Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

A

TECHNICAL SEMINAR REPORT

ON

BIOMETRIC AUTHENTICATION TECHNOLOGY

A dissertation submitted in partial fulfilment of the requirements for the award of degree of

BACHELOR OF TECHNOLOGY

In

COMPUTER SCIENCE AND ENGINEERING

Submitted By

M.SAMPATH KUMAR (20TQ1A5623)

Department of Computer Science and Engineering

SIDDHARTHA INSTITUTE OF TECHNOLOGY AND SCIENCES

(Approved by AICTE & Affiliated to JNTUH)

Korremula Road, Narapally, Ghatkesar, Medchal-Dist: - 500088

1
SIDDHARTHA INSTITUTE OF TECHNOLOGY AND
SCIENCES
(Approved by AICTE, Affiliated to JNTU Hyderabad, Accredited by NAAC(A+))

Korremula Road, Narapally(V), Ghatkesar Mandal, Medchal-Dist:-500088

CERTIFICATE

This is to certify that the Technical Seminar titled “BIOMETRIC


AUTHENTICATION TECHNOLOGY” is being submitted by
M.SAMPATH KUMAR (20TQ1A5623), in B.Tech IV-I semester
CSE(SOFTWARE ENGINEERING) is a record bonafide Technical Seminar
work carried out by me . The contents embodied in this report have not been
submitted to any other University for the award of any degree.

Seminar Coordinator Head of the Department

Ms.Soujanya Mrs.Vasantha

Internal Examiner
DR. Akella Satyanarayana

2
DECLARATION

I am M.SAMPATH KUMAR (20TQ1A5623), hereby declare that the contents embodied in


this TECHNICAL SEMINAR entitled “BIOMETRIC AUTHENTICATION
TECHNOLOGY” is carried out by me during the year 2023 – 2024 in partial fulfillment of
the award of Bachelor of Technology in CSE (SOFTWARE ENGINEERING) from
Siddhartha Institute of Technology and Sciences.

Date:

Place: NARAPALLY

2023-2024

M.SAMPATH KUMAR (20TQ1A5623)

3
CONTENTS

1. INTRODUCTION

2. FINGERPRINT RECOGNITION

3. FACE RECOGNITION

4. IRIS RECIGNITION

5. VEIN RECOGNITION

6. SIGNATURE VERIFICATION PROCESS

7. APPLICATIONS

8. ADVANTAGES

9. DISADVANTAGES

10.CONCLUSION

10.

4
ABSTRACT

Humans recognize each other according to their various characteristics for ages. We
recognize others by their face when we meet them and by their voice as we speak to them.
Identity verification (authentication) in computer systems has been traditionally based on
something that one has (key, magnetic or chip card) or one knows (PIN, password). Things
like keys or cards, however, tend to get stolen or lost and passwords are often forgotten or
disclosed.

To achieve more reliable verification or identification we should use something that


really characterizes the given person. Biometrics offer automated methods of identity
verification or identification on the principle of measurable physiological or behavioral
characteristics such as a fingerprint or a voice sample. The characteristics are measurable and
unique. These characteristics should not be duplicable, but it is unfortunately often possible
to create a copy that is accepted by the biometric system as a true sample.

In biometric-based authentication, a legitimate user does not need to remember or carry


anything and it is known to be more reliable than traditional authentication schemes.
However, the security of biometric systems can be undermined in a number of ways. For
instance, a biometric template can be replaced by an impostor's template in a system database
or it might be stolen and replayed. Consequently, the impostor could gain unauthorized
access to a place or a system. Moreover, it has been shown that it is possible to create a
physical spoof starting from standard biometric templates. Hence, securing the biometric
templates is vital to maintain security and integrity of biometric systems.

This report actually gives an overview of what is biometric system and a detail overview
of a Biometric Authentication Technology System.

5
1. INTRODUCTION

Biometrics are automated methods of identifying a person or verifying the identity of a


person based on a physiological or behavioral characteristic. Biometric-based authentication
is the automatic identity verification, based on individual physiological or behavioral
characteristics, such as fingerprints, voice, face and iris. Since biometrics is extremely
difficult to forge and cannot be forgotten or stolen, Biometric authentication offers a
convenient, accurate, irreplaceable and high secure alternative for an individual, which makes
it has advantages over traditional cryptography-based authentication schemes. It has become
a hot interdisciplinary topic involving biometric and Cryptography. Biometric data is
personal privacy information, which uniquely and permanently associated with a person and
cannot be replaced like passwords or keys. Once an adversary compromises the biometric
data of a user, the data is lost forever, which may lead to a huge financial loss. Hence, one
major concern is how a person’s biometric data, once collected, can be protected.

6
1.1 Characteristics of Biometric

Physical Characteristics
 Fingerprint
 Face
 Retina
 Iris
 Vein Pattern
 Hand and finger geometry

Behavioral Characteristics
 Keystroke dynamics
 Voice
 Gait
 Signature dynamics

1.2 Three-factor authentication

Biometrics are typically used in what’s called three-factor authentication.

This approach uses three things for verification:

 Something you know (a PIN code),


 Something you have (a smart card),
 Something you are (an individual biometric property).

7
1.3 How Biometric Work

The process involves three steps: Enrollment, Live sample and Comparison.

Enrollment Process
Enrollment is a process of capturing biometrics samples, processing them to create a
biometric template and storing the templates (usually with additional data) onto storage, such
as a database or chip.

Biometric Process

Biometric authentication is performed by doing a comparison of the physical aspect you


present for authentication against a copy that has been stored.

Comparision

To complete authentication, the live sample from step 2 is compared to the reference sample
in the template. If the live sample is verified to be a match with the template, then the smart
card is authenticated and the transaction can proceed.

8
2. FINGERPRINT RECOGNITION

Fingerprint authentication, also called fingerprint biometrics, uses the unique characteristics
of the human fingerprint.

The human fingerprint is composed of ridges and lines that represent a pattern wholly unique
to the person when taken as a whole.

The data comes from a scanner that can read and map the unique aspects of a fingerprint,
including the ridges, valleys, whorls, patterns, and other unique characteristics, and translate
that into digital data. Then that information is used as a way to verify users.

9
3. FACE RECOGNITION

Face authentication is a process where an individual's scanned physical face is confirmed to


have access to the service to be utilized.

Face authentication is also commonly called face or facial recognition.

Face Authentication is a technology that enables people to access online services, physical
settings, and other resources using images of their face.

10
4. IRIS RECOGNITION

Iris recognition is an automated method of biometric identification, taking unique patterns


within a ring-shaped region surrounding the pupil of each eye.

Iris scanning illuminates irises with invisible infrared light to take a picture of unique patterns
in each eye, not visible to the naked eye. A special camera takes the position of the pupil, iris,
eyelids and eyelashes. Each eye gets its own unique mathematical patterns, which is further
digitized.

11
5. VEIN RECOGNITION

Vein recognition, also called vascular technology, is a technique


of biometric identification through the analysis of the patterns of blood vessels visible from
the surface of the skin.

Based on the patterns of veins in one's finger or hand, vascular pattern recognition
(VPR) provides the ease of use of hand geometry with much improved accuracy, smaller
readers and contact less use.

Segmented into different sub-modalities, vascular biometrics solutions use optical scanning
technology to capture vein images in your palm, finger, or eyeball.

12
6. SIGNATURE VERIFICATION PROCESS

Signature verification is the process of comparing a presented signature to a reference


signature to assess the validity of the presented signature. Financial institutions, election
monitors, and other entities use signature verification techniques to look for forgeries.

6.1 Elements Assessed in the Signature Verification Process


 How the name is spelled.
 The use of print or cursive letters.
 Individual preferences in font style, such as how loops are rendered, dots are
drawn, or letters are crossed.
 Direction and angle of the signature’s slant.
 Size of the signature.
 Proportion of different signature elements in relation to each other.
 How the signature starts and ends, such as sudden ends, long tails, or loops.
 The strokes connecting different elements of the signature.
 Spacing between the first and last name and between the letters in the signature.
 The positioning of pen lifts.
 Speed of the writing.

6.2 Acceptable Variations in Signatures


People don’t always sign their names in the exact same way. When someone is manually
checking signatures, they must keep in mind that some level of variation is inevitable. In
particular, they should consider the following acceptable variations:

 Shaky signatures
 Name variations
 Slight changes in style
 Aberrations from electronic signature tools
 Odd bumps

13
14
7.APPLICATIONS OF BIOMETRIC AUTHENTICATION
TECHNOLOGY

Biometrics was once something confined to the world of science fiction, but over the
past decade, we have seen the emergence of biometrics in our everyday lives.

Biometrics are becoming increasingly integral to the way we carry out day to day tasks –
whether we realise it or not. As we move forward, the use of biometrics will continue to grow
and will become second nature to many of us to access a range of products and services that
we integrate will daily.

Biometric technology has evolved rapidly in recent years. Now, it’s a rare day when we don’t
interact with some form of biometric technology. From unlocking your phone to finding out
the weather for the day to securely boarding a flight. Biometric technology is all around us.

7.1 Airport Security


Biometric technology has been present in airports for some time. Using biometric
technology to verify passenger identity has been used in some of the major airports
around the world for several years and the use of the technology is now becoming more
widespread.

7.2 Law Enforcement


Biometrics is widely used across law enforcement with agencies such as the FBI and Interpol
utilising biometrics in criminal investigations. Here at NEC, we have been working with law
enforcement agencies around the world, including here in New Zealand, to deliver biometric
solutions for identifying criminals, for over 30 years.

15
7.3 Mobile Access and Authentication
One of the most common uses of biometric technology is smartphone security. All new
mobile phones are now integrating some form of biometric modality as a way of securing
your device or specific applications such as banking apps and it is expected that biometrics
will be used alongside traditional password and PIN options as a form of two-factor
authentication.

7.4 Banking
As global financial entities become more digitally based, banks are also implementing
biometric technology to improve customer and employee identity management in an effort to
combat fraud, increase transaction security, and enhance customer convenience.

Customers are also worried about identity theft and the inconvenience associated with
constantly having to prove their identities. As a result, more and more customers are looking
for banks that have biometric authentication in place prompting banks to research the
technology for implementation.

7.5 Home Assistants


Google Assistant that powers Google Home as well as the assistant on Android devices is
compatible with a wide range of IoT (Internet of Things) devices including light bulbs, door
locks, security cameras, security lights and more.

7.6 Building Access


Whether it is your home or the workplace, biometric technology is now used commonly as a
means of allowing access to buildings, or specific areas within a building.

Biometrics bring many advantages when it comes to access control. The technology can
provide a frictionless entry experience when utilising facial or iris recognition to control
access secure areas within a building.

16
7.7 Education
Biometric recognition technology such as fingerprint, iris and face recognition technology is
the most widely used biometric modality in the education system.

7.8 Public Transport


Biometric adoption within public transportation is still in its early phases, however the
potential uses within public transport are wide ranging and include security and enhancing
customer experience. Other applications of biometric technology include the use of smart ID
cards and smart ticketing to match a person using facial recognition in order to access transit
systems, allowing for safer travel and simplifying the process of ticketing and passenger
management.

7.9 Blood Banks


The use of biometric identifiers eliminates the risk of duplication, data entry issues and the
need to carry national identification cards, making the process more secure as well as
improving the customer experience of giving blood.

17
8. ADVANTAGES OF BIOMETRIC AUTHENTICATION
TECHNOLOGY

Main advantages of using biometric indicators

 They are linked to a single individual (unlike a password, which can be used without
authorisation),

 Security - They are highly fraud resistant.

 User Experience - Convenient and fast

 Non-transferable - Everyone has access to a unique set of biometrics

 Spoof-proof - Biometrics are hard to fake or steal

 Convenient - Since there is no need to remember or carry anything.

 High security and assurance – Biometric identification provides the answers to


“something a person has and is” and helps verify identity.

18
9. DISADVANTAGES OF BIOMETRIC AUTHENTICATION
TECHNOLOGY

Despite increased security, efficiency, and convenience, biometric authentication and its uses
in modern-day tech and digital applications also has disadvantages:

 Costs – Significant investment needed in biometrics for security


 Data breaches – Biometric databases can still be hacked
 Tracking and data – Biometric devices like facial recognition systems can limit
privacy for users
 Bias – Machine learning and algorithms must be very advanced to minimize
biometric demographic bias
 False positives and inaccuracy – False rejects and false accepts can still occur
preventing select users from accessing systems

19
10.CONCLUSION

Biometrics is the automated recognition of individuals based on their behavioral and


biological characteristics. It is a tool for establishing confidence that one is dealing with
individuals. The Biometrics if used correctly, can should be a valuable tool for information
security. The biometric system may find applications in attendance system, security systems,
and identification purposes and may find even more applications in the time to come. The
prevalent systems would be worked upon and modified for error free secure system. The
accuracy levels need to be increased for efficient security system. Proper selection of
technique has to be considered according to the requirement. Scientific work is being carried

out for future applications and progress in the biometrics.

20
REFERENCES :

 https://www.academia.edu/31640996/BIOMETRICS_A_Seminar_Report
 https://www.scribd.com/presentation/329704004/Biometric-Authentication-Technology-
PPT-pptplanet-com
 https://www.slideshare.net/PavanKumarMT/biometrics-technology-seminar-report
 https://www.researchgate.net/publication/371567274_Biometric_Authentication
 https://www.m2sys.com/blog/guest-blog-posts/top-8-advantages-and-disadvantages-of-
biometric/
 https://ovic.vic.gov.au/privacy/resources-for-organisations/biometrics-and-privacy-issues-
and-challenges/
 https://www.logintc.com/types-of-authentication/biometric-authentication/
 https://www.studocu.com/in/document/akshara-institute-of-management-and-
technology/introduction-to-microeconomics/biometrics-a-seminar-report/3

21

You might also like