Sei sulla pagina 1di 24

Seminar on

Guided By: Upadhyay Darshan

Prepared By: Patel Harvi (002)

WHAT SECURITY ? WHY SECURITY ?


SECURITY SYSTEM ALEXENDAR FISH & LINAS YEL - 1844

INTRODUCTION
BIO = PERTAINING TO BIOLOGY & METRICS = SCIENCE OR ART OF MEASUREMENT FUNDAMENTAL OPERATIONS 1.CAPTURE 2.EXTRACTION 3.COMPARISON 4.MATCH/NONMATCH

A FEW DEFINATION
BIOMETRICS AUTHENTICATION BIOMETRICS,BIOMETRIC OR BIOMETRY AUTHENTICATION Vs IDENTIFICATION

HISTORY OF BIOMETRICS
FRANCIS GALTON 1892. In 1968, Biometrics technique was implemented in New York bank. But after1990, IT comes in picture ,through Its advancement and simplicity Biometrics Technique become very popular.

GENERIC MODEL OF BIOMETRICS

PHASE OF BIOMETRICS
1.INPUT 2.PROCESS 3.OUTPUT

BIOMETRICS IDENTIFICATION
1. 2. 3. 4. 5. 6. 7. 8. 9. VOICE PRINT FINGER PRINT IRIS PATTERN FACE PRINT HAND GEOMETRY RETINAL SCAN KEYSTROKE DYNAMICS FACIAL RECOGNITION SIGNATURE RECOGNITION

VOICE PRINT
Voice print is recorded by microphones. Voice print is determined by many different factors: size of vocalcactivites (throat, oral, nasal) as well as the characteristic of the vocal chords themselves. Your voice is further modified by the way you speak the way your mouth, lips, teeth, jaw and tongue move. Therefore, the chance of two people have

BACK

FINGER PRINT

Finger print is also called finger scanning. To scan the finger print, a special kind of scanner that can work with optical rays is used. it fetches the diagram of finger print & delivers it to the computer where a special programmer measures the distance between the special features & that print. Here, those special features are core, split, island, end &delta. Most fingerprint data takes up around 250kb BACK

IRIS PATTERN

Iris is located behind the cornea of the eye and front of the lens. Its only physiological purpose is to control the amount of light that enters the eye through the pupil, but iss construction from elastic connective tissue gives it a complex, fibrillous pattern. Finger print technique there are only 90 special features, but in iris pattern there are 266 special features.
BACK

FACE PRINT

It use various features of the face to recognize or verify a user. Use various kind of camera and computer . The computer converted this feature into digital form. . BACK

HAND GEOMETRY

Most widely used biometrics sys. It use the geometric shape of the hand for authenticating the users identity. Generally two method is used: 1. mechanical. 2. Image edge detection. Hand scanner is used in this method which is shown in fig. BACK

RETINA SCAN
Retina scan method is based on the blood vessel pattern in the retina of eye. The device used in this method is shown in the fig. on this the user position there head against a support and a low power infrared light is directed against the back of the retina.

BACK

KEYSTROKE DYNAMICS
This method analyzes the way in which a user types at a computer keyboard. The durations of keystrokes and the latencies between them are recorded

BACK

FACE RECOGNITON
Facial recognition technique has recently developed into two areas of study; 1. Facial metrics. 2. Eigenfaces.

BACK

SIGNATURE RECOGNITION
It is based on the dynamics of making the signature. i.e. accretion rates, direction, pressure, stroke length etc. The problem is measurement used in the recognition process and repeatability of the signature.

NEXT

BACK

BIOMETRICS CAPTURED USING WEB CAM AND MICROPHONE

COMPARISON OF BIOMETRICS TECHNIQUES


Biometrics
Retinal Scan Iris Scan Fingerprints Hand Geometry Signature Dynamics Voice Dynamics

Crossover Accuracy
1:10,000,000+ 1:131,000 1:500 1:500 1:50 1:50

Table show the crossover accuracy of different biometrics. crossover accuracy is the ratio of the crossover Frequency as compared to the whole population of tested data.

HOW WELL DO BIOMETRICS WORK?

FALSE ACCEPT RATE FALSE REJECT RATE EQUAL ERROR RATE VALIDITY OF DATA

IS DNA A BIOMETRICS?
DNA differs from standard biometrics in several ways. DNA is type of biometric in as much as it is the use of physiological characteristic two verify or determine identity.

ABOUT BIOMETRICS
Where Biometrics is used? The new opportunities & Future Technologies. Benefits.

CONCLUSION
We conclude that for biometrics is better technique for any security. This technique is improved then unauthorized person can not access any thing our assets. It depends on physical behavior. This technique is possible only on the man identification not its document needed for it.

Potrebbero piacerti anche