SlideShare une entreprise Scribd logo
1  sur  29
SEMINAR ON
BIOMETRIC SECURITY
NIDHI NAYAN
DEPARTMENT OF ECE
RGD NO-1301294235



• The term is derived from greek words “BIO” means Life
and “METRON” means Measurement.
• “ The technology used for identification of a user based
on a physical or behavioral characteristic, such as a
fingerprint, iris, face, voice or handwriting is called
Biometrics”.
• The authentication system authenticates your identity
and verifies if you are the person you say you are. It,
according to the result, allows or denies access to the
system.
Types of Biometric-
1.Behavioral
-voice
-signature
-DNA
2. Physiological
-fingerprint
-palmprint
-face
-hand geometry
-iris
• In modern approach, Biometric characteristics can be
divided in two main classes:
• Physiological are related to the shape of the body and
thus it varies from person to person Fingerprints, Face
recognition, hand geometry and iris recognition are
some examples of this type of Biometric.
• Behavioural are related to the behavior of a person.
Some examples in this case are signature, keystroke
dynamics and of voice . Sometimes voice is also
considered to be a physiological biometric as it varies
from person to person.
• The eye contains a certain
structure surrounding the
pupil which is known as
iris.
• Iris varies from person to
person and two irises can
never be identical.
• Even the left and right eye irises are different from
• each other. Here the user is asked to stand couple
of inches of inches away from the iris scanner,
keeping eye in a certain position.
• Iris Scan is a bigger and expensive system, but is
very accurate.
Hand geometry is basically the
analysis and measuring of
both hands and fingers. The
user is required to place its
hand at the hand-scanner with
the fingers in proper position
as they were at the time of
sign-up. A 32 thousand pixel
digital camera is used to
measure the thickness, length
and width of the hands and
fingers. There are many
different types of hand devices
available in the market.
The voices of people vary from one to another. This
fact was used when devising voice scan technology.
The voice of a user is recorded using a microphone
reading device. And the system is able to recognize
the voice later because of the special characteristics
of human voice. It is important that the
circumstances at the time of recording and
authenticating are same. Things like background
noise and equipment’s quality might influence the
system. The best part of using this technique is that
it requires no expensive equipment.
To be very accurate. And by using this technique
less people will object to this type of authentication.
This technique uses a special pen and tablet to
capture the way user signs its name. As much as the
signature is important there are other features that
are considered important.
It measures when a user’s
put the pen on the tablet
and when he removes it,
the pressure on the table,the
speed by which he signs,etc.
• Connect an apparatus to the computer and it scans the finger
of a person and authenticates identity of an individual. If it
authenticates the person, it will give the person the access to
enter the system. And if it doesn’t authenticate, you are not
given access to the system. Fingerprints vary from person to
person.
• The have some special characteristics that make them
different from the finger print of other person. The
fingerprints of a person remain unchanged throughout life,
except in case of some injury or damage.
• Fingerprint scanning can be done in a number of ways. There
are some systems that scan the distinct patterns on finger.
• Fingerprint systems should be cleaned regularly as dust may
affect the reading and the system may not be able to
authenticate the user.
• Human fingerprints have been discovered on a large
number of archaeological artifacts and historical items
• In 1684, the English plant morphologist, Nehemiah
Grew, published the first scientific paper reporting his
systematic study on the ridge, furrow, and pore structure
• In 1788, a detailed description of the anatomical
formations of fingerprints was made by Mayer.
• In 1823, Purkinji proposed the first fingerprint
classification, which classified into nine categories
• In 1975, The FBI funded the development of fingerprint
scanners
Fingerprint Formation
• classification is necessary to reduce the search time and
computational complexity.
• The FBI database has 70 million fingerprints
BLOCK DIAGRAM
• Optical
• Silicon Based Capacitive Sensors
• Ultrasound
• Thermal
 The first step is to obtain a clear image of the fingerprint.
 Enhancement is carried out so as to improve the clarity of ridge
and furrow structures of input fingerprint images based on the
estimated local ridge orientation and frequency.
 For grayscale images, areas lighter than a particular threshold
are discarded, and those darker are made black.
Original Enhanced
• Minutiae localization is the next step.
•Even a very precise image has distortions and false minutiae that
need to be filtered out.
•Anomalies caused by scars, sweat, or dirt appear as false
minutiae, and algorithms locate any points or patterns that don't
make sense, such as a spur on an island or a ridge crossing
perpendicular to 2-3 others (probably a scar or dirt).
•A large percentage of would-be minutiae are discarded in this
process.
The point at which a ridge ends, and the point where a
bifurcation begins, are the most rudimentary minutiae.
Once the point has been situated, its location is
commonly indicated by the distance from the core, with
the core serving as the 0,0 on an X,Y-axis. In addition to
the placement of the minutia, the angle of the minutia is
normally used. When a ridge ends, its direction at the
point of termination establishes the angle. This angle is
taken from a horizontal line extending rightward from
the core, and can be up to 359.
•The matching accuracy of a biometrics-based authentication system relies on the
stability of the biometric data associated with an individual over time.
•The biometric data acquired from an individual is susceptible to changes introduced
due to improper interaction with the sensor (e.g., partial fingerprints), modifications
in sensor characteristics (e.g., optical vs. solid-state fingerprint sensor), variations in
environmental factors (e.g.,dry weather resulting in faint fingerprints) and temporary
alterations in the biometric trait itself (e.g., cuts/scars on fingerprints).
•Thus, it is possible for the stored template data to be significantly different from those
obtained during authentication, resulting in an inferior performance (higher false
rejects) of the biometric system.
Variation in fingerprint exhibiting partial
overlap.
•Multiple templates, that best represent the variability
associated with a user's biometric data, should be stored in
the database. (E.g. One could store multiple impressions
pertaining to different portions of a user's fingerprint in
order to deal with the problem of partially overlapping
fingerprints.)
• There is a tradeoff between the number of templates, and
the storage and computational overheads introduced by
multiple templates.
•For an efficient functioning of a biometric system, this
selection of templates should be done automatically.
•Automatic Minutiae Detection: Minutiae are essentially terminations and
bifurcations of the ridge lines that constitute a fingerprint pattern.
•Automatic minutiae detection is an extremely critical process, especially in low-
quality fingerprints where noise and contrast deficiency can originate pixel
configurations similar to minutiae or hide real minutiae.
Algorithm:
•The basic idea here is to compare the minutiae on
the two images.
•The figure alongside is the input given to the system,
as can be seen from the figure the various details of
this image can be easily detected. Hence, we are in a
position to apply the AMD algorithm.
Algorithm (contd.)
• The next step in the algorithm is to
mark all the minutiae points on the
duplicate image of the input fingerprint
with the lines much clear after feature
extraction.
• Then this image is superimposed
onto the input image with marked
minutiae points as shown in the figure.
• Finally a comparison is made with
the images in the database and a
probabilistic result is given.
• Each fingerprint impression produces an image of 768 x
768 ( when digitized at 500 dpi)
• In AFIS applications, this needs more amount of
memory space to store these images
• Neither lossless methods or JPEG compression
techniques are satisfactory
• A new compression technique called Wavelet Scalar
Quantization (WSQ) is introduced to compress the
images
• Banking Security - ATM security,card transaction
• Identification of Criminals
• Voting
• Physical Access Control (e.g. Airport)
• National ID Systems
• Passport control (INSPASS)
• Prisoner, prison visitors, inmate control
• Identification of missing children
• Secure E-Commerce (Still under research) Information System
Security
3-D fingerprint
• A new generation of touchless live scan devices that
generate a 3D representation of fingerprints is
appearing.
• Several images of the finger are acquired from different
views using a multicamera system, and a contact-free
3D representation of the fingerprint is constructed.
• This new sensing technology overcomes some of the
problems that intrinsically appear in contact-based
sensors such as improper finger placement, skin
deformation, sensor noise or dirt.
• https://en.wikipedia.org
• www.slideshare.net
• “Overview of Biometrics & Fingerprint Technology” - Dr. Y.S.
Moon
• www.techtarget.com
• https://www.quora.com
Seminar

Contenu connexe

Tendances

Fingerprint recognition algorithm
Fingerprint recognition algorithmFingerprint recognition algorithm
Fingerprint recognition algorithmFatima Akhtar
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric systemBhavi Bhatia
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Cen Paul
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learningSwatiNarkhede1
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition MethodHafsa Tahir
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Signature verification
Signature verificationSignature verification
Signature verificationNAVEEN TOKAS
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 

Tendances (20)

Fingerprint recognition algorithm
Fingerprint recognition algorithmFingerprint recognition algorithm
Fingerprint recognition algorithm
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Fingerprints recognition
Fingerprints recognitionFingerprints recognition
Fingerprints recognition
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...Offline signature verification based on geometric feature extraction using ar...
Offline signature verification based on geometric feature extraction using ar...
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Signature verification
Signature verificationSignature verification
Signature verification
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 

En vedette

Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Shreyas Tote
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
Atm with biometric system
Atm with biometric systemAtm with biometric system
Atm with biometric systemShahzad Gul
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military ApplicationsSeminar Links
 

En vedette (7)

Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...Biometric-based Security for Data Authentication in Wireless Body Area Networ...
Biometric-based Security for Data Authentication in Wireless Body Area Networ...
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
Ppt1
Ppt1Ppt1
Ppt1
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
Atm with biometric system
Atm with biometric systemAtm with biometric system
Atm with biometric system
 
Carbon Foam Military Applications
Carbon Foam Military ApplicationsCarbon Foam Military Applications
Carbon Foam Military Applications
 

Similaire à Seminar

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint RecognitionMirza Baig
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptxsahoosabyasachi000
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
[Biometric Systems][The world has been waiting]  [Th.docx
[Biometric Systems][The world has been waiting]  [Th.docx[Biometric Systems][The world has been waiting]  [Th.docx
[Biometric Systems][The world has been waiting]  [Th.docxdanielfoster65629
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace SystemAgbona Azeez
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...CSCJournals
 

Similaire à Seminar (20)

Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Fingerprint Recognition
Fingerprint RecognitionFingerprint Recognition
Fingerprint Recognition
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint Authentication Seminar.pptx
Fingerprint Authentication  Seminar.pptxFingerprint Authentication  Seminar.pptx
Fingerprint Authentication Seminar.pptx
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
[Biometric Systems][The world has been waiting]  [Th.docx
[Biometric Systems][The world has been waiting]  [Th.docx[Biometric Systems][The world has been waiting]  [Th.docx
[Biometric Systems][The world has been waiting]  [Th.docx
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 

Dernier

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Seminar

  • 1. SEMINAR ON BIOMETRIC SECURITY NIDHI NAYAN DEPARTMENT OF ECE RGD NO-1301294235
  • 3.
  • 4. • The term is derived from greek words “BIO” means Life and “METRON” means Measurement. • “ The technology used for identification of a user based on a physical or behavioral characteristic, such as a fingerprint, iris, face, voice or handwriting is called Biometrics”. • The authentication system authenticates your identity and verifies if you are the person you say you are. It, according to the result, allows or denies access to the system.
  • 5. Types of Biometric- 1.Behavioral -voice -signature -DNA 2. Physiological -fingerprint -palmprint -face -hand geometry -iris
  • 6. • In modern approach, Biometric characteristics can be divided in two main classes: • Physiological are related to the shape of the body and thus it varies from person to person Fingerprints, Face recognition, hand geometry and iris recognition are some examples of this type of Biometric. • Behavioural are related to the behavior of a person. Some examples in this case are signature, keystroke dynamics and of voice . Sometimes voice is also considered to be a physiological biometric as it varies from person to person.
  • 7. • The eye contains a certain structure surrounding the pupil which is known as iris. • Iris varies from person to person and two irises can never be identical. • Even the left and right eye irises are different from • each other. Here the user is asked to stand couple of inches of inches away from the iris scanner, keeping eye in a certain position. • Iris Scan is a bigger and expensive system, but is very accurate.
  • 8. Hand geometry is basically the analysis and measuring of both hands and fingers. The user is required to place its hand at the hand-scanner with the fingers in proper position as they were at the time of sign-up. A 32 thousand pixel digital camera is used to measure the thickness, length and width of the hands and fingers. There are many different types of hand devices available in the market.
  • 9.
  • 10. The voices of people vary from one to another. This fact was used when devising voice scan technology. The voice of a user is recorded using a microphone reading device. And the system is able to recognize the voice later because of the special characteristics of human voice. It is important that the circumstances at the time of recording and authenticating are same. Things like background noise and equipment’s quality might influence the system. The best part of using this technique is that it requires no expensive equipment.
  • 11. To be very accurate. And by using this technique less people will object to this type of authentication. This technique uses a special pen and tablet to capture the way user signs its name. As much as the signature is important there are other features that are considered important. It measures when a user’s put the pen on the tablet and when he removes it, the pressure on the table,the speed by which he signs,etc.
  • 12. • Connect an apparatus to the computer and it scans the finger of a person and authenticates identity of an individual. If it authenticates the person, it will give the person the access to enter the system. And if it doesn’t authenticate, you are not given access to the system. Fingerprints vary from person to person. • The have some special characteristics that make them different from the finger print of other person. The fingerprints of a person remain unchanged throughout life, except in case of some injury or damage. • Fingerprint scanning can be done in a number of ways. There are some systems that scan the distinct patterns on finger. • Fingerprint systems should be cleaned regularly as dust may affect the reading and the system may not be able to authenticate the user.
  • 13. • Human fingerprints have been discovered on a large number of archaeological artifacts and historical items • In 1684, the English plant morphologist, Nehemiah Grew, published the first scientific paper reporting his systematic study on the ridge, furrow, and pore structure • In 1788, a detailed description of the anatomical formations of fingerprints was made by Mayer. • In 1823, Purkinji proposed the first fingerprint classification, which classified into nine categories • In 1975, The FBI funded the development of fingerprint scanners
  • 15. • classification is necessary to reduce the search time and computational complexity. • The FBI database has 70 million fingerprints
  • 17. • Optical • Silicon Based Capacitive Sensors • Ultrasound • Thermal
  • 18.  The first step is to obtain a clear image of the fingerprint.  Enhancement is carried out so as to improve the clarity of ridge and furrow structures of input fingerprint images based on the estimated local ridge orientation and frequency.  For grayscale images, areas lighter than a particular threshold are discarded, and those darker are made black. Original Enhanced
  • 19. • Minutiae localization is the next step. •Even a very precise image has distortions and false minutiae that need to be filtered out. •Anomalies caused by scars, sweat, or dirt appear as false minutiae, and algorithms locate any points or patterns that don't make sense, such as a spur on an island or a ridge crossing perpendicular to 2-3 others (probably a scar or dirt). •A large percentage of would-be minutiae are discarded in this process.
  • 20. The point at which a ridge ends, and the point where a bifurcation begins, are the most rudimentary minutiae. Once the point has been situated, its location is commonly indicated by the distance from the core, with the core serving as the 0,0 on an X,Y-axis. In addition to the placement of the minutia, the angle of the minutia is normally used. When a ridge ends, its direction at the point of termination establishes the angle. This angle is taken from a horizontal line extending rightward from the core, and can be up to 359.
  • 21. •The matching accuracy of a biometrics-based authentication system relies on the stability of the biometric data associated with an individual over time. •The biometric data acquired from an individual is susceptible to changes introduced due to improper interaction with the sensor (e.g., partial fingerprints), modifications in sensor characteristics (e.g., optical vs. solid-state fingerprint sensor), variations in environmental factors (e.g.,dry weather resulting in faint fingerprints) and temporary alterations in the biometric trait itself (e.g., cuts/scars on fingerprints). •Thus, it is possible for the stored template data to be significantly different from those obtained during authentication, resulting in an inferior performance (higher false rejects) of the biometric system. Variation in fingerprint exhibiting partial overlap.
  • 22. •Multiple templates, that best represent the variability associated with a user's biometric data, should be stored in the database. (E.g. One could store multiple impressions pertaining to different portions of a user's fingerprint in order to deal with the problem of partially overlapping fingerprints.) • There is a tradeoff between the number of templates, and the storage and computational overheads introduced by multiple templates. •For an efficient functioning of a biometric system, this selection of templates should be done automatically.
  • 23. •Automatic Minutiae Detection: Minutiae are essentially terminations and bifurcations of the ridge lines that constitute a fingerprint pattern. •Automatic minutiae detection is an extremely critical process, especially in low- quality fingerprints where noise and contrast deficiency can originate pixel configurations similar to minutiae or hide real minutiae. Algorithm: •The basic idea here is to compare the minutiae on the two images. •The figure alongside is the input given to the system, as can be seen from the figure the various details of this image can be easily detected. Hence, we are in a position to apply the AMD algorithm.
  • 24. Algorithm (contd.) • The next step in the algorithm is to mark all the minutiae points on the duplicate image of the input fingerprint with the lines much clear after feature extraction. • Then this image is superimposed onto the input image with marked minutiae points as shown in the figure. • Finally a comparison is made with the images in the database and a probabilistic result is given.
  • 25. • Each fingerprint impression produces an image of 768 x 768 ( when digitized at 500 dpi) • In AFIS applications, this needs more amount of memory space to store these images • Neither lossless methods or JPEG compression techniques are satisfactory • A new compression technique called Wavelet Scalar Quantization (WSQ) is introduced to compress the images
  • 26. • Banking Security - ATM security,card transaction • Identification of Criminals • Voting • Physical Access Control (e.g. Airport) • National ID Systems • Passport control (INSPASS) • Prisoner, prison visitors, inmate control • Identification of missing children • Secure E-Commerce (Still under research) Information System Security
  • 27. 3-D fingerprint • A new generation of touchless live scan devices that generate a 3D representation of fingerprints is appearing. • Several images of the finger are acquired from different views using a multicamera system, and a contact-free 3D representation of the fingerprint is constructed. • This new sensing technology overcomes some of the problems that intrinsically appear in contact-based sensors such as improper finger placement, skin deformation, sensor noise or dirt.
  • 28. • https://en.wikipedia.org • www.slideshare.net • “Overview of Biometrics & Fingerprint Technology” - Dr. Y.S. Moon • www.techtarget.com • https://www.quora.com