Biometrics refers to authentication techniques that rely on measurable physical characteristics. There are several types of biometric identification including face, fingerprints, hand geometry, retina, iris, signature, and voice. Biometric characteristics can be physiological, related to the body, or behavioral, related to a person's actions. A biometric system works by enrolling individuals through storing biometric information, then detecting and comparing live biometrics during subsequent uses. Common biometric technologies include fingerprint scans, iris scans, and hand scans. Biometrics are used for physical access control, computer authentication, financial security, and other applications.
2. What is biometrics?
Generally, the study of measurable biological
characteristics. In computer security OR information
technology, biometrics refers to authentication
techniques that rely on measureable physical
characteristics that can be automatically checked.
There are several types of biometric identification scheme:
Face: the analysis of facial characteristics.
Fingerprint: the analysis of an individual’s unique fingerprints.
Hand geometry: the analysis of the shape of the hand and the length
of the finger.
Retina: the analysis of the capillary vessels located at the back of the
eye.
3. Iris: the analysis of the colored ring that surrounds the eye.
Signature: the analysis of the way a persons signs his
name.
Vein: the analysis of pattern of veins in the back of the hand
and the wrist.
Voice: the analysis of the tone,pitch,cadence and frequency
of a person’s voice.
4. Biometric characteristics –
this can be divided in two main
classes-
Physiological are Behavioral are
related to the shape of related to the behavior of
the body. They include a person. They include-
• Typing rhythm
• Fingerprint • Gait
• Face recognition • Voice.
• DNA
• Palm print
• Iris recognition
• Hand geometry
5. A biometric system can operate in the
following two modes:
• VERIFICATION- a one to one
comparison of a captured
biometric with a stored template
to verify that the individual is
who he claims to be. Can be
done in conjunction with a
smartcard, username or id
number.
?
6. • IDENTIFICATION-A one to
many comparison of the captured
biometric against a biometric database in
attempt to identify an unknown individual.
The identification only succeeds in
identifying the individual if the comparison
of the biometric sample to an template in
the database falls within a previously set
threshold.
?
7. HOW DOES BIOMETRIC
SYSTEM WORKS:-
•The first time an individual uses a
biometric system is called an enrollment.
During an enrollment, biometric
information from an individual is stored.
• In subsequent uses, biometric information
is detected and compared with the
information stored at the time of
enrollment.
8. • The first block (SENSOR) is the interface
between the real world and the system; it
has to acquire all the necessary data.
• Most of the time it is an image acquisition
system; but it can change according to the
characteristics desired.
• second block performs all the necessary pre-
processing:it has to remove artifacts from
sensor, to enhance the input, to use some kind of
normalisation.
9. • In the third block necessary features are extracted. This step is an
important step as the correct features need to be extracted optimal
way.
• A vector of numbers of or an image with a particular properties is
used to create a TEMPLATE.
• A template is synthesis of the relevant characteristics extracted from
the source.
• If a matching phase is being performed, the obtained template is
passed to a matcher that compares it with other existing
templates,estimating the distance between them using any
algorithm.
• The matching program will analyze the template with the input. This
will then be the output for any specified use or purpose.
11. Finger-scan
• A live acquisition of
a person’s
fingerprint.
• Image Acquisition
Image Processing
Template
Creation
Template Matching
• Acquisition
Devices:
– Glass plate
– Electronic
– Ultrasound
12. Fingerprint SWAD
• Strengths:
– Fingerprints don’t change over
time
– Widely believed fingerprints are
unique
• Weaknesses:
– Scars
• Attacks:
– Surgery to alter or remove prints
– Finger Decapitation
– “Gummy fingers”
– Corruption of the database
• Defenses:
– Measure physical properties of a
live finger (pulse)
14. Iris Scan: SWAD
• Strengths:
– 300+ characteristics; 200 required for match
• Weaknesses:
– Fear
– Discomfort
– Proprietary acquisition device
– Algorithms may not work on all individuals
– No large databases
• Attacks:
– Surgery (Minority Report )
• Defenses:
15. Hand Scan
• Typical systems measure 90
different features:
– Overall hand and finger
width
– Distance between joints
– Bone structure
• Strengths:
– No negative connotations
– non-intrusive
– Reasonably robust
systems
• Weaknesses:
– Accuracy is limited; can
only be used for 1-to-1
verification
– Bulky scanner
16. Biometric applications
I. Physical Access.
II. Pc And Control Network.
III. Time And Attendance.
IV. Logical Access
V. Financial Security.
VI. Law Enforcement.
VII. Immigrations And Airports.
17. CONCLUSION
Technology is growing rapidly, but at the same time
security breaches and transaction fraud are also in the
increase in the world over .All agencies that are in
need of security have adopted biometrics.
“THE FUTURE DEPENDS UPON WHAT WE DO IN
THE PRESENT”
-MAHATMA GANDHI.
Let us hope for better and safe future.