14. What’s wrong with all that ?
Can be Stolen!
ID Cards
Easily Duplicated
Smart Cards
Have got Limits
RFID Cards
Wrist Bands BG107CS***
Allocates from
BG107CS000 to BG107CS999
Total 1000 students!
18. What’s wrong with all that ?
Easily Forgotten
Passwords
Needs to be Changed
19. What’s wrong with all that ?
Easily Forgotten
Passwords
Needs to be Changed
20. What’s wrong with all that ?
Easily Forgotten
Passwords
Needs to be Changed
The Password Is quot;Expensive“
It typically costs a company $10
to $13 to reset an employee
password, according to Forrester
Research
24. In the form of Biometrics
Biometrics is the study of
computerized methods to
identify a person by their
unique
physical or behavioural
characteristics
39. Iris Recognition
It’s Fool-Proof
• 65.8% match
• Un-modifiable
• Pupil Dilation
• No replacement
for a live eye
40. Voice Recognition
“Voice verification required.”
“My voice is my password.
Give me access.”
“Voice Print verified.
Identity confirmed.
Access Granted.”
Sahana V.
50. Voice Recognition
How is it done ?
Two Waveforms of same word
Amplitude
Time
•Waveform - the shape of a wave illustrated graphically
• Amplitude - displacement of a periodic wave
51. Voice Recognition
How is it done ?
Two Waveforms of same word
“Sample” “Sample”
Amplitude
Time
Are Different
52. Voice Recognition
How is it done ?
But the Frequency-Time plots
“Sample” “Sample”
Frequency
Time
•Frequency - The number of occurrences
of an event within a given interval
53. Voice Recognition
How is it done ?
But the Frequency-Time plots
“Sample” “Sample”
Frequency
Time
Look Similar
54. Voice Recognition
Applications
1. Voice recognition for Authentication
1. Single pass phrase system
2. Text prompt system
3. Verification integrated in a dialogue system
55. Voice Recognition
Applications
1. Voice recognition for Authentication
1. Single pass phrase system
2. Text prompt system
3. Verification integrated in a dialogue system
2. Voice recognition for Surveillance
Forensic Voice Recognition
139. Conclusion
We need to -
• do Research in Biometrics
• bring Awareness amongst people
• Be ready for the change
• Bring about a change
• Become Smart
140. Further Reading
• Paul Reid . Biometrics for Network Security . Prentice Hall
PTR . December 30, 2003
• Nalini K Ratha . Advances in Biometrics . Springer . 2007
• Biometrics Consortium -
•http://www.biometrics.org/resources.php
• Biometrics Products –
http://www.biometricsproducts.com/
• Introduction to Biometrics -
http://biometrics.gov/ReferenceRoom/Introduction.aspx
141. Thank You!
Abhishek Mishra S. Krithika
Pooja Sastry Ratnala Srikanth
Sahana V. S. Supraja
Subhash Choudhary
Hi everyone and welcome to our presentation – “Identification Simplified”<number>
What we need today<number>
is a method to identify individuals which<number>
is secure and convenient.<number>
Lets look at what methods we use today to identify people…<number>
We have ID cards and Smart cards today<number>
We have even started using RFID cards which is a slightly more advanced type of card.<number>
We use passwords to protect our identity at work and internet<number>
We even use wristbands, you can find these in amusement parks mostly<number>
So, as you can see we have done a lot to solve the problem of identification… <number>
but yet we feel something is missing…<number>
You must be wondering what’s wrong with all these great methods of identification…<number>
With Card Type of identities, we got serious problems {click}The can be stolen {click}Can be duplicated {click}Have got limits {click}This ID card that I’m holding, Identifies me in the form of BG107CS***, which means it can address people from bg107cs000 to bg107cs999. Now that means we can address only 1000 people with it. You can clearly see that as the CS batch increases in size beyond 1000, this ID card needs to be replaced.<number>
Now that! Is how a modern professional’s wallet looks like today. Isn’t that loaded with cards!!<number>
Now passwords! Yes, even they’ve got problems<number>
Easily forgotten<number>
They need to be changed time to time. This ensures security and limits eavesdropping. many organizations have a policy to change everyone’s password after a fixed time.<number>
Now that comes at a cost. Here is a businessweek report saying that “Password is expensive”<number>
And a researchsers at forrester research have estimated this cost to be $10-$13 per employee.<number>
Not secure not convenient… we HAVE to find an answer to all these problems! and it won’t be some space-age technology… will it be in a chip embedded into us…No!!<number>
the answer is none of those… but the answer simply lies within us!<number>
In the form of biometrics…<number>
Now Biometrics is the… {definition }<number>
As I said, biometrics is the answer to the problems, you must be wondering how ?<number>
For that, we will now take you through various technologies that help us identify people under Biometircs.<number>
These are some of the techniques we would be discussing today. We would also talk about the Future and draw some conclusions based on our findings.<number>
I would now call upon Supraja to explain you how Iris Recognition is helpful in Biometrics.<number>