You are on page 1of 29

BIOMETRICS

DEEP WORAH DIV.B

Definition of Biometrics
Automated identification based on physiological or behavioral characteristics Examples

Fingerprints Hand geometry Facial recognition Signature Iris or retinal scan voice recognition Secure identification and personal verification solutions Federal, state and local governments, in the military, and in commercial applications

Application:

Uses:

Hand-based Biometrics
Fingerprint

Identification

Hand

Geometry

Vein

Check

Fingerprint Identification
Matching the characteristics of a fingerprint on file to the one presented to the system. Reliability depends on how many points you match.

Fingerprint Technology Uses

Door Locks

Access Control

Computer work stations Time Clocks In room safes Payment Systems

Combo Systems
Combining

two security methods increases validity.

Such as
a card and fingerprints Pin number and fingerprints

Advantages & Limitations


Inexpensive,

cost range from $100 to

$2000 Convenient, you always have it with you! False acceptance and rejection is estimated at around 0.0001% and less than 1% respectively However others say they can be defeated

Hand Geometry

HandReaders analyze more than 31,000 points and records more than 90 separate measurements of an individual's hand

How Hand Geometry Works


The user places the palm of his hand on a metal surface which has guidance pegs on it. the device can reads the hand attributes. The device then checks its database for verification of the user. The process usually takes less than 5 seconds.

Advantages

Easy for users to work the system - requiring nothing more than placing one's hand on the device. It has no public attitude problems as it is associated most commonly with authorized access. It is also quite resistant to attempts to fool the system. The time and energy required to emulate a person's hand is generally too much to be worth the effort

Limitations
Proprietary

hardware cost Required size of hardware Injuries to hands can cause difficulty in using the reader effectively, Some question its accuracy in general.

Facial Recognition

Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them. The programs take a facial image.

How Facial Recognition Works

Measure characteristics such as


the distance between the eyes, the length of the nose, and the angle of the jaw,

create a unique file called a "template. and matches.

Uses of Facial Recognition


Access

control

ID

verification

Advantages
Accurate Cost-effective Familiar

Limitations

It can be impossible to match images when there are differences in lighting, camera, or camera angle, Some say there are high rates of both "false positives" (wrongly matching innocent people with photos in the database) and "false negatives" (not catching people even when their photo is in the database).

How Voice Recognition Works

compares a prerecorded voice message with the current user.

Can be a data-base system or a stand alone device

Advantages & Limitations

Perfect for telecommunication applications, most of the modern personal computers already possess the necessary hardware to utilize the applications. The error rate for this type of biometric ranges between two and five percent, Some drawbacks to this technology are that voiceprints can vary over the course of the day, and ones health, such as a cold or laryngitis, can affect verification of the user by the system.

Biometrics and the eye


Two

types Retinal Scan Iris Scan

Retinal Scan Technology

Retinal scanning analyses the layer of blood vessels at the back of the eye through a low intensity laser light.

How Retinal Scan Works


The user looks through a small opening in the device at a small green light. The user must keep their head still and eye focused on the light for several seconds During which time the device will verify his identity. This process takes about 10 to 15 seconds total.

Advantages & Limitations

Advantages Most Accurate Biometric System Unlike other forms of biometrics, there is continuity of the retinal pattern throughout life Difficulty in fooling such a device also make it a great long-term, high-security option. Cost Stigma of people believing that it can harm their eye User must remove glasses

Limitations

How Iris Scans Work


Involves

analyzing features found in the colored ring of tissue that surrounds the pupil.

Advantages
Less intrusive of the eye-related biometrics, Uses a fairly conventional camera element and requires no close contact between the user and the reader. higher than average template-matching performance. Iris biometrics work with glasses in place and is one of the few devices that can work well in identification mode.

Limitations
Ease

of use and system integration have not traditionally been strong points with iris scanning devices Cost

Signature verification
Using

and individuals signature to identify them.

How Signature Verification Works

Takes into account


the shape the stroke speed pen pressure, and timing information while the person is creating the signature.

Actual signature recognition is carried out by writing on a pressure sensitive pad with a pen or stylus.

Advantages and Limitatiions


ADVANTAGES No matter how good a forger may be, they will be unable to duplicate exactly all these parameters. A signature is relatively stable over time Acceptance of this method is very high. DISADVANTAGES Cost

THANK YOU

You might also like