Krupajal Engineering College: Biometrics Technology

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 31

KRUPAJAL ENGINEERING COLLEGE

Seminar on
Biometrics Technology

SUBMITTED BY:
NAME: PRIYAMBADA BEHERA
BRANCH:ELECTRONICS & TELECOM.ENGINEERING
REGD.NO: 0821223030
ROLL.NO:08ET131
12/08/21 1
INTRODUCTION:
• Biometrics is a technology which
is mainly used for the security
purpose.
• It is preferred over traditional
security methods.

12/08/21 2
TRADITIONAL SECURITY METHODS:

• Password in computer
• Pin number in ATM card
• Identity card
• Driving license

12/08/21 3
DISADVANTAGE OF TRADITIONAL
SECURITY METHOD:

• We may forget the password or pin


number.
• We may loss the identity card & driving
license.

12/08/21 4
DEFINITION OF BIOMETRICS:

• Biometrics refer to the automatic


identification of a person based on his/her
physiological or behavioral characteristics.

12/08/21 5
PHYSIOLOGICAL:

• Biometrics based on data derived from


the measurement of a part of Person’s
anatomy.
• for example:
• Face location
• Hand geometry
• fingerprint verification
• Retinal scan
12/08/21 6
BEHAVIORAL:
• Biometrics based on data derived from
measurement of an action performed
by a person.
• for example:
• Voice recoganization
• Signature verification

12/08/21 7
BIOMETRICS :HOW DO THEY WORK?
Although biometric technologies differ, they all
work in a similar fashion:
• The user submits a sample using acquisition
device.
• Sample is then compared with the sample which
is already present in database.
• If it matches, it shows it is correct otherwise it is
incorrect.

12/08/21 8
LEADING BIOMETRIC TECHNOLOGY:

• Facial recognization
• Fingerprint matching
• Hand geometry
• Voice recognization
• Signature scan

12/08/21 9
FACIAL RECOGNIZATION SYSTEM:
• A facial recognization system is a
computer-driven application for automatically
identifying a person from a digital image.
It does that by comparing selected facial
features in the live image and a facial
database.
• It is typically used for security systems and
can be compared to other biometrics such as
fingerprint or eye iris recognition systems.

12/08/21 10
FACIAL RECOGNIZATION:

12/08/21 11
ACQUISITION DEVICE:

• Video Camera
• PC camera
• single-image camera

SAMPLE :

• Facial image

12/08/21 12
FACTORS AFFECT FACIAL LOCATION:

• Quality of capture device


• Change in facial aspect
• Adding or removing glasses

12/08/21 13
FINGERPRINT IDENTIFICATION:
• Among all the biometric techniques, it is
the oldest method which has been
successfully used in numerous
application.
• The uniqueness of a fingerprint can be
determined by the pattern of ridges &
furrows as well as the minutiae points.

12/08/21 14
Figure:1

12/08/21 15
FIGURE 2.

12/08/21 16
ACQUISITION DEVICE:

• Desktop peripheral
• PC card
• Mouse chip

SAMPLE :

• Fingerprint image

12/08/21 17
FACTORS AFFECT FINGERPRINTS:

• Cold finger
• Dry/oily finger
• Cuts to fingerprint
• Manual activity that affect fingerprints

12/08/21 18
HAND GEOMETRY:

• This approach uses the geometric


shape of the hand for authenticating a
user’s identity.

12/08/21 19
12/08/21 20
ACQUISITION DEVICE:

• Proprietary Wall-mounted unit

SAMPLE :

• Image of top and sides of hand

12/08/21 21
FACTORS AFFECT HAND
GEOMETRY:

•Jewelry
• Bandage
• Swelling of joints

12/08/21 22
VOICE RECOGNIZATION:
• Voice recognization technology verifies
the identity of the individual who is
speaking.
• Voice recognization can utilize any
audio capture device, including mobile
and land telephones and PC
microphones.

12/08/21 23
ACQUISITION DEVICE:

• Microphone
• telephone

SAMPLE :
• Voice recording

12/08/21 24
FACTORS AFFECT VOICE
RECOGNIZATION:

• Cold or illness that affect voice


• Speaking softly
• Quality of capturing device
• Variation in background noise

12/08/21 25
SIGNATURE VERIFICATION:

• Signature verification technology utilizes


the distinctive aspects of the signature
to verify the identity of individuals.

12/08/21 26
ACQUISITION DEVICE:

• Signature Tablet

SAMPLE :

• Image of Signature
• record of related dynamics measurement

12/08/21 27
FACTORS AFFECT SIGNATURE:

• Signing too quickly


• Different signing position
• Change of sign

12/08/21 28
APPLICATION OF BIOMETRICS:
• It is used in forensic lab for criminals
identification.
• It is used to prevent unauthorized access to
ATM card, smart card & computer.
• In automobile, biometrics can replace keys
with key less entry & key less ignition.
• Due to increased security threats, many
country have used this technique for border
control & national ID CARDS.

12/08/21 29
CONCLUSION:
– Biometric cannot be lost, stolen or
forgotten.
– it cannot be written down and stolen by
social re-engineering.
That’s why this technology is more
secure than others.

12/08/21 30
THA
NK
YOU

31

You might also like