SlideShare une entreprise Scribd logo
1  sur  39
TYPES OF BIOMETRICS (Based on Chapter 3&4) Chang Jia Sep 12th, 2005 Guide to Biometrics
In General ,[object Object],[object Object],Examples:  face, fingerprint, hand geometry and iris recognition Examples:  signature and voice Biometrics can be sorted into two classes :
Biometric Identifiers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some More* … *See details in  Chapter 7 Esoteric Biometrics  of  Biometrics   by John D. Woodward, Nicholas M. Orlans, Peter T. Higgins, New York : McGraw-Hill/Osborne, c2003 Footprint and Foot Dynamics Brain Wave Pattern  Hand Grip  Fingernail Bed Sweat Pores Vein Pattern
1. Fingerprint Recognition ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Acquisition Devices ,[object Object],[object Object]
Applications Identification, or 1-to-Many:  identifies a person from the entire enrolled population.  Authentication, or 1-to-1:  matches a person's claimed identity to his/her biometric and one or more other security technologies (password, PIN, Token). (See  http://www.biometrics.dod.mil/bio101/index.aspx  )
Minutiae ,[object Object],[object Object],Minutiae Finger Image + Minutiae Finger Image
Fingerprint scanning ( Minutiae based approach )
Matching Approaches ,[object Object],[object Object],Two basic classes of matching techniques: Combining the above two techniques: ,[object Object],[object Object],Extracts features and develop representations from these features
2. Face Recognition ,[object Object],[object Object]
Features ,[object Object],[object Object],[object Object]
Details ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples MIT Media Laboratory Vision and Modeling Group Face Recognition Demo
3. Voice Recognition ,[object Object],[object Object],[object Object]
Application categories ,[object Object],[object Object],[object Object],[object Object]
Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
4. Iris recognition ,[object Object],[object Object],[object Object]
Example Iris Images
Applications ,[object Object],[object Object],Heathrow Airport (London) - Iris
5. Hand geometry ,[object Object],[object Object]
How does it work ,[object Object],( See Jain et al.  A Prototype  Hand   Geometry-based   Verification  System  )
Applications BenGurion Airport - Hand Geometry INSPASS - Hand Geometry see  INS Passenger Accelerated Service System
6. Signature Verification ,[object Object],[object Object],[object Object],[object Object]
Applications ,[object Object],[object Object],Examples of  Commercial products :                    ,[object Object],                      ,[object Object],          
Biometrics in Early Stages Body odor Lip motion Skin reflection Ear recognition Keystroke Gait Thermograms Retina recognition DNA
I. DNA ,[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison Chart Uses templates or feature extraction Does a comparison of actual samples Done in real-time;  “lights-out” automated process Not done in real-time; not all stages of comparison are automated Uses an impression, image, or recording Requires an actual physical sample Conventional Biometrics DNA
II. Retina recognition ,[object Object],[object Object],[object Object]
III. Thermograms ,[object Object],[object Object],[object Object]
IV. Gait ,[object Object],[object Object],Examples for measurements  (from  Georgia Institute of Technology )
V. Keystroke ,[object Object],[object Object],[object Object]
VI. Ear recognition ,[object Object],[object Object],[object Object],[object Object]
Example
VII.   Skin reflection ,[object Object],[object Object]
VIII. Lip motion ,[object Object],[object Object],[object Object]
IX. Body odor ,[object Object],[object Object],Prometheus (Alpha Mos) ,  an example of electronic nose Schematic Diagram of Artificial nose ,[object Object]
The Future ,[object Object],[object Object],[object Object],Challenges: Are biometric technologies ready for what is being expected of them?
Thank you. Any Question?

Contenu connexe

Tendances

Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person IdentificationManish Kumar
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 

Tendances (20)

Iris Scan
Iris ScanIris Scan
Iris Scan
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Iris Biometric for Person Identification
Iris Biometric for Person IdentificationIris Biometric for Person Identification
Iris Biometric for Person Identification
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Iris feature extraction
Iris feature extractionIris feature extraction
Iris feature extraction
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 

En vedette

We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your TypeCTIN
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...Mina Khidhir
 
Detecting hardware keyloggers
Detecting hardware keyloggersDetecting hardware keyloggers
Detecting hardware keyloggersmihailowitsch
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingDan Morrill
 
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...Jiang Zhu
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timen|u - The Open Security Community
 
Keylogger
KeyloggerKeylogger
Keyloggerfrank
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingDan Morrill
 

En vedette (13)

We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
 
Detecting hardware keyloggers
Detecting hardware keyloggersDetecting hardware keyloggers
Detecting hardware keyloggers
 
Misspelled words
Misspelled wordsMisspelled words
Misspelled words
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
 
Keylogger
KeyloggerKeylogger
Keylogger
 
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long time
 
Keylogger
KeyloggerKeylogger
Keylogger
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Process monitoring in UNIX shell scripting
Process monitoring in UNIX shell scriptingProcess monitoring in UNIX shell scripting
Process monitoring in UNIX shell scripting
 

Similaire à Chapters 3 4 (20)

Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Physical biometrics
Physical biometricsPhysical biometrics
Physical biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric
BiometricBiometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Chapters 3 4

  • 1. TYPES OF BIOMETRICS (Based on Chapter 3&4) Chang Jia Sep 12th, 2005 Guide to Biometrics
  • 2.
  • 3.
  • 4. Some More* … *See details in Chapter 7 Esoteric Biometrics of Biometrics by John D. Woodward, Nicholas M. Orlans, Peter T. Higgins, New York : McGraw-Hill/Osborne, c2003 Footprint and Foot Dynamics Brain Wave Pattern Hand Grip Fingernail Bed Sweat Pores Vein Pattern
  • 5.
  • 6.
  • 7. Applications Identification, or 1-to-Many: identifies a person from the entire enrolled population. Authentication, or 1-to-1: matches a person's claimed identity to his/her biometric and one or more other security technologies (password, PIN, Token). (See http://www.biometrics.dod.mil/bio101/index.aspx )
  • 8.
  • 9. Fingerprint scanning ( Minutiae based approach )
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Examples MIT Media Laboratory Vision and Modeling Group Face Recognition Demo
  • 15.
  • 16.
  • 17.
  • 18.
  • 20.
  • 21.
  • 22.
  • 23. Applications BenGurion Airport - Hand Geometry INSPASS - Hand Geometry see INS Passenger Accelerated Service System
  • 24.
  • 25.
  • 26. Biometrics in Early Stages Body odor Lip motion Skin reflection Ear recognition Keystroke Gait Thermograms Retina recognition DNA
  • 27.
  • 28. Comparison Chart Uses templates or feature extraction Does a comparison of actual samples Done in real-time; “lights-out” automated process Not done in real-time; not all stages of comparison are automated Uses an impression, image, or recording Requires an actual physical sample Conventional Biometrics DNA
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Thank you. Any Question?