Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 33

Mohd Nazeer Uddin

C.S.I.T
07J01A1207
INDEX:

 Biometrics Overview
 Fingerprint
 Facial Recognition
 Hand Geometry
 Iris Recognition
 Retina Scanning
 Speaker Recognition
 Benefits of Biometrics
 Biometrics in Business
INDEX:

Biometrics Overview
 Fingerprint
 Facial Recognition
 Hand Geometry
 Iris Recognition
 Retina Scanning
 Speaker Recognition
 Benefits of Biometrics
 Biometrics in Business
Biometrics Overview

What are Biometrics?


 Automated methods of identifying or verifying the identity of a
person based on a physiological or behavioral characteristic

 Physical:
 Fingerprint
 Facial Recognition
 Hand Geometry
 Iris Scan
 Retinal Scan
 DNA
 Behavioral:
 Speaker Recognition
 Signature Recognition
Biometrics Overview

2 ways to recognize a person:


Verification
 Am I who I claim to be?
Identification
 Who am I?
Confirm or establish identity based on who person is
NOT what person possesses
 ID card
NOT what person remembers
 Password
INDEX:

 Biometrics Overview

Fingerprint
 Facial Recognition
 Hand Geometry
 Iris Recognition
 Retina Scanning
 Speaker Recognition
 Benefits of Biometrics
 Biometrics in Business
Fingerprint

Fingerprint Pattern Analysis


Typical System: fingerprint scanner maps the
series of whorls, ridges, furrows and minutiae on
the surface of the finger
Applications:
o Law Enforcement
o Entry Devices for Buildings
o Computer Network Access
o New: grocery stores checkout,
ATM authorization
INDEX:

 Biometrics Overview
 Fingerprint

Facial Recognition
 Hand Geometry
 Iris Recognition
 Retina Scanning
 Speaker Recognition
 Benefits of Biometrics
 Biometrics in Business
Face characteristics analysis
Facial Typical system: digital video
Recognition camera input of a person’s face
images- measures facial structure;
compares against database
Applications:
o Law enforcement
o Automated bank tellers- user
verification purposes
INDEX:

 Biometrics Overview
 Fingerprint
 Facial Recognition

Hand Geometry
 Iris Recognition
 Retina Scanning
 Speaker Recognition
 Benefits of Biometrics
 Biometrics in Business
Hand Geometry

Hand shape analysis and measurement


Typical system: scanners with guidance pegs that
position the hand property for analysis
Applications:
o San Francisco International Airport
o Immigration facilities
o Day Care Centers
INDEX:

 Biometrics Overview
 Fingerprint
 Facial Recognition
 Hand Geometry

Iris Recognition
 Retina Scanning
 Speaker Recognition
 Benefits of Biometrics
 Biometrics in Business
Iris Recognition

Iris analysis
Typical system: scanner analyzes the colored tissue
around the pupil – 200 points: rings, furrows,
freckles
Applications:
o Law Enforcement
o Employee Security Check
o Streamline boarding procedures (frequent passengers –
Charlotte NC)
INDEX:

 Biometrics Overview
 Fingerprint
 Facial Recognition
 Hand Geometry
 Iris Recognition

Retina Scanning
 Speaker Recognition
 Benefits of Biometrics
 Biometrics in Business
Retina Scanning

Analysis of layer of blood vessels at the back of the


eye
Typical system: low-intensity light source and an
optical coupler; the user needs to remove glasses,
keep the eye focused on the light, 15 seconds
Applications:
o High-end security: military, power plans
DNA (Deoxyribonucleic acid)

A DNA sample is used to produce either a DNA


fingerprint or a DNA profile
Applications:
o Medical applications
o Paternity Tests
o Criminal identification and forensics
o Personal Identification: DNA PAK38 (Personal Archival
Kit): conserving a sample so the person can be identified
in case of kidnapping, accidents or natural disasters.
o Commercial applications limited
INDEX:

 Biometrics Overview
 Fingerprint
 Facial Recognition
 Hand Geometry
 Iris Recognition
 Retina Scanning

Speaker Recognition
 Benefits of Biometrics
 Biometrics in Business
Speaker Recognition

Voice print analysis


Typical system: uses the pitch, pattern, tone,
rhythm of speech for identification purposes; only
biometric that allows users to authenticate
remotely
Applications:
o Call Centers
o Law enforcement – house arrest authentication
o Electronic commerce
o Customer authentication for service calls
Signature Recognition

 Handwriting analysis
 Typical System: user will sign on a tablet, the device will
record pressure, speed, sequence and shape of characters
and compare to a database
o Cyber SIGN in Action
view the movie. 56K modem
 Applications
o Access to documents
o Execution of contracts
o Banking services
Comparison Chart Use
Biometric Verification Identification
Fingerprint . .
Facial Recognition .
Hand Geometry .
Iris Scan . .
Retinal Scan . .
DNA . .
Speaker Recognition .
Signature Recognition .
Verification: Input compared to data previously recorded to see
Biometric not capable if the person is who she claims to be.
Biometric capable Identification: input compared to data previously recorded to
see who the person is.
Comparison Chart Accuracy/Reliability

Biometric Accuracy Reliability Errors


Fingerprint Very High High Dirt, dryness
Facial Recognition High Medium Hair, glasses, age
Hand Geometry High Medium Hand injury
Iris Scan Very High High Poor lighting
Retinal Scan Very High High Glasses
DNA Very High High none
Speaker Recognition Medium Low Noise, colds
Signature Recognition Medium Low Changing signatures

Accuracy: How well can the specific biometric is able to tell individual apart
Reliability: how dependable the specific biometric is for recognition purposes
Comparison Chart Characteristics
Biometric User Ease of Low Hardware
Acceptance Use Cost
Fingerprint Medium High
. Special, cheap

Facial Recognition Medium Medium


. Common, cheap

Hand Geometry Medium High Special, mid-price


Iris Scan Medium Medium Special, expensive
Retinal Scan Medium Low Special, expensive
DNA Low Low Special, expensive
Speaker Recognition High High
. Common, cheap

Signature Recognition Medium High


. Special, mid-price

User Acceptance: willingness of the public to accept the use of the specific biometric
Ease of Use: - for both user and personnel
Low Cost: is there a low cost option for the specific biometric no  .yes
Hardware: type and cost of hardware required to use the specific biometric
Comparison Accuracy vs. Cost
What Biometrics are Replacing

Traditional verification methods:


Passwords
 PIN numbers
Tokens
 Photo ID cards
 Smart cards
 Magnetic strip cards
 Physical keys
 Key chains
INDEX:

 Biometrics Overview
 Fingerprint
 Facial Recognition
 Hand Geometry
 Iris Recognition
 Retina Scanning
 Speaker Recognition

Benefits of Biometrics
 Biometrics in Business
Benefits of
Biometrics
•- Increased security

•- Convenience

•- Opportunity to build
a sustainable
competitive advantage
•- Growing technology
and advancement
Benefits of Biometrics

For Employers For Employees

 Increased security measures  Convenience – no passwords to


due to lack of sharing passwords forget
and identification cards
 Reduce costs of password and  Eliminate problems of long
ID card maintenance passwords and lost/stolen
 Reduce payroll costs of identification cards and PIN
“buddy punching” timecards numbers
 Sustainable competitive
 Faster login time
advantage for businesses –
advanced technology to ensure  Improved security of sensitive
security for clientele information
 Ability to track employees and
link activities
Concerns with Biometrics

For Employers For Employees

 Biometric data is very sensitive and  Biometrics can seem intrusive


security of this information is vital –
more susceptible to hackers to employees – intrudes on
 It is possible to steal fingerprints by personal space
using the “latent fingerprint” – residue
left from touching a surface  Employees may be reluctant to
 Text-based voice recognition may change
have errors identifying individuals if
their voice changes  Biometric identification cannot
 Biometrics can’t be used with work with all employees,
certain groups such as people with
disabilities such as disabled individuals
 Biometrics, like all other security  Employees scared of biometric
identification methods, is not
foolproof information to be abused or
 Biometric systems costly and time stolen
consuming to implement
Biometrics in Business

Current Biometric Applications:


 Computer logins
 ATMs
 Grocery stores
 Airport kiosks
 Driver’s licenses
 Internet banking
 National ID cards
 Welfare disbursement
 International border crossing
 Forensics – criminal identification
 Annual amusement park pass holders
 Speaker verification for television home shopping
Biometrics in Business
Signature verification: Fingerprint
 Electronic commerce identification:
 E-business essential  Social services
factors for growth:  Background checks
 Highly secure  Criminal identification
 Trustworthy

Speaker recognition:
 Large voice processing
 Verify customer during
transactions via telephone
INDEX:

 Biometrics Overview
 Fingerprint
 Facial Recognition
 Hand Geometry
 Iris Recognition
 Retina Scanning
 Speaker Recognition
 Benefits of Biometrics

Biometrics in Business
Biometrics in Business

Other biometric technology being used:


Automobiles
 Replace keys for keyless entry and keyless ignition
E-passports
 Passports with embedded chip containing person’s facial image
and other traits
Thank you!

You might also like