100% found this document useful (1 vote)
214 views21 pages

Biometric Praveena

seminar topics by the students of G.PULLIAH COLLEGE OF ENGINEERING AND TECHNOLOGY. KURNOOL ANDHRAPRADESH INDIA

Uploaded by

itdep_gpcet7225
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
214 views21 pages

Biometric Praveena

seminar topics by the students of G.PULLIAH COLLEGE OF ENGINEERING AND TECHNOLOGY. KURNOOL ANDHRAPRADESH INDIA

Uploaded by

itdep_gpcet7225
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

INFORMATION TECHNOLOGY

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


contents:
vIntroduction:
vWhat are Biometrics:
vNeed of biometrics:
vBiometric technologies:
vApplication:
vConclusion:
vReferences:

SEMINOR TITLE:BIOMETRICS date:05-02-2010


INTRODUCTION:

ØBiometrics are automated methods of recognizing a


person based on a physiological or behavioral
characteristic.
ØAmong the features measured are;
face, fingerprints, hand geometry, handwriting,
iris, retinal, vein, and voice.
Ø Biometric technologies are becoming the foundation
of an extensive array of highly secure identification and
personal verification solutions.

SEMINOR TITLE: : BIOMETRICS DATE:05-02-2010


INTRODUCTION(CONT….)

• As the level of security breaches and transaction


fraud increases,the need for highly secure
identification and verification technologies is
becoming apparent.
• Utilizing biometrics for personal authenticaion is
becoming convenient and considerably more
accurate than current methods.
• Biometric based solutions are able to provide for
confidential financial transactions and personal data
security.

SEMINOR TITLE:BIOMETRICS
What are biometrics

• Biometrics is expected to be incorporated in


solutions to provide for home land security include
applications for improving airport security and etc…
• Now more than ever there is a wide range of interest
in biometrics across fedaral,state and local
governments.
• Congressional offices and a large number of
organizations involved in many markets will play in
identifying and verifying identity of individuals and
protecting national assets.

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


Need of biometrics
vAn indication of the current substantial growth and
interest in biometrics is the emergence of biometrics
industry standards and related activities.
vStandards have become strategic business issues.
vFor any given technology,industry standards assure
the availability of multiple sources for comparable
products and of competitive products in the market
place.
vStandards will support the expansion of market place
for biometrics.

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


Biometric Technologies
o Some of the main technologies used in
biometrics are:
1. Fingerprint Technology
2. Hand geometry
3. Facial Technology
4. Iris recognition

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


FINGERPRINT TECHNOLOGY:

§Recognition system readers analyze finger prints located


between the tip of finger and first knuckle.
§A template is created and compares with the other template
which is already stored.
§Once person has been verified as a valid user, a door can be
opened and access be granted.

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


HAND GEOMETRY

o Recognition Systems' biometric Hand Readers


simultaneously analyze more than 31,000 points and
instantaneously records more than 90 separate
measurements of an individual's hand-including area-
to verify that the person using the device.

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


Facial Technology
• Recognition Systems' face recognition readers analyze faces
based on the found face and eyes position.
• The method involved in this is as follows:
• Normalization: Based on found face and eyes position, the
image is scaled, rotated and finally presented at a fixed size.
• Preprocessing: Standard techniques applied like histogram
equalizations, intensity normalizations.
• The images are analyzed to determine the position, size of
one or more faces.
• Images including eyes positions are taken as Primary Facial
Data.

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


Facial Technology

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


•Identification mode: The presented data is used to scan
data base for most similar faces.
•Verification mode: The presented facial data is
compared to data read from data base based on
similarity threshold the identity is confirmed.

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


IRIS RECOGNITION:
v. The irisis the plainly visible, colored ring that
surrounds the pupil. It is a muscular structure that
controls the amount of light entering the eye.

vThe amount of information that can be measured in a


single iris is much greater than fingerprints, and the
accuracy is greater than DNA.
SEMINOR TITLE: BIOMETRICS DATE:05-02-2010
Iris Code:
Ø The picture of an eye is first processed by software that
localizes the inner and outer boundaries of the iris,the eyelid
contours,inorder to extract just the iris position.

ØSophisticated mathematical software then encodes the iris


pattern by a process called Demodulation.

ØThe Demodulation process uses functions called 2-D wavelets


that make a very compact yet complete description of the iris
pattern, regardless of its size and pupil dilation, in just 512 bytes.

ØThe iris code template is immediately encrypted to eliminate


the possibility of identity theft and to maximize security.

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


Iris Recognition

IRIS CODE

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


APPLICATIONS:

•Biometric-based authentication applications include


workstation, network, and domain access, single sign-on,
transaction security and Web security

•Finger print technology provides us access control.

•Hand Geometry provides Time and Attendance, Identity


verification, Access control.

•Trust in these electronic transactions is essential to the


healthy growth of the global economy

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


Demerits
Ø In case of face recognition, face will sometimes
change with time or injury, and that poses a
problem.
Ø Face recognition is fast but not reliable.
Ø Finger print verification is reliable but not efficient in
data base retrieval.
Ø Some recognition systems has some problems since
the changes with a humans mood and illness and
background noise poses some problems.

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


Conclusion:

Ø Biometrics makes automated use of


physiological or behavioral characteristics to
determine or verify identity.
Ø Finger biometrics are most popular and one of
the most accurate and cost effective solutions.
Ø With Biometrics there is no problem of ID being
stolen.
ØMany institutions and organizations are trying to
use this technology.

SEMINOR TITLE: BIOMETRICS DATE:05-02-2010


References:

üwww.irrsi.com
üwww.irsecurityandsafety.com
üwww.fingerprintlock.com
üwww.neurotechnologija.com
üwww.cognitec-systems.de

SEMINOR TITLE: BIOMETRICS DATE: 05-02-2010


SEMINOR TITLE: BIOMETRICS DATE:05-02-2010
SEMINOR TITLE: BIOMETRICS DATE:05-02-2010

You might also like