE.
ABSTRACT

Over the last few years a new area of engineering science has been established whose products are
likely to create a large market in the near future. It has been called ''biometrics". The pioneers of this
new domain intend to construct devices which would allow identification of a person on the basis of
his/her ''biological'' characteristics: voice, dynamics of movements, features of face and other parts of
the body, retina or iris pattern. Nature has made human beings with different characteristics which may
vary from one person to another. This property is made use of by Biometric technology to distinctly
identify each person.
Biometric system is essentially a pattern recognition system which recognizes a user by determining
the authenticity of a specific physiological or behavioural characteristic possessed by the user. Several
important issues must be considered in designing a practical biometric system. First, a user must be
enrolled in the system so that his biometric template can be captured. This template is securely stored
in a central database or a smart card issued to the user. The template is retrieved when an individual
need to be identified. Depending on the context, a biometric system can operate either in a verification
(authentication) or an identification mode.
Biometrics refers to the automatic identification of a person based on his/her physiological or
behavioural characteristics. This method of identification offers several advantages over traditional
methods involving ID cards (tokens) or PIN numbers (passwords) for various reasons: (i) the person to
be identified is required to be physically present at the point-of-identification; (ii) identification based
on biometric techniques obviates the need to remember a password or carry a token. With the increased
integration of computers and Internet into our everyday lives, it is necessary to protect sensitive and
personal data. By replacing PINs (or using biometrics in addition to PINs), biometric techniques can
potentially prevent unauthorized access to ATMs, cellular phones, laptops, and computer networks.
Unlike biometric traits, PINs or passwords may be forgotten, and tokens like passports and driver's
licenses may be forged, stolen, or lost.
Contents:

• 1. Introduction --------------------------------------------------------------- 5
• 2. Overview ------------------------------------------------------------------ 6
• 3. Biometricals ---------------------------------------------------------------- 6
o 3.1 Facial Cognitive Biometric Systems -------------------------- 8
o 3.2 Handwriting ------------------------------------------------------ 9
o 3.3 Hand and Finger geometry -------------------------------------- 10
o 3.4 Voice prints ---------------------------------------------------- 11
o 3.5 Iris Scanning --------------------------------------------------- 12
o 3.6 Vein Geometry ------------------------------------------------ 13
• 4. Comparison of various biometric technologies ---------------------- 14
• 5. Biometric systems -------------------------------------------------------- 17
• 6. Functions ------------------------------------------------------------------ 18
• 7. Performance --------------------------------------------------------------- 18
• 8. Issues and concerns ------------------------------------------------------ 21
o 8.1 Privacy ----------------------------------------------------------- 22
o 8.2 Biometrics sensors obstacles ---------------------------------- 23
o 8.3 Marketing of biometric products ----------------------------- 23
o 8.4 Sociological concerns ------------------------------------------ 24
o 8.5 dangers to owners of secured items --------------------------- 24
o 8.6 Interoperability --------------------------------------------------- 24
• 9. Cancelable Biometrics ---------------------------------------------------- 25

• 10. Uses and initiatives ------------------------------------------------------ 26


• 11. The Future of Biometrics ------------------------------------------------ 31

You might also like