et 131 priya

31
3/12/2011 1 KRUPAJAL ENGINEERING COLLEGE SEMINAR ON BIOMETRICS TECHNOLOGY  SUBMITTED BY: NAME: PRIYAMBADA BEHERA BRANCH:ELECTRONICS & TELECOM.ENGINEERING REGD.NO: 0821223030 ROLL.NO:08ET131

Upload: smritisambit

Post on 08-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 1/31

3/12/2011 1

KRUPAJAL ENGINEERING

COLLEGESEMINAR ON 

BIOMETRICS TECHNOLOGY  

SUBMITTED BY:

NAME: PRIYAMBADA BEHERA

BRANCH:ELECTRONICS & TELECOM.ENGINEERING 

REGD.NO: 0821223030

ROLL.NO:08ET131

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 2/31

3/12/2011 2

INTRODUCTION: 

Biometrics is a technology whichis mainly used for the securitypurpose.

It is preferred over traditionalsecurity methods.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 3/31

TRADITIONAL SECURITY METHODS: 

Password in computer

Pin number in ATM card

Identity card

Driving license

3/12/2011 3

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 4/31

3/12/2011 4

DISADVANTAGE OF TRADITIONAL

SECURITY METHOD:

We may forget the password or pinnumber.

We may loss the identity card & drivinglicense.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 5/31

3/12/2011 5

DEFINITION OF BIOMETRICS: 

Biometrics refer to the automaticidentification of a person based on his/her

physiological or behavioral characteristics.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 6/31

3/12/2011 6

PHYSIOLOGICAL:

Biometrics based on data derived fromthe measurement of a part of Personsanatomy.

for example:

Face location

Hand geometry

fingerprint verification

Retinal scan

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 7/31

3/12/2011 7

BEHAVIORAL: 

Biometrics based on data derived frommeasurement of an action performedby a person.

for example:

Voice recoganization

Signature verification

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 8/31

3/12/2011 8

BIOMETRICS :HOW DO THEY WORK? 

Although biometric technologies differ, they all

work in a similar fashion: 

� The user submits a sample using acquisition

device.

� Sample is then compared with the sample which

is already present in database.

� If it matches, it shows it is correct otherwise it isincorrect.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 9/31

3/12/2011 9

LEADING BIOMETRIC TECHNOLOGY: 

� Facial recognization

� Fingerprint matching

� Hand geometry

� Voice recognization

� Signature scan

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 10/31

FACIAL RECOGNIZATION SYSTEM: 

A facial recognization system is acomputer-driven application for automatically

identifying a person from a digital image.

It does that by comparing selected facialfeatures in the live image and a facialdatabase.

It is typically used for security systems and

can be compared to other biometrics such asfingerprint or eye iris recognition systems.

3/12/2011 10

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 11/31

3/12/2011 11

FACIAL RECOGNIZATION: 

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 12/31

3/12/2011 12

ACQUISITION DEVICE: 

� Video Camera

� PC camera

� single-image camera

SAMPLE : 

� Facial image

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 13/31

3/12/2011 13

FACTORS AFFECT FACIAL LOCATION: 

� Quality of capture device

� Change in facial aspect

� Adding or removing glasses

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 14/31

3/12/2011 14

FINGERPRINT IDENTIFICATION: 

Among all the biometric techniques, it isthe oldest method which has beensuccessfully used in numerous

application. The uniqueness of a fingerprint can be

determined by the pattern of ridges &furrows as well as the minutiae points.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 15/31

3/12/2011 15

Figure:1 

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 16/31

3/12/2011 16

FIGURE 2.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 17/31

3/12/2011 17

ACQUISITION DEVICE: 

� Desktop peripheral

� PC card

� Mouse chip

SAMPLE : 

� Fingerprint image

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 18/31

3/12/2011 18

FACTORS AFFECT FINGERPRINTS: 

Cold finger

Dry/oily finger

Cuts to fingerprint 

Manual activity that affect fingerprints

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 19/31

3/12/2011 19

HAND GEOMETRY: 

This approach uses the geometricshape of the hand for authenticating a

users identity.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 20/31

3/12/2011 20

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 21/31

3/12/2011 21

ACQUISITION DEVICE: 

� Proprietary Wall-mounted unit

SAMPLE : 

� Image of top and sides of hand

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 22/31

3/12/2011 22

FACTORS AFFECT HAND 

GEOMETRY: 

�Jewelry� Bandage

� Swelling of joints

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 23/31

3/12/2011 23

VOICE RECOGNIZATION: 

Voice recognization technology verifiesthe identity of the individual who isspeaking.

Voice recognization can utilize anyaudio capture device, including mobileand land telephones and PC

microphones.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 24/31

3/12/2011 24

ACQUISITION DEVICE: 

� Microphone

� telephone

SAMPLE : 

� Voice recording

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 25/31

3/12/2011 25

FACTORS AFFECT VOICE 

RECOGNIZATION: 

Cold or illness that affect voice

Speaking softly Quality of capturing device

Variation in background noise

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 26/31

3/12/2011 26

SIGNATURE VERIFICATION: 

Signature verification technology utilizesthe distinctive aspects of the signature

to verify the identity of individuals.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 27/31

3/12/2011 27

ACQUISITION DEVICE: 

� Signature Tablet

SAMPLE : 

� Image of Signature

� record of related dynamics measurement

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 28/31

3/12/2011 28

FACTORS AFFECT SIGNATURE: 

� Signing too quickly� Different signing position

� Change of sign

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 29/31

3/12/2011 29

APPLICATION OF BIOMETRICS: 

It is used in forensic lab for criminalsidentification.

It is used to prevent unauthorized access toATM card, smart card & computer.

In automobile, biometrics can replace keyswith key less entry & key less ignition.

Due to increased security threats, many

country have used this technique for bordercontrol & national ID CARDS.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 30/31

3/12/2011 30

CONCLUSION: 

Biometric cannot be lost, stolen orforgotten.

it cannot be written down and stolen bysocial re-engineering.

Thats why this technology is more

secure than others.

8/7/2019 et 131 priya

http://slidepdf.com/reader/full/et-131-priya 31/31

31