SlideShare une entreprise Scribd logo
1  sur  53
Biometric Authentication
Muhammad Usman 122
Mahtab Rasheed 145
Usman Ali Butt 112
Waseem Khan 107
NUST,SEECS Pakistan
Agenda
• Introduction
• History
• Importance
• Types
• Methods
• Risks
• Summary
Introduction
Biometric Authentication:-
“ Biometric
Authentication is any process that validates
the identity of a user who wishes to sign
into a system by measuring some intrinsic
characteristic of that user”
Introduction
• Word biometric is derived from Greek words
bios mean life and metrics mean measure
• Therefore biometric authentication is defined
measuring of physiological or behavioral
properties related to particular entity to verify
or authenticate the entity.
Quick Look at History
• During the construction of great Pyramid Khufu workers
need to be authenticated for allowance
• 14th century in china, they use to save palm and foot
prints on clay blocks
• In 1890 a Persian police man Alphonse Bertillon provided
the basics to recognize the fingerprints
• 1892 Francis developed a classified system for finger
prints
• In 1896 Based on Bertillon study Aziz-ul-Haq developed
first systematic finger prints system for Edward Henry ,a
colonial of British Army in Bengal, India.
Quick Look at History
• 1936 Frank Burch gave a concept of using Iris
patterns for the recognition of an individual
• 1960 work on face recognition and voice
recognition
• 1965 automated system for signature
recognition
• Rapid development in biometric authentication
in 70’s
Quick Look at History
• 1985 patent for hand identification
• 1995 iris prototype become available as a
commercial product
• 1996 hand geometry used in Olympic games
held in Atlanta.
• First major success.
Quick Look at History
• 2000,first face recognition commercial product
• 2000,first research paper on vascular patterns
for recognition
• Modern biometrics based on computing have
developed now.
Importance of Biometric
Authentication
• Security is becoming important in business and
every field of life
• Fraud detection
• A person can claim multiple identities to get
more resources
• Biometric properties cannot be stolen unlike
passwords and keys
• After 9/11 rapid development on Biometric
Authentication
Types of Biometric Authentication
Biometric applications available today are
categorized into 2 sectors
• Physiological: Iris, Fingerprints, Hand Geometry,
Retinal ,Face recognition etc.
• Behavioral: Voice, Typing pattern etc.
Physiological Biometrics
Authentication
• A biometrics which use a physical trait, such
as a fingerprint, iris, hand or face for
recognition. The physical trait is analyzed,
measured and digitally stored.
Fingerprint Authentication
• Divides print into loops, whorls and arch
• Calculates minutiae points (ridge endings)
• Comparisons
• Authentication
Disadvantages
• Dirt , grime and wounds
• Placement of finger
• Too big a database to process
• Can be spoofed
Hand Geometry
• Geometry of users hands
• More reliable than fingerprinting
• Balance in performance and usability
• Very large scanners
Retinal Scanning
• Scans retina(the innermost coat of the back
part of the eye) into database
• User looks straight into retinal reader
• It checks the pattern of blood vessels of eye
retina.
• Scan using low intensity light
• Very efficient – cant be spoofed!
• User has to look “directly”
Iris Scanning
• Scans unique pattern of iris the colored ring of
muscle
• Iris is colored and visible from far
• No touch required
• The patterns of one person's two eyes are
quite different from each other and even
genetically identical twins have different iris
patterns.
• Contact lenses an issue
Face Recognition
• User faces camera
• Neutral expression required
• Appropriate lighting and position
• Algorithms for processing
Other Physiological Biometrics
• Palm print
• Hand vein
• DNA
• Thermal imaging
• Ear shape
• Human Odor Recognition
• Fingernail bed
Palm Print
• Palm print verification is a slightly different
implementation of the fingerprint technology.
Hand Vein
• Hand vein geometry is based on the fact that
the vein pattern is distinctive for various
individuals.
DNA
• DNA (Deoxyribose Neucleic Acid)
authentication is very popular at present and
requires a form of tissue, blood or other bodily
sample.
Behavioral Biometrics
• Biometrics that is based on a behavioral trait of
an individual.
• Acquired over time by an individual.
• A reflection of an individual’s psychology.
Types Of Behavioral Biometric
• Signature Recognition.
• Voice Recognition.
• Typing Patterns
• Gaits
Signature Recognition
• Automatically scanning a person's signature
and matching it electronically against a
library of known signatures.
How it works
• Speed
• Direction
• Pressure
• Acceleration
• length of the strokes
• Dynamics number of strokes and their duration
Advantages
• Unique style of doing Signature.
• One does not know how to write signature
even after looking at it.
Disadvantages
• Signature variable with Age, illness, emotions
• Requires high quality hardware
• High FRR as signatures are very dynamic
• Low Accuracy.
Voice Recognition
• A Biometric identification by electronically
recording and graphically representing a
person's voice.
Voice Recognition
• Voice prints : The unique characteristic of individual.
• User’s voice print is stored in database.
• Enroll by speaking some phrases.
• System Compares the voiceprints.
• Speech input
• Speaking style
• Pitch
• Frequency
• Natural tone
Disadvantages
• Background noise
• Device quality
• Illness , emotional behavior
• Time consuming enrollment
• Large processing template
Typing Patterns
• A method of verifying the identity of an
individual by their typing rhythm.
• System can verify the user at the log-on stage
or it can Continuously monitor the typist.
Typing Patterns
• User typing pattern
• Different characteristics
• Speed ( time durations between the keystrokes )
• Press and Release Rate
• Frequency of errors (use of backspace)
• Use of num pad
• Order in which user presses shift key to get capital letters
• Unique patterns are generated
• Comparisons
• Cheap
• Continuously check the user
Disadvantages
• For recognition a large amount of keystroke
data is needed
• Unnecessary comparisons with all existing
users
• Not very scalable
• FRR is high (Speed and Frequency of errors
can vary)
• Can be spoofed – by simple technology
(recorders)
Gaits
• Gait is an attractive biometric feature for
human identification at a distance.
• Gait is a particular way or manner
of moving on foot.
• Movements of a person's
various body parts over time
Advantages
• Perceivable at a distance
• Non-contact
• Non-invasive ( without interfering human
body)
• Can identify among a group of people
Disadvantages
• Injuries
• Illness
• Weather Effect
General Look on Biometrics
Iris
• Strengths
Very stable over time
Uniqueness
• Weakness
Requires user training
Dependant on a single vendor’s technology
General Look on Biometrics
• Iris
• Usability
Information security access control,
especially for Federal Institutions and
government agencies.
General Look on Biometrics
Fingerprint
• Strengths
Small template (less than 500 bytes)
Small sensors
• Weakness
Physical contact required
• Usability
Physical access control
Association with criminal justice
General Look on Biometrics
Voice
• Strengths
Low training
Microphone can be built into PC or mobile device
• Weaknesses
Changes with time, illness stress or injury
Large template unsuitable for recognition
• Usability
Mobile phones
Telephone banking
General Look on Biometrics
Signatures
• Strengths
• High user acceptance
Minimal training
• Weaknesses
Unstable over time
Occasional erratic variability
Enrollment takes times
• Usability
Portable devices with stylus input
General Look on Biometrics
Face
• Strengths
Universally present
• Weaknesses
Cannot distinguish identical siblings
Religious or cultural prohibitions
• Usability
Physical access control
General Look on Biometrics
Hand
• Strengths
Small template (approximately 10 bytes)
Unaffected by skin condition
• Weaknesses
Physical size of acquisition device
Physical contact required
• Usability
Physical access control
Time and attendance
Comparison of Different
Biometrics Technology
Conclusion
• All authentication methods are prone to errors.
Nevertheless, reliable user authentication must
ensure that an attacker cannot masquerade as a
legitimate user
• Biometrics is uniquely bound to individuals and
may offer organizations a stronger method of
authentication
• Biometric systems are not foolproof; they can be
compromised by:
 Submission of another person’s biometric
 Submission of enrollee’s biometric with the
user under duress or incapacitated
• A prudent balance between Security and Privacy
needs to be achieved
References
• Biometrics History published by NSTC
subcommittee on Biometrics
date:7 August 2006
www.biometrics.gov
• Biometric Authentication
Technology and Evaluation –
Term Project CS574
Spring 2003
San Diego State University
Uwe Bubeck Dina Sanchez
References
• Biometrics and Authentication slides of
Shivani Kirubanandan
• Authentication: Overview slides of Paul Bui
• Biometric Authentication Systems
by Zdeneˇk Rˇ íha and Václav Matyáš FIMU
Report Series November 2000
Question?
Biometric authentication

Contenu connexe

Tendances

Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
Hafsa Tahir
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Faimin Khan
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 

Tendances (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometrics
BiometricsBiometrics
Biometrics
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 

En vedette

Biometric Authentication Systems in Healthcare
Biometric Authentication Systems in HealthcareBiometric Authentication Systems in Healthcare
Biometric Authentication Systems in Healthcare
Bharath Perugu
 
Application of nitrous oxide in automobiles ppt
Application of nitrous oxide in automobiles pptApplication of nitrous oxide in automobiles ppt
Application of nitrous oxide in automobiles ppt
Dakshesh Patel
 
Biometric Authentication, Dragon Unleashed, V1.5
Biometric Authentication, Dragon Unleashed, V1.5Biometric Authentication, Dragon Unleashed, V1.5
Biometric Authentication, Dragon Unleashed, V1.5
Clare Nelson, CISSP, CIPP-E
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 

En vedette (20)

Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterFinger Vein Detection using Gabor Filter, Segmentation and Matched Filter
Finger Vein Detection using Gabor Filter, Segmentation and Matched Filter
 
Finger vein identification system
Finger vein identification systemFinger vein identification system
Finger vein identification system
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
biometrics
biometricsbiometrics
biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Bugatti
BugattiBugatti
Bugatti
 
Nitrous Oxide Emissions Reduction (NERP)
Nitrous Oxide Emissions Reduction (NERP)Nitrous Oxide Emissions Reduction (NERP)
Nitrous Oxide Emissions Reduction (NERP)
 
Vehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVehicle security system usinf finger print technology
Vehicle security system usinf finger print technology
 
24ESV-000377.PDF
24ESV-000377.PDF24ESV-000377.PDF
24ESV-000377.PDF
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
 
Biometric Authentication Systems in Healthcare
Biometric Authentication Systems in HealthcareBiometric Authentication Systems in Healthcare
Biometric Authentication Systems in Healthcare
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Application of nitrous oxide in automobiles ppt
Application of nitrous oxide in automobiles pptApplication of nitrous oxide in automobiles ppt
Application of nitrous oxide in automobiles ppt
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Biometric Authentication, Dragon Unleashed, V1.5
Biometric Authentication, Dragon Unleashed, V1.5Biometric Authentication, Dragon Unleashed, V1.5
Biometric Authentication, Dragon Unleashed, V1.5
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...Vehicle tracking system,be computer android report,android project report,gps...
Vehicle tracking system,be computer android report,android project report,gps...
 

Similaire à Biometric authentication

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
Anand Yadav
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 

Similaire à Biometric authentication (20)

INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
 
070327 biometrics
070327 biometrics070327 biometrics
070327 biometrics
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individuals
 
Biometrics
BiometricsBiometrics
Biometrics
 
Access Control System, BMS
Access Control System, BMSAccess Control System, BMS
Access Control System, BMS
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Overview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NOverview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya N
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 

Biometric authentication

  • 1. Biometric Authentication Muhammad Usman 122 Mahtab Rasheed 145 Usman Ali Butt 112 Waseem Khan 107 NUST,SEECS Pakistan
  • 2. Agenda • Introduction • History • Importance • Types • Methods • Risks • Summary
  • 3. Introduction Biometric Authentication:- “ Biometric Authentication is any process that validates the identity of a user who wishes to sign into a system by measuring some intrinsic characteristic of that user”
  • 4. Introduction • Word biometric is derived from Greek words bios mean life and metrics mean measure • Therefore biometric authentication is defined measuring of physiological or behavioral properties related to particular entity to verify or authenticate the entity.
  • 5. Quick Look at History • During the construction of great Pyramid Khufu workers need to be authenticated for allowance • 14th century in china, they use to save palm and foot prints on clay blocks • In 1890 a Persian police man Alphonse Bertillon provided the basics to recognize the fingerprints • 1892 Francis developed a classified system for finger prints • In 1896 Based on Bertillon study Aziz-ul-Haq developed first systematic finger prints system for Edward Henry ,a colonial of British Army in Bengal, India.
  • 6. Quick Look at History • 1936 Frank Burch gave a concept of using Iris patterns for the recognition of an individual • 1960 work on face recognition and voice recognition • 1965 automated system for signature recognition • Rapid development in biometric authentication in 70’s
  • 7. Quick Look at History • 1985 patent for hand identification • 1995 iris prototype become available as a commercial product • 1996 hand geometry used in Olympic games held in Atlanta. • First major success.
  • 8. Quick Look at History • 2000,first face recognition commercial product • 2000,first research paper on vascular patterns for recognition • Modern biometrics based on computing have developed now.
  • 9. Importance of Biometric Authentication • Security is becoming important in business and every field of life • Fraud detection • A person can claim multiple identities to get more resources • Biometric properties cannot be stolen unlike passwords and keys • After 9/11 rapid development on Biometric Authentication
  • 10. Types of Biometric Authentication Biometric applications available today are categorized into 2 sectors • Physiological: Iris, Fingerprints, Hand Geometry, Retinal ,Face recognition etc. • Behavioral: Voice, Typing pattern etc.
  • 11. Physiological Biometrics Authentication • A biometrics which use a physical trait, such as a fingerprint, iris, hand or face for recognition. The physical trait is analyzed, measured and digitally stored.
  • 12. Fingerprint Authentication • Divides print into loops, whorls and arch • Calculates minutiae points (ridge endings) • Comparisons • Authentication
  • 13.
  • 14. Disadvantages • Dirt , grime and wounds • Placement of finger • Too big a database to process • Can be spoofed
  • 15. Hand Geometry • Geometry of users hands • More reliable than fingerprinting • Balance in performance and usability • Very large scanners
  • 16. Retinal Scanning • Scans retina(the innermost coat of the back part of the eye) into database • User looks straight into retinal reader • It checks the pattern of blood vessels of eye retina. • Scan using low intensity light • Very efficient – cant be spoofed! • User has to look “directly”
  • 17. Iris Scanning • Scans unique pattern of iris the colored ring of muscle • Iris is colored and visible from far • No touch required • The patterns of one person's two eyes are quite different from each other and even genetically identical twins have different iris patterns. • Contact lenses an issue
  • 18.
  • 19. Face Recognition • User faces camera • Neutral expression required • Appropriate lighting and position • Algorithms for processing
  • 20.
  • 21. Other Physiological Biometrics • Palm print • Hand vein • DNA • Thermal imaging • Ear shape • Human Odor Recognition • Fingernail bed
  • 22. Palm Print • Palm print verification is a slightly different implementation of the fingerprint technology.
  • 23. Hand Vein • Hand vein geometry is based on the fact that the vein pattern is distinctive for various individuals.
  • 24.
  • 25. DNA • DNA (Deoxyribose Neucleic Acid) authentication is very popular at present and requires a form of tissue, blood or other bodily sample.
  • 26. Behavioral Biometrics • Biometrics that is based on a behavioral trait of an individual. • Acquired over time by an individual. • A reflection of an individual’s psychology.
  • 27. Types Of Behavioral Biometric • Signature Recognition. • Voice Recognition. • Typing Patterns • Gaits
  • 28. Signature Recognition • Automatically scanning a person's signature and matching it electronically against a library of known signatures.
  • 29. How it works • Speed • Direction • Pressure • Acceleration • length of the strokes • Dynamics number of strokes and their duration
  • 30. Advantages • Unique style of doing Signature. • One does not know how to write signature even after looking at it.
  • 31. Disadvantages • Signature variable with Age, illness, emotions • Requires high quality hardware • High FRR as signatures are very dynamic • Low Accuracy.
  • 32. Voice Recognition • A Biometric identification by electronically recording and graphically representing a person's voice.
  • 33. Voice Recognition • Voice prints : The unique characteristic of individual. • User’s voice print is stored in database. • Enroll by speaking some phrases. • System Compares the voiceprints. • Speech input • Speaking style • Pitch • Frequency • Natural tone
  • 34. Disadvantages • Background noise • Device quality • Illness , emotional behavior • Time consuming enrollment • Large processing template
  • 35. Typing Patterns • A method of verifying the identity of an individual by their typing rhythm. • System can verify the user at the log-on stage or it can Continuously monitor the typist.
  • 36. Typing Patterns • User typing pattern • Different characteristics • Speed ( time durations between the keystrokes ) • Press and Release Rate • Frequency of errors (use of backspace) • Use of num pad • Order in which user presses shift key to get capital letters • Unique patterns are generated • Comparisons • Cheap • Continuously check the user
  • 37. Disadvantages • For recognition a large amount of keystroke data is needed • Unnecessary comparisons with all existing users • Not very scalable • FRR is high (Speed and Frequency of errors can vary) • Can be spoofed – by simple technology (recorders)
  • 38. Gaits • Gait is an attractive biometric feature for human identification at a distance. • Gait is a particular way or manner of moving on foot. • Movements of a person's various body parts over time
  • 39. Advantages • Perceivable at a distance • Non-contact • Non-invasive ( without interfering human body) • Can identify among a group of people
  • 41. General Look on Biometrics Iris • Strengths Very stable over time Uniqueness • Weakness Requires user training Dependant on a single vendor’s technology
  • 42. General Look on Biometrics • Iris • Usability Information security access control, especially for Federal Institutions and government agencies.
  • 43. General Look on Biometrics Fingerprint • Strengths Small template (less than 500 bytes) Small sensors • Weakness Physical contact required • Usability Physical access control Association with criminal justice
  • 44. General Look on Biometrics Voice • Strengths Low training Microphone can be built into PC or mobile device • Weaknesses Changes with time, illness stress or injury Large template unsuitable for recognition • Usability Mobile phones Telephone banking
  • 45. General Look on Biometrics Signatures • Strengths • High user acceptance Minimal training • Weaknesses Unstable over time Occasional erratic variability Enrollment takes times • Usability Portable devices with stylus input
  • 46. General Look on Biometrics Face • Strengths Universally present • Weaknesses Cannot distinguish identical siblings Religious or cultural prohibitions • Usability Physical access control
  • 47. General Look on Biometrics Hand • Strengths Small template (approximately 10 bytes) Unaffected by skin condition • Weaknesses Physical size of acquisition device Physical contact required • Usability Physical access control Time and attendance
  • 49. Conclusion • All authentication methods are prone to errors. Nevertheless, reliable user authentication must ensure that an attacker cannot masquerade as a legitimate user • Biometrics is uniquely bound to individuals and may offer organizations a stronger method of authentication • Biometric systems are not foolproof; they can be compromised by:  Submission of another person’s biometric  Submission of enrollee’s biometric with the user under duress or incapacitated • A prudent balance between Security and Privacy needs to be achieved
  • 50. References • Biometrics History published by NSTC subcommittee on Biometrics date:7 August 2006 www.biometrics.gov • Biometric Authentication Technology and Evaluation – Term Project CS574 Spring 2003 San Diego State University Uwe Bubeck Dina Sanchez
  • 51. References • Biometrics and Authentication slides of Shivani Kirubanandan • Authentication: Overview slides of Paul Bui • Biometric Authentication Systems by Zdeneˇk Rˇ íha and Václav Matyáš FIMU Report Series November 2000