Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
BELGAVI-590014
Seminar On
SECURITY ROLE OF
BIOMETRICES IN E-
TRANSACTIONS
Physical biometrics
• Fingerprint- Analyzing fingertip patterns.
• Facial Recognition- Measuring facial characteristics.
• Hand Geometry- Measuring the shape of the hand.
• Iris recognition- Analyzing features of colored ring of the eye.
• Vascular Patterns- Analyzing vein patterns.
• Retinal Scan- Analyzing blood vessels in the eye.
Behavioral biometrics
• Speaker Recognition- Analyzing vocal behavior.
• Signature- Analyzing signature dynamics.
• Keystroke- Measuring the time spacing of typed words
Characteristics of Biometric
Fingerprint
• Fingerprints are unique for each finger of person
including identical twins.
• Fingerprints are used in forensic and
identification for long time.
• Fingerprint Biometric Systems examine the
unique characteristics of your fingerprints and
use that information to determine whether or
not you should be allowed access.
Face
•The identification of a person by their facial image can be done in a
number of different ways such as by capturing an image of the face in the
visible spectrum using an inexpensive camera or by using the infrared
patterns of facial heat emission.
Retinal scan
•Analyzing the blood vessels in the eye.
Hand Geometry
• Hand geometry recognition systems are based on a number of measurements
taken from the human hand, including its shape, size of palm, and length and
width of the fingers
Applications
• Used in ATM’s for more secure transaction.
• Used in airports for security purposes.
• Computer login
• Credit-card authentication
• Secure financial transaction (e-commerce,
banking).
• Driving licenses and other personal certificates.
• Forensics, birth certificates, tracking missing or
wanted person
Advantages
• Increase security
• Fraud detection
• Increased User Convenience
• High Individual Identification accuracy
• Less exposed to the damage and sudden
changes
• Less Time Consuming
Conclusion
Biometrics can only be limited by limiting one's imagination.
Biometric technology is now being used in almost every
area. Not only that, but various types of biometric systems
are being used to achieve various functionalities. There are
many mature biometric systems available now. Proper
design and implementation of the biometric system can
indeed increase the overall security.
References
[1] IEEE International Conference on Computational Intelligence and Computing
Research paper,2012 pg.06510268
[2] International Journal of Advance Research in Computer Science and
Management Studies Volume 3, Issue 4, April 2015 pg.473-489
[3] https://www.studymafia.org
[4] ANTHONY T., HO S., and YONG L.G.: ‘Image content authentication using
pinned sine transform’, EURASIP J. Appl. Signal Process., 2004, 14, pp. 2174 –
2184
[5] LU C.S.: ‘On the security of structural information extraction/embedding for
image authentication’. Proc. IEEE ISCAS’04, 2004, pp. 169 – 172
[6] https://www.biometrics.org
[7] https://www.scribd.com/doc/12733359/biometrics.com
[8] https://www.slideshare.net/anoop80686