Sei sulla pagina 1di 27

Outline of presentation

Introduction to Biometrics Essential of Biometric what, why, how system model Biometric authentication methods Application domain of Biometric Future research Summary Conclusion
2

Aim

A study on Biometrics and its


infusion into Information Technology world

Objectives

Literature survey on Biometrics Understanding the essentials of Biometrics and safety concerns Importance of various Biometrics to minimize the security hazards in various applications.
4

Introducing

Way back in Japan, Henry Faulds studied the prints left behind by craftsmen on ancient clay fragments. He then came up with a convincing theory that each individual had unique finger prints.

A little later, a fellow worker was arrested by the police for a petty crime. Faulds exonerated the man by showing that the finger prints on the crime scene did not match with his friend Thus in the 1880s, began the journey of the most promising science of identification and recognition: BIOMETRICS.
5

Definition

Biometric verification is an automated


method whereby an individuals identity is confirmed by examining a unique physiological trait or behavioral characteristic..!
6

What..?

Physiological traits Are the stable physical characteristics, such as palm prints and iris patterns.

Behavioral characteristic are such as one's signature, voice, or keystroke dynamics.

Why BIOMETRICS?
The question always been; Isnt the 16-digit password or token good enough? But these Passwords or Tokens are

Breakable
Anyone with basic knowledge of computers can crack passwords Myriad free programs available on the Internet

So, its simple - Biometrics are more secure.


8

How Biometric Processes Work

The concept of Biometric is simple. As defined, a biometric system is a real-time identification system which identifies a person by measuring a particular physical or behavioral characteristic. The system has some pre-stored data. You approach the system, the trait or characteristic is scanned and matched with a record of prints already in its database. Only when it finds a match, access is granted. Comparing to a library of characteristics belonging to many people is important as it is necessary to adjust to the threshold and identify specific points of data as match points of a each persons library data.
9

Biometric Processes

contd..

Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic.
Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person.
10

Biometric model can be


Extracted features
Signal processing

Raw data Data collection

Template Matching Storage

Match score

Application

Decision Authentication decision

Schematic block representation of Biometric model

11

AUTHENTICATION METHODS

Physical Biometrics
Finger print DNA Iris Retina Face Hand geometry

Behavioral biometrics
Voice Signature Keystroke dynamics

12

Finger printing

Optical fingerprint sensor [Fingerprint Identification Unit ]

Finger print samples


13

Face recognition

Face recognition system [One-to-One by Biometric Access]

Elastic Bunch Map Graphing

14

DNA & Voice recognition

DNA sample

Voice sample

15

Hand geometry & Palm vascular recognition

Hand geometry reader by Recognition Systems

Palm vascular recognition

16

Signature recognition

Electronic pen [LCI-SmartPen]

17

Iris authentication

System for active iris recognition by IrisScan

18

Retina authentication

Retinal recognition system

19

Which biometric method / product is best?

Depends on the application


Reliability Security Performance Cost User acceptance Liveness detection Size of sensor
20

Application domains
Access control
To devices To local services To remote services

Physical access control


To high security areas & public buildings or areas

Time & attendance control Identification


Forensic person investigation Social services applications, e.g. immigration or prevention of welfare fraud Personal documents, e.g. electronic drivers license or ID card
21

Future Research
With Biometrics, an automated biometricsbased identification / verification system. Research is intense on authentication methods such as Vein pattern , Ear shape , Body odor , Body salinity (salt). The next few years all will see just about every thing come with biometric protection. Mobile phones, MP3 players, cars, laptops, building access, locker access.
22

Summary
Safety Management aims at minimizing the chances of risks, threats or hazards to confidential information. With the rise of fraud, threats & thefts in and around our world, the importance of
The safety of vital information, Protection of information or data and Security measures are increasing, leading to growing relevance of skills in securing anything of importance. In other words, Rise & expansion of Biometrics.
23

Conclusion
Biometrics is a very interesting and exciting field that has be growing exponentially in recent years. The wide variety of physically unique traits our body gives us will soon allow us to live in a very secure password-less world. As the demands for high-performance and highly reliable biometrics-based identification/verification systems increase, more hybrid biometrics-based systems are expected to be developed to meet the ever-increasing needs for automated personal identification The goal is to provide a more secure working environment in a cost effective and user friendly way 24

A quote Uncertainty is the only certainty there is, and knowing how to live with insecurity is the only security.
John Allen Paulos quotes.
25

From now

BIOMETRICS
will be the door way to all accessible information

Thank you
26

Bibliography

www.biometricsinfo.org, retrieved on 6-3-2010 www.bioenabletech.com, retrieved on 7-3-2010 www.biometrix.at, retrieved on 7-3-2010 http://www.scribd.com/doc/23575097/Biometrics, retrieved on 73-2010 http://www.scribd.com/doc/21451971/IT-in-BusinessOrganisation, retrieved on 8-3-2010 http://www.scribd.com/doc/18797148/A-Turning-Point-forBiometrics, retrieved on 8-3-2010 http://www.scribd.com/doc/25087632/Business-Organisation, retrieved on 9-3-2010 Management Information system by Waman S Jawadekar Management Information system by Dharminder Kumar & Sangeeta Gupta 27

Potrebbero piacerti anche