Upload
srishti-sabharwal
View
2.207
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
A SEMINAR ON
BIOMETRICS FOR RECOGNITION
Submitted by-:Priyanka sehgalBCA-6-A80103219052Submitted to-:Mrs Jyoti Sharma
Presentation Outlines
Traditional methods of security
Need for biometrics
Biometrics recognition techniques
How biometrics work
Applications
INTRODUCTION
• ATMs• Cellular phones• Smart cards• Desktop PCs• Workstations• Computer networks
PINs and passwords may be forgotten,
Token-based identification methods such as passports and driver’s licenses may be forged, stolen, or lost.
TRADITIONAL SECURITY METHODS
Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics .
WHAT IS BIOMETRICS ?
• BIO-Physical or Behavioral
• METRICS-To measure characteristics
Physical biometrics:
Fingerprint Facial recognition/face location Hand geometry Iris scan Retinal scan
Fingerprint recognition
Steps to Facial Recognition
1.Capture image
2. Find face in image
3. Extract features (store template)
4. Compare templates
5. Declare matches
Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers.
Hand Geometry
Iris recognition
Iris scanning measures the iris pattern in the coloured part of the eye,
RETINAL SCAN
Behavioral biometrics:
Speaker/voice recognition: Analyzing vocal behaviorSignature/handwriting: Analyzing signature dynamics Keystroke/patterning: Measuring the time spacing of typed words
Signature Verification : an automated method of measuring an individual’s signature. This technology examines speed,direction, and pressure of writing; the time that the stylus is in and out of contact with the “paper.
Speaker / Voice Recognition:Voice or speaker recognition uses vocal characteristics to identify individuals. A telephone or microphone can serve as asensor,
Keystroke Dynamics:
Keystroke dynamics is an automated method of examining an individual’s keystrokes on a keyboard.
This technology examines such dynamicsas speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys.
Prevent unauthorized access to ATMs, Cellular phones, Smart cards, Desktop PCs, Workstations, Computer network.Criminal identification,prison security.Electronic commerce,Electronic banking.Airport security,voter cards,civilian applications.
APPLICATIONS
Conclusion:
Biometric is an emerging area with many opportunities for growth.
Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past.