Sei sulla pagina 1di 17

VISVESVARYA TECHNOLOGICAL UNIVERSITY

BELGAVI-590014

Seminar On
SECURITY ROLE OF
BIOMETRICES IN E-
TRANSACTIONS

Department of Electronics and Communication Engineering


SDM Institute of Technology, Ujire-574240

Guide Name: Student Name:


Prof. Mahesh D S V Vishnu Vardhan Reddy
[4SU15EC096]
Content
• Abstract
• Introduction
• What is Biometrics
• Basic Structure of Biometrics system
• Types
• Characteristics
• Application
• Advantages
• Conclusion
Abstract
As electronics transaction are increasing in day-by-day in common man’s life
therefore it is luring to people involve in unlawful activity to commit frauds
in electronics tractions also. They understand the weakness of the system
and exploit. Though may very effective Public-Private-Key based algorithms
have be developed providing security for transmissions of electronic data
still have room for leakage of key? If we use biometrics based encryption in
electronic transmission then we can ensure most safe transmission of data,
especially in commercial tractions. Let us understand the biometrics and
area which must use it. In any application having electronic communication
has some most common security requirements are Authentication,
Privacy/confidentiality, Integrity and Non-repudiation.

Keywords: Biometric, finger prints, signature, voice


Introduction

• Biometrics are automated methods of


recognizing a person based on a physiological
or behavioral characteristic.
• Biometrics technologies measure a particular
set of a person's vital statistics in order to
determine identity.
What is biometric?
• The word "biometrics" is derived from the
Greek words 'bios' and 'metric';
• which means life and measurement
respectively.
• This directly translates into "life
measurement".
BASIC STRUCTURE OF A BIOMETRIC
SYSTEM
Types of Biometrics
There are two types of biometrics.
1.Behavioral biometrics- Used for verification .
2.Physical biometrics- Used for either identification or verification.

Physical biometrics
• Fingerprint- Analyzing fingertip patterns.
• Facial Recognition- Measuring facial characteristics.
• Hand Geometry- Measuring the shape of the hand.
• Iris recognition- Analyzing features of colored ring of the eye.
• Vascular Patterns- Analyzing vein patterns.
• Retinal Scan- Analyzing blood vessels in the eye.

Behavioral biometrics
• Speaker Recognition- Analyzing vocal behavior.
• Signature- Analyzing signature dynamics.
• Keystroke- Measuring the time spacing of typed words
Characteristics of Biometric
Fingerprint
• Fingerprints are unique for each finger of person
including identical twins.
• Fingerprints are used in forensic and
identification for long time.
• Fingerprint Biometric Systems examine the
unique characteristics of your fingerprints and
use that information to determine whether or
not you should be allowed access.
Face
•The identification of a person by their facial image can be done in a
number of different ways such as by capturing an image of the face in the
visible spectrum using an inexpensive camera or by using the infrared
patterns of facial heat emission.
Retinal scan
•Analyzing the blood vessels in the eye.
Hand Geometry
• Hand geometry recognition systems are based on a number of measurements
taken from the human hand, including its shape, size of palm, and length and
width of the fingers
Applications
• Used in ATM’s for more secure transaction.
• Used in airports for security purposes.
• Computer login
• Credit-card authentication
• Secure financial transaction (e-commerce,
banking).
• Driving licenses and other personal certificates.
• Forensics, birth certificates, tracking missing or
wanted person
Advantages
• Increase security
• Fraud detection
• Increased User Convenience
• High Individual Identification accuracy
• Less exposed to the damage and sudden
changes
• Less Time Consuming
Conclusion
Biometrics can only be limited by limiting one's imagination.
Biometric technology is now being used in almost every
area. Not only that, but various types of biometric systems
are being used to achieve various functionalities. There are
many mature biometric systems available now. Proper
design and implementation of the biometric system can
indeed increase the overall security.
References
[1] IEEE International Conference on Computational Intelligence and Computing
Research paper,2012 pg.06510268
[2] International Journal of Advance Research in Computer Science and
Management Studies Volume 3, Issue 4, April 2015 pg.473-489
[3] https://www.studymafia.org
[4] ANTHONY T., HO S., and YONG L.G.: ‘Image content authentication using
pinned sine transform’, EURASIP J. Appl. Signal Process., 2004, 14, pp. 2174 –
2184
[5] LU C.S.: ‘On the security of structural information extraction/embedding for
image authentication’. Proc. IEEE ISCAS’04, 2004, pp. 169 – 172
[6] https://www.biometrics.org
[7] https://www.scribd.com/doc/12733359/biometrics.com
[8] https://www.slideshare.net/anoop80686

Potrebbero piacerti anche