Sunteți pe pagina 1din 20

w 

r Defination of Biometrics & Authentication Types


r General Biometric system
r Biometric Modes
r Fingerprint
r Facial Recognition
r Hand Geometry
r Eye Recognition
r Vein Recognition
r Signature Recognition
r Biometric Uses
r Biometrics- Advantages
r Biometric Weaknesses
r Microsoft Fingerprint Sensor
r Pay by Touch
©   

ô  
  
 TYPE 1: Something you know
Passwords, PIN numbers, challenge phrase
 TYPE 2: Something you have
Smart cards, embedded chips
BUT passwords do not PROVE who you are

 TYPE 3 : Something you are

 Fingerprints
 Hand
 Face
 Iris
 DNA
 Voice
 Signature dynamics
g   
 
Two Usage Phases
1. Enrolment Phase:

G Initial profile measurement for database storage


G Generally slow
G Multiple measurements taken
G Average and acceptable range calculated

2. Recognition Phase:

G Matching of presented profile with stored profile


G Quick
G One or very few attempts
G Match accepted if within range
g   
 

Biometric
Feature Extraction
Sensor

Database
 


Biometric
Feature Extraction
Sensor

Matching
¦ 

  


  
 
Biological Characteristics
r Fingerprint
r Facial Recognition
r Hand Geometry
r Eye (Iris & Retina)
r Vein Pattern
Behavioral Traits
r Signature
r Voice
r Keystroke Dynamics
à 
r A fingerprint is made of a number of ridges and
valleys on the surface. Ridges are the upper skin
layer segments and valleys are the lower
segments.
r The ridges form so-called minutia points: ridge
endings (where a ridge end) and ridge
bifurcations (where a ridge splits in two).
Ã

 
r The dimensions, proportions and physical
attributes of a person's face are unique.
r Biometric facial recognition systems measure
and analyze the overall structure, shape and
proportions of the face: Distance between eyes,
nose, mouth, and jaw edges; upper outlines of
eye sockets, sides of the mouth, location of the
nose and eyes, the cheekbones.
r At enrolment, several pictures are taken of the
user's face, with slightly different angles and
facial expressions. For verification, the user
stands in front of the camera for a few seconds,
and the scan is compared with the template
previously recorded.
r To prevent an image/photo/mask of the face
being used, system require user to smile,
blink, or nod. Also, thermography can record
faceheat.
g 
Measures finger length and knuckle
thickness
 
 
r Iris:
r Measures the shape & color of the Iris
r Minutiae rich
r Inconvenient
r Expensive
r Retina:
r Blood Vessel Pattern
The blood vessels at the back of the
eye have a unique pattern, from eye to eye and
person to person.
r Highly Accurate

r Low public acceptance .


6
 

r The pattern of blood veins is unique,


even in identical twins. Palms have a
broad and complicated vascular
pattern and thus contain many
differentiating features.
 
 
r Biometric signature
recognition systems measure
and analyze the physical
activity of signing, such as
stroke order, pressure applied
and speed.

r Inexpensive
r Signatures may change over
time
r Participation must be
voluntary
r Low Accuracy
  

G Financial Institutes
Î     
  
  
G ‰aw Enforcement
Î 
 
 ¦
     !

Î "


G ×hysical Access Control


Î    #  
G IT Security
Î 
$%&!
 '  ü ¦ 

(¦ 

G E-Commerce market  d 
 
G Consumer Market
Î    )
*
!+
 ,-
Î  
 

  
Î #
 
)  % 

 ,-
Biometrics- Advantages
1. Non-compiable
2. Universal
3. Something Everyone Has !
4. Distinguishing
5. The More Unique The Better (Great Variability)
6. Permanent
7. Fingerprints Last Lifetime (Do They?)
8. Easily Collectable
9. Reliable, Robust,
10. Non-dangerous
Biometric Weaknesses
r An individual's biometric data does not change over
time so once compromised, it is compromised
forever.
r An individual only has a limited biometric features
(one face, two hands, ten
fingers, two eyes). If compromised, the user may
quickly run out of biometric
features to be used for authentication.
r Expensive
r Companies and products new and immature
r No common API or other standard
r Some user resistance
Microsoft Fingerprint Sensor
Pay by Touch
ww
r Hence, Biometrics is very usefull in our daily life, for
example in our daily life, for security and even for
shopping also.
1) www.google.com
2) www.yahoo.com
3) www.wikipedia.com
4) www.knowledgestorm.com

S-ar putea să vă placă și