SlideShare uma empresa Scribd logo
1 de 33
- MAJ PRAVEEN TRIPATHI
A -SYN
AIM
TO ACQUAINT THE CLASS WITH THE
CONCEPT AND APPLICATION OF
BIOMETRICS.
PHASES
PHASE I INTRODUCTION
PHASE II HISTORY OF BIOMETRICS
PHASE III CATEGORIES OF BIOMETRICS
PHASE IV VARIOUS BIOMETRIC SYSTEMS
PHASE V FUTURE TRENDS
PHASE I
INTRODUCTION
 WHAT IS BIOMETRICS?
GREEK “BIO” AND “METRICS”
 BIOMETRICS IS A TECHNOLOGY THAT INVOLVES
AUTHENTICATION TECHNIQUES OF INDIVIDUALS
 BASED ON THEIR PERSONAL OR PHYSICAL ATTRIBUTES.
 STRONG OR TWO-FACTOR AUTHENTICATION IS
BECOMING A DE FACTO STANDARD IN SECURE
COMPUTING ENVIRONMENT.
 STRONG AUTHENTICATION CAN BE COUPLED WITH
PIN , PASSWORD OR A SMART CARD.
 BY REPLACING PINs , BIOMETRIC TECHNIQUES CAN
PREVENT UNAUTHORIZED ACCESS TO :
 ATMs
 CELL PHONES
 SMART CARDS
 DESKTOP PCs
 WORKSTATIONS
PHASE II
HISTORY OF BIOMETRICS
 14TH CENTURY : MERCHANTS IN CHINA USED
CHILDREN’S PALM AND FOOTPRINTS TO DISTINGUISH
THEM FROM ONE ANOTHER.
 19TH CENTURY : ALPHOSE BERTILLON A POLICE CLERK
IN PARIS INVENTED ANTHROPOMETRY . THE SYSTEM
WAS CALLED BERTILLONAGE.
 LATE 19TH CENTURY: FINGERPRINTING STARTED BY
ANTHROPOLOGIST SIR FRANCIS GALTON.
 LATE 20TH CENTURY : AUTOMATED BIOMETRIC
TECHNIQUES STARTED
1993 - FIRST IRIS IDENTIFICATION SYSTEM.
1994 - FIRST IRIS RECOGNITION ALGORITHM WAS
PATENTED
PHASE III
CATEGORIES OF BIOMETRICS
 TWO MODES OF BIOMETRIC SYSTEMS:
VERIFICATION MODE – ONE-TO-ONE COMPARISON OF
CAPTURED BIOMETRIC WITH THE SPECIFIC
TEMPLATE.
IDENTIFICATION MODE – ONE-TO-MANY
COMPARISON AGAINST A BIOMETRIC DATABASE TO
ESTABLISH THE IDENTITY OF AN UNKNOWN
INDIVIDUAL.
 POSITIVE AND NEGATIVE RECOGNITION : NEGATIVE
RECOGNITION USED GENERALLY IN FORENSICS.
BIOMETRIC SYSTEM: BASIC BLOCK DIAGRAM
 ENROLLMENT WHEN SYSTEM IS USED FOR THE FIRST
TIME.
 SENSOR THE INTERFACE BETWEEN THE REAL WORLD &
SYSTEM.
 PRE-PROCESSING ENHANCES THE INPUT BY REMOVING
BACKGROUND NOISE, REMOVING ARTIFACTS FROM THE
SENSOR.
 TEMPLATE GENERATOR GENERATES A TEMPLATE FROM
THE SOURCE.
 MATCHER USES MATCHING ALGORITHM TO COMPARE
TEMPLATES.
PERFORMANCE METRICS
 EXTREMELY SENSITIVE – MAY CAUSE FALSE POSITIVES &
FALSE NEGATIVES.
 SHOULD BE CALIBRATED TO ENSURE ACCURACY.
 FALSE ACCEPT RATE OR FALSE MATCH RATE (FAR/FMR)
PROBABILITY OF INCORRECTLY MATCHING THE INPUT
PATTERN TO NON-MATCHING TEMPLATE IN DATABASE.
TYPE II ERRORS MOST DANGEROUS
 FALSE REJECT RATE OR FALSE NON-MATCH
RATE(FRR/FNMR) PROBABILITY OF FAILING TO MATCH
BETWEEN THE INPUT PATTERN & A MATCHING TEMPLATE
IN DATABASE.
TYPE I ERRORS
 RELATIVE OPERATING CHARACTERISTIC(ROC) CURVE IS
A VIRTUAL CHARACTERIZATION BETWEEN THE FAR &
FRR.
 MATCHING ALGORITCISION GIVES DECISION BASED ON A
THRESHOLD.
 THRESHOLD DIRECTLY PROPORTIONAL TO FRR &
INVERSELY PROPORTIONAL TO FAR.
 CROSSOVER ERROR RATE(CER)
-RATE AT WHICH BOTH ERRORS ARE EQUAL.
-OBTAINED BY ROC CURVE.
-DEVICE WITH LOWEST CER IS THE MOST ACCURATE.
 FAILURE TO ENROLL RATE(FTR) RATE AT WHICH
ATTEMPTS TO CREATE A TEMPLATE FROM AN INPUT ARE
UNSUCCESSFUL.
 FAILURE TO CAPTURE RATE(FTC) PROBABILITY THAT THE
SYSTEM FAILS TO DETECT A BIOMETRIC INPUT.
 TEMPLATE CAPACITY MAX NUMBER OF SETS OF DATA
WHICH CAN BE STORED IN THE SYSTEM.
PHASE IV
VARIOUS BIOMETRIC SYSTEMS
FINGERPRINT
 HUMAN FINGERPRINTS ARE
MADE UP OF RIDGE ENDINGS
& BIFURCATIONS & OTHER
DETAILED CHARACTERISTICS
CALLED MINUTIAE.
 HAS AN EDGE OVER OTHER
ELECTRONIC ACCESS
CONTROL DEVICES.
 BEING INCORPORATED IN DAY TO DAY LIFE LIKE
LAPTOPS, CELL PHONES, CARS & HOUSE/HOTEL
SECURITY.
 BIOMETRIC FINGERPRINTING IS DIFFERENT FROM THAT
OF FORENSICS AS IT ONLY EXTRACTS SPECIFIC
FEATURES FOR LESSER HARD DRIVE SPACE &
QUICKER DATABASE LOOKUPS.
PALM SCAN
 PALM SCANNER RECOGNITION SYSTEMS MEASURE &
ANALYZE THE OVERALL STRUCTURE, SHAPE &
PROPORTIONS OF THE HAND.
 IT INCLUDES THE FIVE FINGERPRINTS ALSO.
 CHARACTERISTICS OF SKIN SURFACE.
HAND GEOMETRY
 SHAPE OF A PERSON’S HAND DEFINES HAND GEOMETRY.
 PERSON PLACES HAND ON A DEVICE THAT HAS
GROOVES FOR EACH FINGER.
 SYSTEM COMPARES THE GEOMETRY OF EACH FINGER &
THE HAND AS A WHOLE TO THE INFORMATION IN A
REFERENCE FILE TO VERIFY THE PERSONS IDENTITY.
RETINA SCAN
 DUE TO COMPLEX STRUCTURE OF BLOOD SUPPLYING
CAPILLARIES, EACH PERSONS RETINA IS UNIQUE.
 RETINA REMAINS UNCHANGED FROM BIRTH TILL DEATH.
 THE BLOOD VESSELS WITHIN RETINA ABSORB LIGHT
MORE READILY THAN THE SURROUNDING TISSUE & ARE
EASILY IDENTIFIED WITH APPROPRIATE LIGHTING.
IRIS SCAN
 AUTOMATED METHOD OF BIOMETRIC IDENTIFICATION THAT
USES MATHEMATICAL PATTERN- RECOGNITION TECHNIQUES
ON VIDEO IMAGES OF THE IRISES OF AN INDIVIDUAL’S EYES.
 UNLIKE RETINAL SCAN,
IRIS RECOGNITION USES
CAMERA TECHNOLOGY
WITH INFRARED ILLUM
TO ACQUIRE IMAGES OF
THE DETAIL RICH, INTRICATE
STRUCTURES OF THE IRIS.
 DIGITAL TEMPLATES ENCODED FROM THESE PATTERNS BY
MATHEMATICAL & STATISTICAL ALGORITHMS ALLOW
UNAMBIGUOUS POSITIVE IDENTIFICATION OF AN INDIVIDUAL.
 THE KEY ADVANTAGE OF IRIS RECOGNITION IS THE STABILITY OF
THE IRIS AS AN INTERNAL , PROTECTED, YET EXTERNALLY VISIBLE
ORGAN OF THE EYE.
 THE CORE ALGORITHMS THAT UNDERLIE IRIS RECOGNITION WERE
DEVELOPED IN THE 1990s BY PROF JOHN DOUGMAN AT UNIVERSITY
OF CAMBRIDGE COMPUTER LAB.
 AS OF 2008, DAUGMAN`S ALGORITHMS ARE THE BASIS OF ALL
COMMERCIALLY DEVELOPED IRIS RECOG SYSTEMS.
FACIAL SCAN
 THIS TECH LOOKS AT SPECIFIC
PARTS OF THE FACE THAT DO NOT
CHANGE SIGNIFICANTLY OVER TIME,
SUCH AS
- UPPER SECTION OF EYE SOCKETS
- AREA SURROUNDING CHEEK
BONES.
- SIDES OF MOUTH.
- DISTANCE BETWEEN THE EYES.
 A COLLECTION OF FACE IMAGES IS USED TO GENERATE
A 2D GRAY-SCALE IMAGE TO PRODUCE A BIOMETRIC
TEMPLATE.
 HIGHLY SENSITIVE SECURITY ENVIRONMENT , SEVERAL
CAMERAS AT DIFFERENT ANGLES SHOULD BE USED TO
PRODUCE AN EXACT SAMPLE.
 TEST FOR LIVENESS- BLINKING OF EYES.
 FACIAL RECOGNITION IS GENERALLY SUBJECT TO
LARGER MARGINS OF ERROR THAN MORE ESTABLISHED
BIOMETRICS SUCH AS FINGERPRINT RECOG.
SIGNATURE DYNAMICS
 DYNAMIC SIGNATURE CAPTURES DISTINCT
BEHAVIOURAL CHARACTERISTICS OF AN INDIVIDUAL`S
SIGNATURE.
 INCL SHAPE, SPEED, STROKE, PEN PRESSURE & TIMING
INFORMATION.
 CONSISTS OF A PEN & A SPECIALIZED WRITING TABLET &
ARE CONNECTED TO A LOCAL OR CENTRAL COMPUTER
FOR TEMPLATE PROCESSING & VERIFICATION.
 INDL MUST SIGN THEIR NAME MULTIPLE TIMES ON THE
TABLET.
 SYSTEM EXTRACTS UNIQUE FEATURES FROM IT LIKE
THE TIME UTILIZED, PRESSURE APPLIED FROM THE PEN,
THE SPEED, OVERALL SIZE & VARIOUS DIRECTIONS OF
STROKES IN THE SIGNATURE.
KEYSTROKE DYANAMICS
 THE KEYSTROKE RHYTHMS OF A USER ARE MEASURED
TO DEVELOPED A UNIQUE BIOMETRIC TEMPLATE OF THE
USERS TYPING PATTERN FOR FUTURE AUTHENTICATION.
 SYSTEM DETERMINES DWELL TIME (THE TIME A KEY
PRESSED) & FLIGHT TIME (TIME BETWEEN KEY UP & THE
NEXT KEY DOWN)
 THE RECORDED KEYSTROKE TIMING DATA IS THEN
PROCESSED THROUGH A UNIQUE ALGORITHM, WHICH
DETERMINES A PRIMARY PATTERN FOR FUTURE
COMPARISON.
VOICE PRINT
 OUR VOICE IS UNIQUE BECAUSE OF THE SHAPE OF OUR
VOCAL CAVITIES & WAY WE MOVE OUR MOUTH WHILE
SPEAKING.
 TO ENROLL IN A VOICE PRINT SYS ONE SHOULD SAY THE
EXACT WORDS AND PHRASES THAT IT REQUIRES.
 DATA USED IN A VOICE PRINT IS A SOUND
SPECTROGRAM.
 A SPECTROGRAM IS BASICALLY A GRAPH THAT SHOWS A
SOUND’S FREQUENCY ON THE VERTICAL AXIS & TIME ON
THE HORIZONTAL AXIS.
 DIFFERENT SPEECH SOUNDS CREATE DIFFERENT
SHAPES WITHIN THE GRAPH.
 SPECTROGRAMS ALSO USE COLORS OR SHADES TO
REPRESENT THE ACOUSTICAL QUALITIES OF SOUND.
PHASE V
FUTURE TRENDS
 THE FUTURE OF BIOMETRICS HOLDS GREAT PROMISE
FOR LAW ENFORCEMENT APPLICATIONS.
 IT IS QUICKLY BECOMING RECOGNIZED AS THE MOST
ACCURATE IDENTIFICATION TECHNOLOGY IN THE
MARKET.
 ACCESS CONTROL FACIAL RECOGNITION
BIOMETRIC TECHNOLOGIES WILL PERMIT AUTH USERS
ENTRY TO A PROPERTY .
IN FUTURE THE SUBJECT WILL NOT HAVE TO STAND
NEAR THE SURVEILLANCE CAMERAS.
 FACIAL RECOGNITION PASSIVE SURVEILLANCE HIDDEN
SURVEILLANCE CAMS WILL BE SET TO MONITOR AN AREA
TO ACCURATELY IDENTIFY A SUSPECT AGAINST A
DATABASE OF MILLIONS IN A SECOND.
 ALERT MANAGEMENT THIS IS A FULLY CUSTOMISABLE
COMMAND CENTER TO GUARD AGAINST POTENTIAL
SECURITY BREECHES.
 CENTER USES REAL-TIME TECHNOLOGIES TO DELIVER
SECURITY ALERTS TO MULTIPLE LOCATIONS THROUGH
PDA AND OTHER MOBILE TECHNOLOGIES.
 FOR BIOMETRICS FIELD TO GROW INDUSTRY
STANDARDS MUST EXIST SO THAT THERE IS THE
GREATEST COMPATIBILITY BETWEEN APPLICATIONS AND
HARDWARE.
CONCLUSION
BIOMETRICS IS THOUGH EXPENSIVE IS A
TECHNOLOGY THAT CAN SIMPLIFY THE PROCESS
OF AUTHENTICTION. THE WIDE VARIETY OF
PHYSICALLY UNIQUE TRAITS GOD HAS GIVEN US
WILL SOON ALLOW US TO LIVE IN A VERY SECURE
PASSWORD-LESS WORLD.
ANY QUESTIONS ???

Mais conteúdo relacionado

Semelhante a Biometrics ... by maj praveen tripathi

Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
I0363068074
I0363068074I0363068074
I0363068074theijes
 
Palm Authentication using Biometrics system
Palm Authentication using Biometrics systemPalm Authentication using Biometrics system
Palm Authentication using Biometrics systemDarshan Parate
 
Mohs Scale of Hardness
Mohs Scale of HardnessMohs Scale of Hardness
Mohs Scale of HardnessMarisha Gupta
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Shannon weaver modell
Shannon weaver modellShannon weaver modell
Shannon weaver modellcsereijudit
 
blockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptxblockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptxanupamas0191
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEArab Federation for Digital Economy
 
The Application of Emerging Technologies to Saving Lives at Sea
The Application of Emerging Technologies to Saving Lives at SeaThe Application of Emerging Technologies to Saving Lives at Sea
The Application of Emerging Technologies to Saving Lives at SeaLloyd's Register
 

Semelhante a Biometrics ... by maj praveen tripathi (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
I0363068074
I0363068074I0363068074
I0363068074
 
Palm Authentication using Biometrics system
Palm Authentication using Biometrics systemPalm Authentication using Biometrics system
Palm Authentication using Biometrics system
 
Mohs Scale of Hardness
Mohs Scale of HardnessMohs Scale of Hardness
Mohs Scale of Hardness
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Shannon weaver modell
Shannon weaver modellShannon weaver modell
Shannon weaver modell
 
Steganography
SteganographySteganography
Steganography
 
Biometrics
BiometricsBiometrics
Biometrics
 
blockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptxblockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptx
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
LIVING MACHINES
LIVING MACHINESLIVING MACHINES
LIVING MACHINES
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAE
 
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
 
The Application of Emerging Technologies to Saving Lives at Sea
The Application of Emerging Technologies to Saving Lives at SeaThe Application of Emerging Technologies to Saving Lives at Sea
The Application of Emerging Technologies to Saving Lives at Sea
 
Brainwave seminar
Brainwave seminarBrainwave seminar
Brainwave seminar
 
Biometrics
BiometricsBiometrics
Biometrics
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Biometrics ... by maj praveen tripathi

  • 1. - MAJ PRAVEEN TRIPATHI A -SYN
  • 2. AIM TO ACQUAINT THE CLASS WITH THE CONCEPT AND APPLICATION OF BIOMETRICS.
  • 3. PHASES PHASE I INTRODUCTION PHASE II HISTORY OF BIOMETRICS PHASE III CATEGORIES OF BIOMETRICS PHASE IV VARIOUS BIOMETRIC SYSTEMS PHASE V FUTURE TRENDS
  • 5.  WHAT IS BIOMETRICS? GREEK “BIO” AND “METRICS”  BIOMETRICS IS A TECHNOLOGY THAT INVOLVES AUTHENTICATION TECHNIQUES OF INDIVIDUALS  BASED ON THEIR PERSONAL OR PHYSICAL ATTRIBUTES.  STRONG OR TWO-FACTOR AUTHENTICATION IS BECOMING A DE FACTO STANDARD IN SECURE COMPUTING ENVIRONMENT.
  • 6.  STRONG AUTHENTICATION CAN BE COUPLED WITH PIN , PASSWORD OR A SMART CARD.  BY REPLACING PINs , BIOMETRIC TECHNIQUES CAN PREVENT UNAUTHORIZED ACCESS TO :  ATMs  CELL PHONES  SMART CARDS  DESKTOP PCs  WORKSTATIONS
  • 7. PHASE II HISTORY OF BIOMETRICS
  • 8.  14TH CENTURY : MERCHANTS IN CHINA USED CHILDREN’S PALM AND FOOTPRINTS TO DISTINGUISH THEM FROM ONE ANOTHER.  19TH CENTURY : ALPHOSE BERTILLON A POLICE CLERK IN PARIS INVENTED ANTHROPOMETRY . THE SYSTEM WAS CALLED BERTILLONAGE.  LATE 19TH CENTURY: FINGERPRINTING STARTED BY ANTHROPOLOGIST SIR FRANCIS GALTON.  LATE 20TH CENTURY : AUTOMATED BIOMETRIC TECHNIQUES STARTED 1993 - FIRST IRIS IDENTIFICATION SYSTEM. 1994 - FIRST IRIS RECOGNITION ALGORITHM WAS PATENTED
  • 10.
  • 11.  TWO MODES OF BIOMETRIC SYSTEMS: VERIFICATION MODE – ONE-TO-ONE COMPARISON OF CAPTURED BIOMETRIC WITH THE SPECIFIC TEMPLATE. IDENTIFICATION MODE – ONE-TO-MANY COMPARISON AGAINST A BIOMETRIC DATABASE TO ESTABLISH THE IDENTITY OF AN UNKNOWN INDIVIDUAL.  POSITIVE AND NEGATIVE RECOGNITION : NEGATIVE RECOGNITION USED GENERALLY IN FORENSICS.
  • 12. BIOMETRIC SYSTEM: BASIC BLOCK DIAGRAM
  • 13.  ENROLLMENT WHEN SYSTEM IS USED FOR THE FIRST TIME.  SENSOR THE INTERFACE BETWEEN THE REAL WORLD & SYSTEM.  PRE-PROCESSING ENHANCES THE INPUT BY REMOVING BACKGROUND NOISE, REMOVING ARTIFACTS FROM THE SENSOR.  TEMPLATE GENERATOR GENERATES A TEMPLATE FROM THE SOURCE.  MATCHER USES MATCHING ALGORITHM TO COMPARE TEMPLATES.
  • 14. PERFORMANCE METRICS  EXTREMELY SENSITIVE – MAY CAUSE FALSE POSITIVES & FALSE NEGATIVES.  SHOULD BE CALIBRATED TO ENSURE ACCURACY.  FALSE ACCEPT RATE OR FALSE MATCH RATE (FAR/FMR) PROBABILITY OF INCORRECTLY MATCHING THE INPUT PATTERN TO NON-MATCHING TEMPLATE IN DATABASE. TYPE II ERRORS MOST DANGEROUS  FALSE REJECT RATE OR FALSE NON-MATCH RATE(FRR/FNMR) PROBABILITY OF FAILING TO MATCH BETWEEN THE INPUT PATTERN & A MATCHING TEMPLATE IN DATABASE. TYPE I ERRORS
  • 15.  RELATIVE OPERATING CHARACTERISTIC(ROC) CURVE IS A VIRTUAL CHARACTERIZATION BETWEEN THE FAR & FRR.  MATCHING ALGORITCISION GIVES DECISION BASED ON A THRESHOLD.  THRESHOLD DIRECTLY PROPORTIONAL TO FRR & INVERSELY PROPORTIONAL TO FAR.  CROSSOVER ERROR RATE(CER) -RATE AT WHICH BOTH ERRORS ARE EQUAL. -OBTAINED BY ROC CURVE. -DEVICE WITH LOWEST CER IS THE MOST ACCURATE.
  • 16.  FAILURE TO ENROLL RATE(FTR) RATE AT WHICH ATTEMPTS TO CREATE A TEMPLATE FROM AN INPUT ARE UNSUCCESSFUL.  FAILURE TO CAPTURE RATE(FTC) PROBABILITY THAT THE SYSTEM FAILS TO DETECT A BIOMETRIC INPUT.  TEMPLATE CAPACITY MAX NUMBER OF SETS OF DATA WHICH CAN BE STORED IN THE SYSTEM.
  • 18. FINGERPRINT  HUMAN FINGERPRINTS ARE MADE UP OF RIDGE ENDINGS & BIFURCATIONS & OTHER DETAILED CHARACTERISTICS CALLED MINUTIAE.  HAS AN EDGE OVER OTHER ELECTRONIC ACCESS CONTROL DEVICES.  BEING INCORPORATED IN DAY TO DAY LIFE LIKE LAPTOPS, CELL PHONES, CARS & HOUSE/HOTEL SECURITY.
  • 19.  BIOMETRIC FINGERPRINTING IS DIFFERENT FROM THAT OF FORENSICS AS IT ONLY EXTRACTS SPECIFIC FEATURES FOR LESSER HARD DRIVE SPACE & QUICKER DATABASE LOOKUPS. PALM SCAN  PALM SCANNER RECOGNITION SYSTEMS MEASURE & ANALYZE THE OVERALL STRUCTURE, SHAPE & PROPORTIONS OF THE HAND.  IT INCLUDES THE FIVE FINGERPRINTS ALSO.  CHARACTERISTICS OF SKIN SURFACE.
  • 20. HAND GEOMETRY  SHAPE OF A PERSON’S HAND DEFINES HAND GEOMETRY.  PERSON PLACES HAND ON A DEVICE THAT HAS GROOVES FOR EACH FINGER.  SYSTEM COMPARES THE GEOMETRY OF EACH FINGER & THE HAND AS A WHOLE TO THE INFORMATION IN A REFERENCE FILE TO VERIFY THE PERSONS IDENTITY.
  • 21. RETINA SCAN  DUE TO COMPLEX STRUCTURE OF BLOOD SUPPLYING CAPILLARIES, EACH PERSONS RETINA IS UNIQUE.  RETINA REMAINS UNCHANGED FROM BIRTH TILL DEATH.  THE BLOOD VESSELS WITHIN RETINA ABSORB LIGHT MORE READILY THAN THE SURROUNDING TISSUE & ARE EASILY IDENTIFIED WITH APPROPRIATE LIGHTING.
  • 22. IRIS SCAN  AUTOMATED METHOD OF BIOMETRIC IDENTIFICATION THAT USES MATHEMATICAL PATTERN- RECOGNITION TECHNIQUES ON VIDEO IMAGES OF THE IRISES OF AN INDIVIDUAL’S EYES.  UNLIKE RETINAL SCAN, IRIS RECOGNITION USES CAMERA TECHNOLOGY WITH INFRARED ILLUM TO ACQUIRE IMAGES OF THE DETAIL RICH, INTRICATE STRUCTURES OF THE IRIS.  DIGITAL TEMPLATES ENCODED FROM THESE PATTERNS BY MATHEMATICAL & STATISTICAL ALGORITHMS ALLOW UNAMBIGUOUS POSITIVE IDENTIFICATION OF AN INDIVIDUAL.
  • 23.  THE KEY ADVANTAGE OF IRIS RECOGNITION IS THE STABILITY OF THE IRIS AS AN INTERNAL , PROTECTED, YET EXTERNALLY VISIBLE ORGAN OF THE EYE.  THE CORE ALGORITHMS THAT UNDERLIE IRIS RECOGNITION WERE DEVELOPED IN THE 1990s BY PROF JOHN DOUGMAN AT UNIVERSITY OF CAMBRIDGE COMPUTER LAB.  AS OF 2008, DAUGMAN`S ALGORITHMS ARE THE BASIS OF ALL COMMERCIALLY DEVELOPED IRIS RECOG SYSTEMS.
  • 24. FACIAL SCAN  THIS TECH LOOKS AT SPECIFIC PARTS OF THE FACE THAT DO NOT CHANGE SIGNIFICANTLY OVER TIME, SUCH AS - UPPER SECTION OF EYE SOCKETS - AREA SURROUNDING CHEEK BONES. - SIDES OF MOUTH. - DISTANCE BETWEEN THE EYES.  A COLLECTION OF FACE IMAGES IS USED TO GENERATE A 2D GRAY-SCALE IMAGE TO PRODUCE A BIOMETRIC TEMPLATE.
  • 25.  HIGHLY SENSITIVE SECURITY ENVIRONMENT , SEVERAL CAMERAS AT DIFFERENT ANGLES SHOULD BE USED TO PRODUCE AN EXACT SAMPLE.  TEST FOR LIVENESS- BLINKING OF EYES.  FACIAL RECOGNITION IS GENERALLY SUBJECT TO LARGER MARGINS OF ERROR THAN MORE ESTABLISHED BIOMETRICS SUCH AS FINGERPRINT RECOG.
  • 26. SIGNATURE DYNAMICS  DYNAMIC SIGNATURE CAPTURES DISTINCT BEHAVIOURAL CHARACTERISTICS OF AN INDIVIDUAL`S SIGNATURE.  INCL SHAPE, SPEED, STROKE, PEN PRESSURE & TIMING INFORMATION.  CONSISTS OF A PEN & A SPECIALIZED WRITING TABLET & ARE CONNECTED TO A LOCAL OR CENTRAL COMPUTER FOR TEMPLATE PROCESSING & VERIFICATION.  INDL MUST SIGN THEIR NAME MULTIPLE TIMES ON THE TABLET.  SYSTEM EXTRACTS UNIQUE FEATURES FROM IT LIKE THE TIME UTILIZED, PRESSURE APPLIED FROM THE PEN, THE SPEED, OVERALL SIZE & VARIOUS DIRECTIONS OF STROKES IN THE SIGNATURE.
  • 27. KEYSTROKE DYANAMICS  THE KEYSTROKE RHYTHMS OF A USER ARE MEASURED TO DEVELOPED A UNIQUE BIOMETRIC TEMPLATE OF THE USERS TYPING PATTERN FOR FUTURE AUTHENTICATION.  SYSTEM DETERMINES DWELL TIME (THE TIME A KEY PRESSED) & FLIGHT TIME (TIME BETWEEN KEY UP & THE NEXT KEY DOWN)  THE RECORDED KEYSTROKE TIMING DATA IS THEN PROCESSED THROUGH A UNIQUE ALGORITHM, WHICH DETERMINES A PRIMARY PATTERN FOR FUTURE COMPARISON.
  • 28. VOICE PRINT  OUR VOICE IS UNIQUE BECAUSE OF THE SHAPE OF OUR VOCAL CAVITIES & WAY WE MOVE OUR MOUTH WHILE SPEAKING.  TO ENROLL IN A VOICE PRINT SYS ONE SHOULD SAY THE EXACT WORDS AND PHRASES THAT IT REQUIRES.  DATA USED IN A VOICE PRINT IS A SOUND SPECTROGRAM.  A SPECTROGRAM IS BASICALLY A GRAPH THAT SHOWS A SOUND’S FREQUENCY ON THE VERTICAL AXIS & TIME ON THE HORIZONTAL AXIS.  DIFFERENT SPEECH SOUNDS CREATE DIFFERENT SHAPES WITHIN THE GRAPH.  SPECTROGRAMS ALSO USE COLORS OR SHADES TO REPRESENT THE ACOUSTICAL QUALITIES OF SOUND.
  • 30.  THE FUTURE OF BIOMETRICS HOLDS GREAT PROMISE FOR LAW ENFORCEMENT APPLICATIONS.  IT IS QUICKLY BECOMING RECOGNIZED AS THE MOST ACCURATE IDENTIFICATION TECHNOLOGY IN THE MARKET.  ACCESS CONTROL FACIAL RECOGNITION BIOMETRIC TECHNOLOGIES WILL PERMIT AUTH USERS ENTRY TO A PROPERTY . IN FUTURE THE SUBJECT WILL NOT HAVE TO STAND NEAR THE SURVEILLANCE CAMERAS.  FACIAL RECOGNITION PASSIVE SURVEILLANCE HIDDEN SURVEILLANCE CAMS WILL BE SET TO MONITOR AN AREA TO ACCURATELY IDENTIFY A SUSPECT AGAINST A DATABASE OF MILLIONS IN A SECOND.
  • 31.  ALERT MANAGEMENT THIS IS A FULLY CUSTOMISABLE COMMAND CENTER TO GUARD AGAINST POTENTIAL SECURITY BREECHES.  CENTER USES REAL-TIME TECHNOLOGIES TO DELIVER SECURITY ALERTS TO MULTIPLE LOCATIONS THROUGH PDA AND OTHER MOBILE TECHNOLOGIES.  FOR BIOMETRICS FIELD TO GROW INDUSTRY STANDARDS MUST EXIST SO THAT THERE IS THE GREATEST COMPATIBILITY BETWEEN APPLICATIONS AND HARDWARE.
  • 32. CONCLUSION BIOMETRICS IS THOUGH EXPENSIVE IS A TECHNOLOGY THAT CAN SIMPLIFY THE PROCESS OF AUTHENTICTION. THE WIDE VARIETY OF PHYSICALLY UNIQUE TRAITS GOD HAS GIVEN US WILL SOON ALLOW US TO LIVE IN A VERY SECURE PASSWORD-LESS WORLD.