Professional Documents
Culture Documents
Presented by
SOUMEN SARKAR
WHAT IS BIOMETRICS?
These are automated methods of recognizing a
TECHNICAL SEMINAR
Authenticate/Identify
Accuracy
TYPES OF BIOMETRICS
Fingerprint recognition.
TECHNICAL SEMINAR
Iris scanning.
Face recognition.
FINGERPRINT RECOGNITION
TECHNICAL SEMINAR
Fingerprint matching
Fingerprint classification
FINGERPRINT RECOGNITION
ALGORITHM
TECHNICAL SEMINAR
ALGORITHM CONT....
Ridge width is reduced to one pixel
TECHNICAL SEMINAR
ALGORITHM CONT....
TECHNICAL SEMINAR
ALGORITHM CONT....
The so extracted data is compared to
the training data in the database. The
TECHNICAL SEMINAR
IRIS SCANNING
Iris scans analyze the features that exist in the colored
tissue surrounding the pupil which has more than 200 points
TECHNICAL SEMINAR
It will work through glasses fine and in fact has the ability to
create an accurate enough measurement that it can be used
for identification purposes, and not much verification.
BIOMETRICS IDENTIFICATION
TECHNICAL SEMINAR
PHYSICAL STRUCTURE
Data Protection
Identification of the cardholder
Mutual authentication
Secure writing
Certification or signature
Encryption
FACIAL RECOGNITION
Facial recognition analyzes the characteristics of a person's face
images input through a digital video camera.
TECHNICAL SEMINAR
It is possible that the user may need to move and reattempt
the verification based on his facial position.
To prevent a fake face or mold from faking out the system,
many systems now require the user to smile, blink, or
otherwise move in a way that is human before verifying.
SOUMEN SARKAR CS200118347
An overview of BIOMETRICS SECURITY TECHNOLOGY
Detection
Normalization
Matching
Representation
and videoconferencing.
ADT Security Services now uses Visionics face-recognition systems
at the airports they protect.
Some new PC models use desktop fingerscanners on their mouse or
keyboards.
The Los Angleles Firemen's Credit Union spent $40,000 on a
fingerprint-.scanning system. Its 90 employees no longer need to
remember up to 10 passwords to use networks and applications. They
just touch the finger pad and they're ready to go.
St. Vincent Hospitals and Health Care Center uses a fingerprint
reader system and biometric software in its facilities of up to 3,000 staff
and physicians to access computers.
identify users. The issue of personal privacy comes into play when
such delicate information is being recorded.
Second, many of the biometric techniques for identifying users
are expensive and difficult to implement on current computer
systems.
Third, many of the biometric techniques take a lot of effort to use
and can be complicated for those who are unfamiliar with the
technology.
Fourth, biometric security techniques are not equally accurate
and dependable.
CONCLUSION
Biometric security technology cannot be overplayed.
Even with its disadvantages and upfront costs, biometric
TECHNICAL SEMINAR
REFERENCES
An Introduction to Biometrics” The Biometric Consortiume”
http://www.biometrics.org/html/introduction.htm, 23 June 2004
About Biometrics” Information Technology Laboratory”
TECHNICAL SEMINAR
http://www.itl.nist.gov/div893/biometrics/about.html,23 June
2004.
Bertolucci, James” Products for the Paranoid”
http://www.pcworld.com/news/article/0,aid,116573,00.asp23
June 2004.
Mace, Scott.”Gates Previews Security Projects”
http://www.pcworld.com/news/article/0,aid,114916,00.asp 23
June
O’Brien, James A.Management Information Systems” Managing
Information Technology in the Business Enterprise "New York:
McGraw-Hill, 2004c
Newell, Adrienne.Is Biometrics Coming to a PC Near You?
http://www.pcworld.com/news/article/0,aid,115289,00.asp
2004d, March 19