1 / 21

Biometrics

Biometrics. Akash Mudubagilu Arindam Gupta . Overview. What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses and Applications of Biometrics Challenges to Biometrics. What is biometrics?.

juliana
Télécharger la présentation

Biometrics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Biometrics AkashMudubagilu Arindam Gupta

  2. Overview • What is Biometrics? • Why Biometrics? • General Biometric System • Different types of Biometrics • Uses and Applications of Biometrics • Challenges to Biometrics

  3. What is biometrics? • Biometrics is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits.

  4. What is biometrics? • Physiological and Behavioral characteristics: • Physiological: - Fingerprint - Face - Iris - Hand Geometry • Behavioral: - Voice - Keyboard strokes - Signature

  5. Why Biometrics? • With numerous devices, traditional paradigm of user name and password based scenarios are not practical • Only authorized users should have access to data and services • Biometrics provide an unobtrusive and convenient authentication mechanism • Advantages of biometrics • Uniqueness • No need to remember passwords or carry tokens • Biometrics cannot be lost, stolen or forgotten • More secure than a long password • Solves repudiation problem • Not susceptible to traditional dictionary attacks

  6. General biometric system • Determine or authenticate identity • Identification Systems: • Who am I? • Determine Identity • Verification Systems: • Am I who I claim to be? • Authenticate Identity

  7. ID : 8809 General biometric System Biometric Sensor Feature Extraction Database Enrollment Feature Extraction Biometric Sensor Matching Authentication Result

  8. Different types of biometrics • Fingerprint recognition • Face recognition • Iris recognition • Hand geometry • Voice Scan • Keystroke Scan • Signature Scan

  9. Fingerprint recognition • Measures unique characteristics in a fingerprint (minutiae) • Crossover • Core • Bifurcations • Ridge ending • Island • Delta • Pore • Advantages: multiple fingers, large database, proven technology • Disadvantages: skin worn out due to age

  10. Face recognition • Uses off-the-shelf camera to measure the following facial features: • Distance between the eyes • Distance between the eyes and nose • Angle of a cheek • Slope of the nose • Facial Temperatures • Advantages: No contact required, camerasare common • Disadvantages: Face can be obstructed, sensitive to changes in age, depends upon lighting and camera angle

  11. Iris recognition • Measures unique characteristics of the Iris like ridges, furrows, striations • Advantages: Iris is stable over lifetime, no contact is needed • Disadvantages: Difficult for people having eye disorders, some people may find this technique somewhat obtrusive.

  12. Hand geometry • Measures the top and sides of the hand, not the palm, contrary to the popular belief • Measures the finger lengths, widths, curves • Advantages: Easy to capture, widely used for physical access, stable over lifetime • Disadvantages: Not sufficiently distinctive over a large population, so not very accurate

  13. Voice scan • Measures the sound wave • Factors: pitch, intensity, quality and durations of human speech. • user talks to a microphone a passphrase. • voice print is compared to a previous one • Advantages: Easy to implement wherever there is a telephone in use • Disadvantages: High variability in an individual’s voice, background noise

  14. Keystroke scan • Keystroke scan: Measures the time between strokes and duration of key pressed. • Most commonly used in systems where keyboard is already being used.

  15. Signature scan • Signature scan: Measures speed, pressure, stroke order an image of signature. • Non-repudiation • Mainly used for verification • However forgers could forge it with some training

  16. Uses and applications of biometrics • Government and law enforcement • Forensic applications • Commercial applications

  17. Government applications • Passport control • Border Control • Access control to government systems

  18. Forensic applications • Criminal investigations • Corpse identification • Missing person identification

  19. Commercial applications • Computer login to different systems • Secure banking • Employee verification • Electronic payment • ATM • Record protection

  20. Challenges to biometrics • Informational privacy concerns: • Misuse • Addressed by: • System Design • Careful Audit • Personal privacy concerns • cultural or religious beliefs

  21. references • Jain, Anil K., Arun Ross, and SalilPrabhakar. "An Introduction to Biometric Recognition." IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1 (2004): 4-20. IEEE Xplore. Web. 5 Dec. 2011. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027 • http://bprl.cs.clemson.edu/about.html • http://bprl.cs.clemson.edu/projects.html

More Related