Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: BIOMETRICS PPT
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
BIOMETRICS:

[attachment=48786]

DEFINITION:

The word "biometrics“ is derived from the Greek words 'bios' and ‘metric' ; which means life and measurement respectively. This directly translates into "life measurement".
Biometrics technologies measure a particular set of a person's vital statistics in order to determine identity.
In the most contemporary computer science applications, the term "life measurement" adapts a slightly different role. Biometrics in the high technology sector refers to a particular class of identification technologies. These technologies use an individual's unique biological traits to determine one's identity. The traits that are considered include fingerprints, retina and iris patterns,facial characteristics and many more.

TYPES OF BIOMETRICS:

There are basically two types of biometrics:
1. Behavioral biometrics
2. Physical biometrics

EXAMPLES OF PHYSICAL BIOMETRICS:

Bertillonage - measuring body lengths (no longer used)
* Fingerprint - analyzing fingertip patterns
* Facial Recognition - measuring facial characteristics
* Hand Geometry - measuring the shape of the hand
* Iris Scan - analyzing features of colored ring of the eye

Signature Recognition:

* Visual/Behavioural Biometric The authentication of an individual by the analysis of handwriting style, in particular the signature.
* There are two key types of digital handwritten signature authentication, Static and Dynamic.
* Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature.
* Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device.
* This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.

Voice - Speaker Verification / Authentication:

* Auditory Biometric  The use of the voice as a method of determining the identity of a speaker for access control.
* If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker's voice is matched to one template (also called a "voice print" or "voice model"). Speaker verification is usually employed as a "gatekeeper" in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user's knowledge and typically require their cooperation. For example, presenting a person’s passport at border control is a verification process - the agent compares the person’s face to the picture in the document.

Voice - Speaker Identification:

* Auditory Biometric  Identification is the task of determining an unknown speaker's identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user's knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.
* For example, a police officer compares a sketch of an assailant against a database of previously documented criminals to find the closest match(es).
* In forensic applications, it is common to first perform a speaker identification process to create a list of "best matches" and then perform a series of verification processes to determine a conclusive match.
* Note: There is a difference between speaker recognition (recognising who is speaking) and speech recognition (recognising what is being said). These two terms are frequently confused, as is voice recognition. Voice recognition is a synonym for speaker, and thus not speech, recognition. In addition, there is a difference between the act of authentication (commonly referred to as speaker verification or speaker authentication) and identification.

BIOMETRIC IDENTIFICATION SYSTEM:

Identification means you don’t know anything about the person and you are trying to identify them, e.g., you go to a party, someone comes up and says, “hi”. What do you do? You look at the person’s face, and try to recognize them. The same process happens in the biometric identification solution.
Let’s say, you have pictures of all the users in the database. Now, someone comes up to you and says “Hi”, what you will do? You will take a picture of this person and feed it to your biometric system. The biometric system will compare this picture with all the pictures that are in database and returns the information of that person, whose photograph is the closest match. This is also called 1:N matching, where the biometric system is comparing 1 picture with all the pictures in the database.
In this example, we have used the face recognition technology to identify a person, but we can use fingerprint, iris, voice or any other biometric technology.

BIOMETRIC AUTHORIZATION SYSTEM:

Authorization means whether the user has an authority or permission to access something. This something could be a computer, secured location, etc
A good example of authorization is going to a movie theater to watch a movie. Before entering the premise, you are asked to show the movie ticket. If you have the movie ticket, then they let you pass through, else you are denied. Please note the person who is checking the ticket does know who you are, he/she will allow you only if you have a valid ticket. The point is that no identification or verification has taken place. It is assumed that the person who is carrying the movie ticket is the person to whom the movie ticket belongs.
Let’s look at another example. Let’s say, you sit at a front desk, and your boss hands you file with people’s name, and says, “Please let only these people walk in through the door.” A person walks up to you and says, “Hi, this John and I need to go through the door”. What will you do? You will first verify the person’s identity, and then check if his name is on the list. If you find his name on the list, then it means that he has the permission to go through the door. If his name is not on the list, then you will say, “I am sorry, you don’t have the permission to go through the door.” This is a secured form of authorization. Please note that in this case verification takes place before authorization.
Let’s consider fingerprint-based computer login system. A person wanting to access the computer system will place the finger on the fingerprint scanner. The biometric system will capture the fingerprints and compare it with the fingerprints of the people who have access to the system. If a match is found, then give the person is given access to the computer system, else the access is denied. In this example, verification is followed by authorization. Placing the finger on the fingerprint scanner means verifying that it is the same person who is asking the access to the system.