Sunteți pe pagina 1din 21

SEMINAR ON

BIOMETRIC SECURITY
SYSTEMS

By:

RIZWAN AHMAD, E.SUNIL KUMAR.


DR.K.V.SUBBA REDDY INSTITUTE OF TECHNOLOGY,
KURNOOL
A FUTURE WITHOUT
PASSWORDS
• Traditional ways of security : password security.

Password Usage Places

• WORKPLACE
• DESKTOP COMPUTER
• CORPORATE COMPUTER
• NETWORK
• INTERNET & E-MAIL

End of “PASSWORD OVERLOAD”


• BIOMETRIC
A measurable,
physical characteristic
or personal behavioral
trait used to recognize
the identity or verify
the claimed identity of
an enrolled user.
CLASSIFICATION
 PHYSIOLOGICAL OR  BEHAVIORAL

 IDENTIFICATION OR  VERIFICATION
BIOMETRIC PROCESS
ENROLLMENT NO MATCH
Present
Capture Process STORE
Biometric

COMPARE
VERIFICATION

Present Process
Capture
Biometric

MATCH
TECHNOLOGIES
BIOMETRICS

SECURITY

SIGNATURE
IRIS

HAND
FINGER
FACE VOICE
IRIS RECOGNITION
 Iris patterns are
extremely complex.
 Patterns are individual
 Patterns are formed by
six months after birth,
stable after a year. They
remain the same for
life.
 Imitation is almost
impossible.
 Patterns are easy to
capture and encode
FINGERPRINT
RECOGNITION
•Oldest method
•Everyone is
known to have
unique, immutable
fingerprints.

•The uniqueness pattern of


ridges and furrows as well as
the minutiae points.
HOW IT WORKS
SUBMISSION FEATURE EXTRACTION

IMAGE ENHANCEMENT MATCHING


FACE
RECOGNITION
 COMFORTABLE
 IMAGE QUALITY IS A
VITAL FACTOR
 HIGH SUSCEPTIBILITY
TO FALSE POSITIVES
& FALSE NEGATIVES
 FOUR PRIMARY
TECHNOLOGIES
VOICE RECOGNITION
• The software
remembers the way you
say each word.
• Voice recognition
possible even though
everyone speaks with
varying accents and
inflection.
• Telephony : the
primary growth area
HAND
GEOMETRY
• 32,000-pixel CCD digital
camera .
• The hand-scan device can
process the 3-D images in
less than 5 seconds & the
verification usually takes
less than 1 second.
• U.S INPASS PROGRAM
SIGNATURE
RECOGNITION
 How the signature was
made. i.e. changes in
speed, pressure and
timing that occur during
the act of signing
An expert forger may
be able to duplicate what
a signature looks like,
but it is virtually
impossible to duplicate
the timing changes in X,
Y and Z (pressure)
TOKENS, SMART CARDS &
BIOMETRIC AUTHENTICATION
SCHEMES

 INTEGRATION IS ESSENTIAL
Hand-held PDA PL - 500 VIRDI 300 BAC SecureTouch

Targus DEFCON BioLink MIB Mifare


Authenticator MatchBook Biometric Logon Reader
COMPARISON
Misidentification
Method Coded Pattern Security Applications
rate
Iris High-security
Iris pattern 1/1,200,000 High
Recognition facilities
Fingerprintin
Fingerprints 1/1,000 Medium Universal
g
Size, length and Low-security
Hand Shape 1/700 Low
thickness of hands facilities
Outline, shape and
Facial Low-security
distribution of eyes and 1/100 Low
Recognition facilities
nose
Shape of letters,
Low-security
Signature writing order, pen 1/100 Low
facilities
pressure
Voice Telephone
Voice characteristics 1/30 Low
printing service
MARKET SHARE
 FUTURE APPLICATIONS :

 ATM machine use.  Internet


 Workstation and transactions
 Telephone
network access
transactions
 Travel and tourism  Public identity
cards
CONCLUSION

 “ IN FUTURE BIOMETRICS WILL BE THE


DOOR WAY TO ALL THE ACCESSIBLE
SYSTEMS ”
QUERIES ???

S-ar putea să vă placă și