Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 31

KRUPAJAL ENGINEERING COLLEGE

Seminar on
Biometrics Technology

SUBMITTED BY:
NAME: PRIYAMBADA BEHERA
BRANCH:ELECTRONICS & TELECOM.ENGINEERING
REGD.NO: 0821223030
ROLL.NO:08ET131
12/08/21 1
INTRODUCTION:
• Biometrics is a technology which
is mainly used for the security
purpose.
• It is preferred over traditional
security methods.

12/08/21 2
TRADITIONAL SECURITY METHODS:

• Password in computer
• Pin number in ATM card
• Identity card
• Driving license

12/08/21 3
DISADVANTAGE OF TRADITIONAL
SECURITY METHOD:

• We may forget the password or pin


number.
• We may loss the identity card & driving
license.

12/08/21 4
DEFINITION OF BIOMETRICS:

• Biometrics refer to the automatic


identification of a person based on his/her
physiological or behavioral characteristics.

12/08/21 5
PHYSIOLOGICAL:

• Biometrics based on data derived from


the measurement of a part of Person’s
anatomy.
• for example:
• Face location
• Hand geometry
• fingerprint verification
• Retinal scan
12/08/21 6
BEHAVIORAL:
• Biometrics based on data derived from
measurement of an action performed
by a person.
• for example:
• Voice recoganization
• Signature verification

12/08/21 7
BIOMETRICS :HOW DO THEY WORK?
Although biometric technologies differ, they all
work in a similar fashion:
• The user submits a sample using acquisition
device.
• Sample is then compared with the sample which
is already present in database.
• If it matches, it shows it is correct otherwise it is
incorrect.

12/08/21 8
LEADING BIOMETRIC TECHNOLOGY:

• Facial recognization
• Fingerprint matching
• Hand geometry
• Voice recognization
• Signature scan

12/08/21 9
FACIAL RECOGNIZATION SYSTEM:
• A facial recognization system is a
computer-driven application for automatically
identifying a person from a digital image.
It does that by comparing selected facial
features in the live image and a facial
database.
• It is typically used for security systems and
can be compared to other biometrics such as
fingerprint or eye iris recognition systems.

12/08/21 10
FACIAL RECOGNIZATION:

12/08/21 11
ACQUISITION DEVICE:

• Video Camera
• PC camera
• single-image camera

SAMPLE :

• Facial image

12/08/21 12
FACTORS AFFECT FACIAL LOCATION:

• Quality of capture device


• Change in facial aspect
• Adding or removing glasses

12/08/21 13
FINGERPRINT IDENTIFICATION:
• Among all the biometric techniques, it is
the oldest method which has been
successfully used in numerous
application.
• The uniqueness of a fingerprint can be
determined by the pattern of ridges &
furrows as well as the minutiae points.

12/08/21 14
Figure:1

12/08/21 15
FIGURE 2.

12/08/21 16
ACQUISITION DEVICE:

• Desktop peripheral
• PC card
• Mouse chip

SAMPLE :

• Fingerprint image

12/08/21 17
FACTORS AFFECT FINGERPRINTS:

• Cold finger
• Dry/oily finger
• Cuts to fingerprint
• Manual activity that affect fingerprints

12/08/21 18
HAND GEOMETRY:

• This approach uses the geometric


shape of the hand for authenticating a
user’s identity.

12/08/21 19
12/08/21 20
ACQUISITION DEVICE:

• Proprietary Wall-mounted unit

SAMPLE :

• Image of top and sides of hand

12/08/21 21
FACTORS AFFECT HAND
GEOMETRY:

•Jewelry
• Bandage
• Swelling of joints

12/08/21 22
VOICE RECOGNIZATION:
• Voice recognization technology verifies
the identity of the individual who is
speaking.
• Voice recognization can utilize any
audio capture device, including mobile
and land telephones and PC
microphones.

12/08/21 23
ACQUISITION DEVICE:

• Microphone
• telephone

SAMPLE :
• Voice recording

12/08/21 24
FACTORS AFFECT VOICE
RECOGNIZATION:

• Cold or illness that affect voice


• Speaking softly
• Quality of capturing device
• Variation in background noise

12/08/21 25
SIGNATURE VERIFICATION:

• Signature verification technology utilizes


the distinctive aspects of the signature
to verify the identity of individuals.

12/08/21 26
ACQUISITION DEVICE:

• Signature Tablet

SAMPLE :

• Image of Signature
• record of related dynamics measurement

12/08/21 27
FACTORS AFFECT SIGNATURE:

• Signing too quickly


• Different signing position
• Change of sign

12/08/21 28
APPLICATION OF BIOMETRICS:
• It is used in forensic lab for criminals
identification.
• It is used to prevent unauthorized access to
ATM card, smart card & computer.
• In automobile, biometrics can replace keys
with key less entry & key less ignition.
• Due to increased security threats, many
country have used this technique for border
control & national ID CARDS.

12/08/21 29
CONCLUSION:
– Biometric cannot be lost, stolen or
forgotten.
– it cannot be written down and stolen by
social re-engineering.
That’s why this technology is more
secure than others.

12/08/21 30
THA
NK
YOU

31

You might also like