Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

NIDHI SAINI

K.I.E.T.
CHAKSHU AGARWAL
A.K.G.E.C.
KANIKA MALIK
A.K.G.E.C.
INTRODUCTION

The terms "Biometrics" and "Biometry" have been used since early in the 20th
century to refer to the field of development of statistical and mathematical
methods applicable to data analysis problems in the biological sciences.
In today's world , where many important activities are carried out with the help
of computer, the need for reliable, simple, flexible and secure system is a great
concern and a challenging issue for the organization .
Biometric-based authentication system measures and analyses a person’s
unique characteristics and uses it for authentication. The particular
characteristic which is used for authentication is called biometric trait. Biometric
techniques rely on unique characteristics of individuals, such as fingerprints,
iris, signature etc.
It is not anew concept :the ancient biometric technique which was practiced
was a form of finger printing being used in China in the 14th century, as
reported by the Portuguese historian Joao de Barros.
Biometric authentication is increasingly being used in areas like banking,
retailing, defense, manufacturing, health industry, stock exchange, public sector,
airport security, internet security etc.
CLASSIFICATION OF BIOMETRIC TECHNIQUES

Biometrics can broadly be classified as-


PHYSIOLOGICAL BIOMETRICS
It uses physical traits such as fingerprint, Iris, face, ear, face, etc. for
authentication.
The physical traits are measured analyzed, and digitally stored.
For example, a fingerprint technique uses numeric encryption of its
ridges, splits, dots, valleys , etc. the iris is digitally stored using an
algorithm in a similar way using visual features like connective tissue ,
cilia, contraction furrows, corona, etc.

BEHAVIORAL BIOMETRICS:
These biometric techniques are related to the behavior of a person.
Some researchers have coined the term behavior-metrics for this class
of biometrics.
IRIS RECOGNITION

Iris recognition is a physiological biometric Identification system.


It is a method of biometric authentication that uses pattern-recognition
techniques and methods based on high-resolution images of the iris of an
individual's eyes.
The IRIS is the textural colored part of the eyeball surrounding the pupil. The iris is
a muscle that regulates the size of the pupil, controlling the amount of light
entering the eye. Each iris are unique in their own way and n o two are alike,
exhibiting a distinctive pattern.  
Iris recognition technology offers the highest accuracy in identifying individuals of
any method available. This is because no two irises are alike - not between
identical twins, or even between the left and right eye of the same person.
Iris recognition uses camera technology, with subtle infrared illumination reducing
specular reflection from the convex cornea, to create images of the detail-rich,
intricate structures of the iris. The unique patterns are converted into digital
templates, these images provide mathematical representations of the iris that
yield unambiguous positive identification of an individual.
FINGERPRINT RECOGNITION
Fingerprint-based identification is the oldest method which has been successfully used in
numerous applications.
Fingerprint recognition or fingerprint authentication refers to the automated method of
verifying a match between two human fingerprints.
A fingerprint is made of a series of ridges and furrows on the surface of the finger. The
uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well
as the minutiae points. Minutiae points are local ridge characteristics that occur at either a
ridge bifurcation or a ridge ending.
This first involves capturing the likeness of the fingerprint, either through use of a
fingerprint scanner (which takes a digital picture of a live fingerprint), scanning a pre-
existing paper-based fingerprint image or by pulling what is known as a "latent fingerprint"
from a crime scene or other place of investigation, from which a digital image is created.
Once the fingerprint image is captured, the process of identification involves the use of
complex algorithms (mathematical equations) to compare the specific features of that
fingerprint to the specific features of one or more fingerprint images that have been
previously stored in a database.

Advantage:
Since fingerprints are the composition of protruding sweat glands, everyone has unique
fingerprints. They do not change naturally.
Its reliability and stability is higher compared to the iris, voice, and face recognition
method.

Disadvantage:
Fingerprints are vulnerable to distortion brought on by dirt and twists.
Some people may feel offended about placing their fingers on the same place where many
other people have continuously touched.
KEYSTROKE

Keystroke dynamics is a behavioral identification and authentication technique.


The way we use a computer keyboard also varies from one individual to the next and in
this way authentication is achieved.
Keystroke recognition solutions are entirely software based: there is no need to install any
hardware.
In this process, an individual is required to type a specific text or group of words. Further
for enrolment, the individual must type his or her user name and password (or
text/phrase) about 15 times . Ideally, the enrolment process covers a period of time,
rather than taking place all at once. This way, the capture of behavioral characteristics will
be more consistent.
ADVANTAGES

Keystroke recognition has several strengths


It doesn’t require any additional, specialized hardware. Keystroke recognition is purely
software-based, allowing the system to be set up very quickly.
Keystroke recognition can be easily integrated with other, existing authentication
processes.

DISADVANTAGES

The weaknesses of a keystroke recognition system are the same as those suffered by other
systems that rely on a user name/password combination. For example, passwords can be
forgotten or compromised while users will have to remember multiple passwords in order
to gain access to, for example, a corporate network.

You might also like