Upload
abhishek-mishra
View
3.801
Download
2
Tags:
Embed Size (px)
DESCRIPTION
This is the introductory presentation we did for Biometrics as our English project March 2009 :)
Citation preview
Identification Simplified
What we need ?
a method to identify individuals which is -
What we need ?
Secure
What we need ?a method to identify individuals which is -
Secure
Convenient
What we need ?a method to identify individuals which is -
How do we do that ?
ID Cards & Smart Cards
How do we do that ?
RFID Cards
How do we do that ?
• RFID – Radio Frequency Identification
Passwords
How do we do that ?
Wrist Bands
How do we do that ?
ID Cards & Smart Cards
Wrist Bands too !!Wrist Bands
Passwords
RFID Cards
How do we do that ?
Wrist Bands
ID Cards & Smart Cards
Passwords
RFID Cards
Wow! So many ways to identify
people! what could be wrong?
How do we do that ?
What’s wrong with all that ?
ID Cards
Smart Cards
RFID Cards
Wrist Bands
Can be Stolen!
What’s wrong with all that ?
Easily Duplicated
Have got Limits
BG107CS***Allocates from
BG107CS000 to BG107CS999
Total 1000 students!
What’s wrong with all that ?
Passwords
What’s wrong with all that ?
Passwords Easily Forgotten
What’s wrong with all that ?
Passwords
Needs to be Changed
Easily Forgotten
What’s wrong with all that ?
Passwords
Needs to be Changed
Easily Forgotten
What’s wrong with all that ?
Passwords
Needs to be Changed
Easily Forgotten
The Password Is "Expensive“
It typically costs a company $10 to $13 to reset an employee password, according to Forrester
Research
What’s wrong with all that ?
The answer to all this…
Lies Within Us!
The answer to all this…
In the form of Biometrics
In the form of Biometrics
Biometrics is the study ofcomputerized methods to
identify a person by their
uniquephysical or behavioural
characteristics
In the form of Biometrics
What’s in store for you?
Iris Recognition
What’s in store for you?
Voice Recognition
Fingerprint Authentication
Face Recognition
Other Types
Iris Recognition
S. Supraja
The Basics
Iris Recognition
The Basics
Iris Recognition
• Colored portion of the eye
• Unique •Single enrollment for a lifetime
• Can be used with glasses or contacts
The Process
Iris Recognition
1. Image Acquisition
The Process
Iris Recognition
1. Image Acquisition2. Iris Definition
The Process
Iris Recognition
1. Image Acquisition2. Iris Definition3. Field Optimization
The Process
Iris Recognition
1. Image Acquisition2. Iris Definition3. Field Optimization4. Image Analysis
Iris Code Comparison
Iris Recognition
Iris Code Comparison
Iris Recognition
Iris Code Comparison
Iris Recognition
Iris Code Comparison
Iris Recognition
Mismatch = (204/2048)*100 = 10%
It’s Fool-Proof
Iris Recognition
• 65.8% match• Un-modifiable• Pupil Dilation• No replacement
for a live eye
Voice Recognition
“Voice verification required.”
“My voice is my password.Give me access.”
“Voice Print verified. Identity confirmed.
Access Granted.”
Sahana V.
Voice Recognition
Voice Recognition
Voice Recognition
Voice Recognition
Voice Recognition
Voice Recognition
Approach
Voice Recognition
Approach
Voice Recognition
Time
Fre
qu
en
cy D
om
ain
Waveform
1. Text dependent-hidden markov model
2. Text independent-vector quantization
How is it done ?
Voice Recognition
How is it done ?
Voice RecognitionA
mp
litu
de
Time
Two Waveforms of same word
•Waveform - the shape of a wave illustrated graphically
• Amplitude - displacement of a periodic wave
How is it done ?
Voice RecognitionA
mp
litu
de
Time
Are Different
“Sample”
Two Waveforms of same word
“Sample”
How is it done ?
Voice RecognitionFr
eq
ue
ncy
Time
“Sample” “Sample”
But the Frequency-Time plots
•Frequency - The number of occurrences of an event within a given interval
How is it done ?
Voice RecognitionFr
eq
ue
ncy
Time
Look Similar
“Sample” “Sample”
But the Frequency-Time plots
Applications
Voice Recognition
1. Voice recognition for Authentication1. Single pass phrase system2. Text prompt system3. Verification integrated in a dialogue system
Applications
Voice Recognition
1. Voice recognition for Authentication1. Single pass phrase system2. Text prompt system3. Verification integrated in a dialogue system
2. Voice recognition for SurveillanceForensic Voice Recognition
Face Recognition
Pooja Sastry
Features
Face Recognition
• Facial Features are Unique
Features
Face Recognition
• Facial Features are Unique• Passive Biometrics
Features
Face Recognition
• Facial Features are Unique• Passive Biometrics• Already Widespread
Features
Face Recognition
• Facial Features are Unique• Passive Biometrics• Already Widespread• Inexpensive
Categories
Face Recognition
Categories
Face Recognition
1. Face Geometry
Categories
Face Recognition
1. Face Geometry2. Facial Thermograms
Categories
Face Recognition
1. Face Geometry2. Facial Thermograms3. Eigen Face Method
Categories
Face Recognition
1. Face Geometry2. Facial Thermograms3. Eigen Face Method4. Template Based
Process
Face Recognition
Process
Face Recognition
Detection
Process
Face Recognition
Alignment & Measurement
Process
Face Recognition
Representation & Matching
Process
Face Recognition
Identity Confirmed
Identification
Face Recognition
WHO AM I?
Verification
Face Recognition
AM I WHO I SAY I AM ?
Fingerprint Authentication
S. Krithika
Features
Fingerprint Authentication
•Ridges, Valleys
Features
Fingerprint Authentication
•Ridges, Valleys
Features
Fingerprint Authentication
Ridges
Valleys
•Ridges, Valleys•Dark lines - Ridges •Brighter lines -Valleys
Features
Fingerprint Authentication
Ridges
Valleys
Discriminating Information
Fingerprint Authentication
Discriminating Information
Fingerprint Authentication
1. Ridge Termination
2. Ridge Bifurcation
Authentication Procedure
Fingerprint Authentication
Authentication Procedure
Fingerprint Authentication
Two essential procedures
• Enrollment
• Authentication
Authentication Procedure
Fingerprint Authentication
Authentication Procedure
Fingerprint Authentication
Classified roughly as• Optical• Non-Optical
Image Acquisition
Authentication Procedure
Fingerprint Authentication
Authentication Procedure
Fingerprint Authentication
• Direct• Feature or Minutia based
Feature Extraction
Authentication Procedure
Fingerprint Authentication
Authentication Procedure
Fingerprint Authentication
• 1 : 1 Matching
• 1 : N Matching
Matching
Authentication Procedure
Fingerprint Authentication
Authentication Procedure
Fingerprint Authentication
Applications
Fingerprint Authentication
Applications
Fingerprint Authentication
• Biometric Smart Gun
Applications
Fingerprint Authentication
• Biometric Smart Gun• Olympic Summer Games - Athens, Greece 2004
Drawback
Fingerprint Authentication
Drawback
Fingerprint Authentication
• Skin Diseasesprevent normal formation
• Magali (Naegeli) syndrome
• The HuangTienfamily in Taiwan
Drawback
Fingerprint Authentication
• Skin Diseasesprevent normal formation
• Magali (Naegeli) syndrome
• The HuangTienfamily in Taiwan
Other Types
Subhash Choudhary
Palm/Hand Geometry
Other Types
Palm/Hand Geometry
Other Types
• Full-Hand Geometry
Palm/Hand Geometry
Other Types
• Full-Hand Geometry
• Two Finger Scan
Palm/Hand Geometry
Other Types
• Full-Hand Geometry
• Two Finger Scan
Image Acquisition
Palm/Hand Geometry
Other Types
• Full-Hand Geometry
• Two Finger Scan
Image Acquisition Outline
Palm/Hand Geometry
Other Types
• Full-Hand Geometry
• Two Finger Scan
Image Acquisition Outline Geometry
DNA
Other Types
DNA
Other Types
• Requires Actual Physical Sample
DNA
Other Types
• Requires Actual Physical Sample
• Not fully automated
DNA
Other Types
• Requires Actual Physical Sample
• Not fully automated
DNA
Other Types
• Requires Actual Physical Sample
• Not fully automated
• Expensive
DNA
Other Types
• Requires Actual Physical Sample
• Not fully automated
• Expensive
• Privacy Issues
Gait
Other Types
Gait
Other Types
• Study of AnimalLocomotion
Gait
Other Types
• Study of AnimalLocomotion
• Helps Athletes
Gait
Other Types
• Study of AnimalLocomotion
• Helps Athletes
• Standard Camera – any condition
Gait
Other Types
• Study of AnimalLocomotion
• Helps Athletes
• Standard Camera – any condition
• Identification at a Distance
Skin Reflection
Other Types
Skin Reflection
Other Types
• Absorption Spectrum of Skin varies
Skin Reflection
Other Types
• Absorption Spectrum of Skin varies
• LEDs send Light into Skin
Skin Reflection
Other Types
• Absorption Spectrum of Skin varies
• LEDs send Light into Skin
• Photodiodes read reflected light
Future of Biometrics
Ratnala Srikanth
The Past & The Present
Security & Privacy
Biometrics in Action
Cost & Accuracy
Future of Biometrics
Biometric Systems must be Fool-Proof
Security & Privacy
Security of Collected Biometric Data
Biometrics In Action
Immigration Control
Biometrics In Action
Immigration Control
Biometric Data is embedded in UK Passports
Biometrics In Action
Transactional Authentication
Biometrics In Action
Transactional Authentication
A Biometric ATM in Malawi (South Africa)
Biometrics In Action
Computer Security
Biometrics In Action
Computer Security
Finger Scan In Modern Laptops
Biometrics In Action
Smart Doors
Biometrics In Action
Smart Doors
A New way for Physical Access Control
Biometrics In Action
Time and Attendance
Biometrics In Action
Time and Attendance
A New Tamper-Proof way…
Biometrics In Action
More Accuracy = More Cost
Cost & Accuracy
More Accuracy = More Cost
Cost & Accuracy
Conclusion
End of Paper based Identity
Conclusion
End of Identity Theft
Conclusion
Comfortable life + Improved Security
Helps us Fight Terrorism
Saves Time
Reduces Expenditure on Security
Conclusion
We need to -
Conclusion
• do Research in Biometrics• bring Awareness amongst people• Be ready for the change• Bring about a change• Become Smart
Further Reading• Paul Reid . Biometrics for Network Security . Prentice Hall PTR . December 30, 2003
• Nalini K Ratha . Advances in Biometrics . Springer . 2007
• Biometrics Consortium -•http://www.biometrics.org/resources.php
• Biometrics Products –http://www.biometricsproducts.com/
• Introduction to Biometrics -http://biometrics.gov/ReferenceRoom/Introduction.aspx
Thank You!
Abhishek Mishra S. Krithika
Pooja Sastry
S. Supraja
Subhash Choudhary
Ratnala Srikanth
Sahana V.
Questions ?