You are on page 1of 22

A SEMINAR ON BIOMETRICS SECURITY SYSTEM

BE COMPUTER SEMINAR
INTRODUCTION
Biometrics is a rapidly evolving technology Facilitates the automatic identification based on physical or behavioral characteristics Eliminates the need to memorize a password or carry some form of token

BE COMPUTER SEMINAR
WHAT IS A BIOMETRIC ?
Science and technology of measuring and
statistically analyzing biological data that is represented in human by patterns unique to every individual

BE COMPUTER SEMINAR
Figure describing the process involved in using the biometric system

BE COMPUTER SEMINAR
SUBSYSTEMS OF BIOMETRIC MODEL
DATA COLLECTION TRANSMISSION SIGNAL PROCESSING DECISION MAKING DATA STORAGE

BE COMPUTER SEMINAR
TYPES OF BIOMETRIC SYSTEM
Fingerprint Verification Hand Geometry Retinal Scanning Iris Scanning Facial Recognition Signature Verification Voice Verification

BE COMPUTER SEMINAR
DETAIL ANALYSIS OF IRIS SCANNING
Iris scan takes about 30sec & 2sec for verification A camera located at about 3 feet focuses on & scans iris from one side This scan is converted into a template Only phase information is used for recognizing iris as amplitude information is depends on extraneous factors

BE COMPUTER SEMINAR

A IRISCODE Sample

BE COMPUTER SEMINAR

Iris scanning enabled Atm

Authenticam used for iris scanning

BE COMPUTER SEMINAR
ADVANTAGES OF IRIS SCANNING
Iris pattern posses high degree of randomness,variability & uniqueness Patterns are apparently stable throughout life Encoding & decision making are tractable Image analysis & encoding time : 1sec Search period : 100000 iris codes/sec

BE COMPUTER SEMINAR
DISADVANTAGES OF IRIS SCANNING
Small target (1cm) to acquire from a distance (1m) Located behind a curved, wet, reflecting surface Obscured by eyelashes,lenses,reflections Partially occluded by eyelids, often dropping Illumination should not be visible or bright

BE COMPUTER SEMINAR
CHARACTERICTICS FOR SELECTING
A BIOMETRIC TECHNOLOGY Accuracy Ease of use Error incidence Cost User acceptance Required security level Long term stability

BE COMPUTER SEMINAR
Character istic Ease of use Error Incidence Accuracy Cost Finger Print High Dryness, Dirt,Age High * Hand Geometr y High Hand Injury,Ag e High * Retina Iris Face Signature Voice Low Glasses Medium Poor Lighting Very High * Medium Lighting, Age,Glas ses High * High Changing Signature s High * High Noise,Co lds,Weath er High *

Very High *

User Acceptan ce
Required Security LTS

Medium

Medium

Medium

Medium

Medium

Medium

High

High High

Medium Medium

High High

Very High High

Medium Medium

Medium Medium

High Medium

BE COMPUTER SEMINAR

METHODS TO RATE BIOMETRICS ACCURACY

FALSE- ACCEPTANCE RATE (FAR)

FALSE- REJECTION RATE (FRR)

BE COMPUTER SEMINAR
The plot of FAR Vs FRR representing
crossover error rate

BE COMPUTER SEMINAR
COST
ANALYSYS FOR BIOMETRICS Hardware Back-end processing power to maintain database Research & testing of the system

User education
Exception processing System maintenance

BE COMPUTER SEMINAR
BIOMETRICS APPLICATIONS
Indian Initiatives

Bioenable Technology, Pune Siemens Information System Ltd., Banglore Axis Software, Pune Jaypeetex ,Mumbai
Internet Security : Litronix, Usa Windows Biometrics : Microsoft Net Nanny Software International Biometric Smart Cards : Polarid & Atmel

Global Developments

BE COMPUTER SEMINAR
FUTURE OF BIOMETRICS
ATM Machine Use Travel & Tourism Public Identity Card

BE COMPUTER SEMINAR
CONCLUSION
Your fingerprints, iris pattern, and voice will verify your identity You can unlock your house or withdraw money from your bank with just a blink of eye, a tap of your finger, or by just showing your face

BE COMPUTER SEMINAR
BIBLIOGRAPHY
Biometrics : Journal of International Biometric Society The Biometrics Constrium ..May 2002 Electronics For You June 2002 www.biometric.com www.bioventric.com http://homepage.ntlworld.com/avanti http://www.ibia.org

BE COMPUTER SEMINAR

BE COMPUTER SEMINAR

You might also like