Documentos de Académico
Documentos de Profesional
Documentos de Cultura
CONTENTS
Introduction
History
General system
Finger Print Recognition
Hand Geometry
Iris
Speaker Verification
Performance & Application
Conclusion
AIMS AT…..
Forget passwords ...
Forget pin numbers ...
Forget all your security concerns ...
Tokens, such as smart cards, magnetic stripe cardsand physical keys can be
lost, stolen, or duplicated.
Passwords can be forgotten, shared, or unintentionally observed by a third
party.
Forgotten passwords and lost smart cards are a nuisance for users and waste
the expensive time of system administrators.
Can potentially prevent unauthorized access to or fraudulent use of ATMs,
cellular phones, smart cards, desktop PCs, workstations, and computer
networks
WHAT IS BIOMETRICS?
Automated method -automatic identification of of person using
human body as a password.
It is possible for two or more individuals to have identical global features but
still have different and unique fingerprints because they have local features -
minutia points - that are different from those of others.
STAGES
Fingerprint Scanning
Fingerprint Matching
Fingerprint Classification
FINGERPRINT SCANNING
It’s the acquisition and recognition of a person’s fingerprint
characteristics for identification purposes
optical method ->which starts with a visual image of a finger.
semiconductor-generated-> electric field to image a finger
FINGERPRINT MATCHING
Minutiae-based ->techniques first find minutiae points
and then map their relative placement on the finger.
Correlation-based ->techniques require the precise
location of a registration point and are affected by image
translation and rotation.
Fingerprint Classification
It is a technique to assign a fingerprint into one of the several
pre-specified types already established in the literature which
can provide an indexing mechanism
An input fingerprint is first matched at a coarse level to one of
the pre-specified types and then, at a finer level, it is compared
to the subset of the database containing that type of fingerprints
Image Processing
image features are detected and enhanced for verification against the
stored minutia file. Image enhancement is used to reduce any
distortion of the fingerprint caused by dirt, cuts, scars, sweat and dry
skin.
Image Verification
At the verification stage, the image of the fingerprint is compared against the
authorized user’s minutia file to determine a match and grant access to the
individual
IMAGE ACQUISITON
PROCESS
FINGERPRINT PC LOCK
FINGERPRINT DOOR LOCK
ISSUES
Privacy - Comparison and storage of unique
biological traits makes some individuals feel that
their privacy is being invaded.
False Rejection- False rejection occurs when a
registered user does not gain access to the
system.
False Acceptance-False acceptance is when an
unauthorized user gains access to a
biometrically protected system.
Accuracy- instances where a fingerprint may
become distorted and authorization will not be
granted to the user.
Hand Geometry
This approach uses the geometric shape of the hand for authenticating a
user's identity.Individual hand features are not descriptive enough for
identification. However, it is possible to devise a method by combining various
individual features to attain robust verification.
Hand geometry systems use an optical camera to capture two orthogonal
twodimensional images of the palm and sides of the hand, offering a balance
of reliability and relative ease of use.
They typically collect more than 90 dimensional measurements, including
finger width, height, and length; distances between joints; and knuckle
shapes. These systems rely on geometry and do not read fingerprints.
Hand geometry readers can function in extreme temperatures and are not
impacted by dirty hands (as fingerprint sensors can be).
Hand geometry devices are able to withstand wide changes in temperature and
function in a dusty environment.
Hand Geometry vs Fingerprints
Unlike fingerprints, the human hand isn't unique. One can use
finger length, thickness, and curvature for the purposes of
verification but not for identification.
For some kinds of access control like immigration and border
control, invasive biometrics (e.g., fingerprints) may not be
desirable as they infringe on privacy. In such situations it is
desirable to have a biometric system that is sufficient for
verification. As hand geometry is not distinctive, it is
the ideal choice.
Hand geometry data is easier to collect. With fingerprint
collection good frictional skin is required by imaging systems,
and with retina-based recognition systems, special lighting is
necessary. Additionally, hand geometry can be easily combined
with other biometrics, namely fingerprint. One can envision a
system where fingerprints are used for (infrequent) identification
and hand geometry is used for (frequent) verification.
IRIS RECOGINITION
IRIS RECOGNITION
• Pattern recognition technique - Iris
recognition combines computer vision,
pattern recognition, statistics, and the human-
machine interface.
Captures photograph
Reject
Pre Feature- Identification
processing extraction Verification
FRR –around 4%
IRIS PERFORMANCE
FAR - As low as 1 in 1,000,000
FRR –around 2%
APPLICATIONS
Criminal identification
Prison security
ATM
Aviation security
Border crossing controls
Database access
SOME BIOMETRICS STILL IN
DEVELOPMENT
Scent
Ear Shape
Facial 3D
REFERENCES
www.biometix.com
www.biomet.org
www.owlinvestigation.com
www.ddl.ision.co.uk
www.zdnetindia.com/techzone/resources
www.biodata.com.au
THANK
YOU