SlideShare uma empresa Scribd logo
1 de 19
By:Sunil Kumar Sharma
What is Biometrics?
   Biometrics refers to the automatic identification
    of a person based on his or her physiological or
    behavioural characteristics.

•   BIO-Physical or Behavioral
•   METRICS-To measure characteristics
Physical biometrics:


 Fingerprint
 Facial recognition/face location
 Hand geometry
 Iris scan
 Retinal scan
Behavioral biometrics:


Speaker/voicerecognization:
    Analyzing vocal behavior
Signature/handwriting:
    Analyzing signature dynamics
 Keystroke/patterning:
    Measuring the time spacing of typed words
TWO MAIN USES
1) IDENTFICATION
       -figure out “Who is X?”
       -accomplished by system performing a “one-to-many”
     search

2) VERIFICATION
      -answer the question “Is this X?”
      -accomplished by the system performing a “one-to-one”
    search
Basic Elements
   Sensing Elements
   Processing Elements
   Storage Elements
   Interface Elements
Sensing Elements-The sensing element, or the input interface
element, is the hardware core of a biometrics system and converts
human biological data into digital form. This could be a
complimentary metal oxide semiconductor (CMOS) imager or a
charge coupled device (CCD) in the case of face recognition,
handprint recognition or iris/retinal recognition systems; a
CMOS or optical sensor in the case of fingerprint systems; or a
microphone in the case of voice recognition systems. These
sensors capture the biometric information and convert it into a
digital form that can be processed by the next stage - the
processing elements.
Processing Elements- The processing element is generally a
microprocessor, digital signal processor or computer that
processes the data captured from the sensors. The processing of
the biometric image generally involves image enhancement,
normalization, template extraction, and matching/comparison
of the biometric template during enrolment and authentication
of the users.
Storage Elements- The function of the storage element is to
store the enrolled template that is recalled to perform a match at
the time of authentication. For most identification solutions
(1:N), the storage element would be random access memory
(RAM) or flash EPROM or some other form of memory IC,
and in some other cases it could be a data server. In the case of
verification (1:1), a removable storage element like a contact or
contactless smart card can be used.
Interface Elements- Finally, there is the output interface
element, which will communicate the decision of the biometric
system to the interfaced asset to enable access to the user. This
can be a simple serial communication protocol like RS232, or the
higher bandwidth USB protocol. It could also be the TCP/IP
protocol via a wired medium like 10/100 Ethernet or through a
wireless medium using either the 802.11b protocol, ISM RF
band, RFID, Bluetooth, or one of the many cellular protocols.
Biometric sensor:-acquire images .

Preprocessing:-reference points extraction ,
 contour spacing , binayrization.

Feature extraction:-removal of noise , convert data into
numeric feature template.

Matcher:-
    - Compare extracted template with previously enrolled
  templates.
    - Determine degree of similarity & output matching score.

Decision:-matching score compare with threshold.
Biometrics – How do they work?
   Although biometric technologies
    differ, they all work in a similar
    fashion:
         The user submits a sample that
          is an identifiable, unprocessed
          image or recording of the
          physiological or behavioral
          biometric via an acquisition
          device (for example, a scanner
          or camera)
         This biometric is then processed
          to extract information about
          distinctive features to create a
          trial template or verification
          template
         Templates are large number
          sequences. The trial template is
          the user’s “password.”
An Example:
        A Multi-model System
          Sensors        Extractors      Classifiers     Negotiator



                    ID                                                Accept/
                                                                      Reject
                            Face        Face     Face
                          Extractor    Feature   MLP

               2D (bmp)                                   AND
                            Voice       Voice    Voice
                           Extractor   Feature   MLP
               1D (wav)

Objective: to build a hybrid and expandable biometric app. prototype
Potential: be a middleware and a research tool
A Few Definitions
             Total False Acceptence
       FAR =
              Total False Attempts


                Total False Rejection
        FRR =
                Total True Attempts


        EER is where FAR=FRR
Threshold Analysis



                                 Minimum
                                   cost



     FAR and FRR vs. Threshold
Practical Usages
✓ Government—Passports, national identification (ID) cards,
   voter cards, driver’s licenses, social services.
✓ Transportation—Airport security, boarding passes, and
   commercial driver’s licenses
✓ Healthcare—Medical insurance cards, patient/employee identity
   cards
✓ Financial—Bankcards, ATM cards, credit cards, and debit cards
✓ Retail and gaming—Retail programs, such as check cashing,
   loyalty rewards and promotional cards, and gaming systems for
   access management and VIP programs
✓ Security—Access control and identity verifications, including
   time and attendance
Conclusion
1.   All authentication methods are prone to errors.
     Nevertheless, reliable user authentication must
     ensure that an attacker cannot masquerade as a
     legitimate user
2.   Biometrics is uniquely bound to individuals and
     may offer organizations a stronger method of
     authentication.
3.   Possibly in the near future, you will not have to
     remember PINs and passwords and keys in your
     bags or pockets will be things of the past.
Introduction To Biometrics

Mais conteúdo relacionado

Mais procurados

Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Dr. Vinayak Bharadi
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
 
OVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMSOVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMSAM Publications
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksSaif Salah
 
A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...sipij
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...IJNSA Journal
 
Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Yahoo Developer Network
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHIJNSA Journal
 

Mais procurados (20)

Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
R01754129132
R01754129132R01754129132
R01754129132
 
OVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMSOVERVIEW OF MULTIBIOMETRIC SYSTEMS
OVERVIEW OF MULTIBIOMETRIC SYSTEMS
 
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and Attacks
 
Iciea08
Iciea08Iciea08
Iciea08
 
A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...A novel approach to generate face biometric template using binary discriminat...
A novel approach to generate face biometric template using binary discriminat...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ppt1
Ppt1Ppt1
Ppt1
 
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authen...
 
Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010Biometric Databases and Hadoop__HadoopSummit2010
Biometric Databases and Hadoop__HadoopSummit2010
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iy3615601568
Iy3615601568Iy3615601568
Iy3615601568
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
 
G017544855
G017544855G017544855
G017544855
 

Semelhante a Introduction To Biometrics

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in androidAnshuli Mittal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEMBm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM1000kv technologies
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Finger print and pulse sensor for digital signal processors (dsp)
Finger print and pulse sensor for digital signal processors (dsp)Finger print and pulse sensor for digital signal processors (dsp)
Finger print and pulse sensor for digital signal processors (dsp)Fahad Israr
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 

Semelhante a Introduction To Biometrics (20)

A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Fingerprint based authentication system
Fingerprint based authentication systemFingerprint based authentication system
Fingerprint based authentication system
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Security
SecuritySecurity
Security
 
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEMBm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Finger print and pulse sensor for digital signal processors (dsp)
Finger print and pulse sensor for digital signal processors (dsp)Finger print and pulse sensor for digital signal processors (dsp)
Finger print and pulse sensor for digital signal processors (dsp)
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 

Introduction To Biometrics

  • 2. What is Biometrics?  Biometrics refers to the automatic identification of a person based on his or her physiological or behavioural characteristics. • BIO-Physical or Behavioral • METRICS-To measure characteristics
  • 3. Physical biometrics:  Fingerprint  Facial recognition/face location  Hand geometry  Iris scan  Retinal scan
  • 4. Behavioral biometrics: Speaker/voicerecognization: Analyzing vocal behavior Signature/handwriting: Analyzing signature dynamics  Keystroke/patterning: Measuring the time spacing of typed words
  • 5. TWO MAIN USES 1) IDENTFICATION -figure out “Who is X?” -accomplished by system performing a “one-to-many” search 2) VERIFICATION -answer the question “Is this X?” -accomplished by the system performing a “one-to-one” search
  • 6. Basic Elements  Sensing Elements  Processing Elements  Storage Elements  Interface Elements
  • 7.
  • 8. Sensing Elements-The sensing element, or the input interface element, is the hardware core of a biometrics system and converts human biological data into digital form. This could be a complimentary metal oxide semiconductor (CMOS) imager or a charge coupled device (CCD) in the case of face recognition, handprint recognition or iris/retinal recognition systems; a CMOS or optical sensor in the case of fingerprint systems; or a microphone in the case of voice recognition systems. These sensors capture the biometric information and convert it into a digital form that can be processed by the next stage - the processing elements.
  • 9. Processing Elements- The processing element is generally a microprocessor, digital signal processor or computer that processes the data captured from the sensors. The processing of the biometric image generally involves image enhancement, normalization, template extraction, and matching/comparison of the biometric template during enrolment and authentication of the users. Storage Elements- The function of the storage element is to store the enrolled template that is recalled to perform a match at the time of authentication. For most identification solutions (1:N), the storage element would be random access memory (RAM) or flash EPROM or some other form of memory IC, and in some other cases it could be a data server. In the case of verification (1:1), a removable storage element like a contact or contactless smart card can be used.
  • 10. Interface Elements- Finally, there is the output interface element, which will communicate the decision of the biometric system to the interfaced asset to enable access to the user. This can be a simple serial communication protocol like RS232, or the higher bandwidth USB protocol. It could also be the TCP/IP protocol via a wired medium like 10/100 Ethernet or through a wireless medium using either the 802.11b protocol, ISM RF band, RFID, Bluetooth, or one of the many cellular protocols.
  • 11.
  • 12. Biometric sensor:-acquire images . Preprocessing:-reference points extraction , contour spacing , binayrization. Feature extraction:-removal of noise , convert data into numeric feature template. Matcher:- - Compare extracted template with previously enrolled templates. - Determine degree of similarity & output matching score. Decision:-matching score compare with threshold.
  • 13. Biometrics – How do they work?  Although biometric technologies differ, they all work in a similar fashion:  The user submits a sample that is an identifiable, unprocessed image or recording of the physiological or behavioral biometric via an acquisition device (for example, a scanner or camera)  This biometric is then processed to extract information about distinctive features to create a trial template or verification template  Templates are large number sequences. The trial template is the user’s “password.”
  • 14. An Example: A Multi-model System Sensors Extractors Classifiers Negotiator ID Accept/ Reject Face Face Face Extractor Feature MLP 2D (bmp) AND Voice Voice Voice Extractor Feature MLP 1D (wav) Objective: to build a hybrid and expandable biometric app. prototype Potential: be a middleware and a research tool
  • 15. A Few Definitions Total False Acceptence FAR = Total False Attempts Total False Rejection FRR = Total True Attempts EER is where FAR=FRR
  • 16. Threshold Analysis Minimum cost FAR and FRR vs. Threshold
  • 17. Practical Usages ✓ Government—Passports, national identification (ID) cards, voter cards, driver’s licenses, social services. ✓ Transportation—Airport security, boarding passes, and commercial driver’s licenses ✓ Healthcare—Medical insurance cards, patient/employee identity cards ✓ Financial—Bankcards, ATM cards, credit cards, and debit cards ✓ Retail and gaming—Retail programs, such as check cashing, loyalty rewards and promotional cards, and gaming systems for access management and VIP programs ✓ Security—Access control and identity verifications, including time and attendance
  • 18. Conclusion 1. All authentication methods are prone to errors. Nevertheless, reliable user authentication must ensure that an attacker cannot masquerade as a legitimate user 2. Biometrics is uniquely bound to individuals and may offer organizations a stronger method of authentication. 3. Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past.

Notas do Editor

  1. The objective of the project! The approach: use several algorithms manipulating the same data.