26
Presented By Deepali P. Chaudhari Guided By  Nareshkumar D. Harale  (HOD of Comp. Engg. Dept.) Biometri for !eure "dentity #erifiation

Bio Presentation 01

Embed Size (px)

Citation preview

Page 1: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 1/28

Presented By

Deepali P. Chaudhari

Guided By

 Nareshkumar D. Harale

  (HOD of Comp. Engg. Dept.)

Biometri for !eure "dentity

#erifiation

Page 2: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 2/28

Biometri

Biometris is the siene and tehnology of measuringand analy$ing %iologial data.

By using %iometris& the authentiation of the person is

related to that person itself rather than person's tokens

or passords.

Biometris are used for identifiation and #erifiation.

"dentifiation is determining ho a person is.

erifiation is determining if a person is ho they say

they are.

Page 3: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 3/28

Why Biometric?

•  !euring personal pri#ay

•  pre#ent identity fraud

•  *here is no ay to positi#ely link the usage of the system

or ser#ie to the atual user.

Page 4: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 4/28

•+ni,ue- *he #arious %iometris systems ha#e %een

de#eloped around uni,ue harateristis of indi#iduals.

•Cannot %e shared- Beause a %iometri property is an

intrinsi property of an indi#idual& it is etremely diffiult to

dupliate or share.•Cannot %e opied- Biometri harateristis are nearly

impossi%le to forge or spoof.

•Cannot %e lost- / %iometri property of an indi#idual an %e

lost only in ase of serious aident.

Why are biometrics secure?

Page 5: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 5/28

Ho Biometri !ystem 0orks

• Enrollment

• erifiation

• "dentifiation

Page 6: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 6/28

Stages of Biometric system

1. "mage /,uisition2. "mage proessing

3. 4eature Etration

5. "ris "dentifiation

Page 7: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 7/28

Types of Biometric 

Finger Scanning

•4ingerprints are the graphial flo6like ridges present on humanfingers.

•4ingerprints are used in the areas of finanial transations& netork

seurity& and ontrolling the mo#ement of indi#iduals.

•*he main tehnologies used to apture the fingerprint image ithsuffiient detail are optial& silion& and ultrasound.

Issues with fingerprint systems

•*he tip of the finger is a small area from hih to take

measurements& and ridge patterns is ompliated task.

• E#en to take measurements& and ridge patterns here uts 7 dirt is

there is ompliated task.

•People ith no or fe minutia points (surgeons as they often ash

their hands ith strong detergents& %uilders& people ith speial

skin onditions) annot enroll or use the system.

Page 8: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 8/28

Benefits of fingerprint biometric systems

•  8 Easy to use

•  8 Cheap•  8 !mall si$e

•  8 9o poer 

•  8 9arge data%ase already a#aila%le

Applications of fingerprint biometrics•4ingerprint sensors are %est for de#ies suh as ell phones& +!B flash

dri#es& note%ook omputers and other appliations here prie& si$e&

ost and lo poer are key re,uirements.

• 4ingerprint %iometri systems are also used for la enforement& %akground searhes to sreen :o% appliants& healthare and elfare.

Page 9: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 9/28

Iris Scanning 

•*he iris is the elasti& pigmented& onneti#e tissue that ontrols the

 pupil.

•Glasses& ontat lenses& and e#en eye surgery does not hange the

harateristis of the iris.

Benefits of iris biometric systems

 8 Highly aurate

 Weaknesses of iris biometric systems

  8 *he user must hold still hile the san is taking plae

Page 10: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 10/28

Applications of iris biometrics

• "dentity ards and passports

• Border ontrol and other Go#ernment programs

• Data%ase aess and omputer login• Hospital seurity

• !hools seurity

• Controlling aess to restrited areas& %uildings and homes.

Iris recognition system steps

•"mage a,uisition•"mage preproessing

•*eture Etration

•Deision ;aking.

Page 11: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 11/28

Retina Scanning

*he %lood #essels at the %ak of the eye ha#e a uni,ue pattern& from

eye to eye and person to person.

How oes retina biometrics work 

•<etina sans re,uire that the person remo#es their glasses& plae

their eye lose to the sanner& stare at a speifi point& and remain

still& and fous on a speified loation for approimately 1= to 1>

seonds hile the san is ompleted. 

•<etina sans use infrared light to sur#ey the uni,ue pattern of

 %lood #essels of the retina

Issues with retina systems

•Enrollment and sanning are slo.

Page 12: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 12/28

Benefits of retina biometric systems

  ! Highly aurate

Applications of retina biometrics

• Go#ernment

• ;ilitary

• %anking.

Page 13: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 13/28

Facial Recognition

*he dimensions& proportions and physial attri%utes of a person?s fae

are uni,ue.

How oes face biometrics work 

•Biometri faial reognition systems ill measure and analy$e the

o#erall struture& shape and proportions of the fae.

• Distane %eteen the eyes& nose& mouth& and :a edges.• +pper outlines of the eye sokets& the sides of the mouth& the

loation of the nose and eyes& the area surrounding the heek%ones.

Page 14: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 14/28

Benefits of face biometric systems

 8 Can %e done from a distane& e#en ithout the user

 %eing aare of it.

Weaknesses of face biometric systems

 8 4ae %iometri systems are more suited for authentiation than for

identifiation purposes& as it is easy to hange the proportion of one?s

fae %y earing a mask& a nose etension& et. 8 ;ost people are unomforta%le ith ha#ing their piture taken.

Applications of face biometrics

/ess to restrited areas and %uildings& %anks& military sites& airports&

la enforement.

Page 15: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 15/28

"oice Recognition

Our #oies are uni,ue to eah person (inluding tins)& and annot %e

eatly repliated.

How oes #oice biometrics work 

!peeh inludes to omponents

• physiologial omponent (the #oie trat)

• %eha#ioural omponent (the aent)

Page 16: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 16/28

Benefits of #oice biometric systems

  8 /%ility to use eisting telephones

  8 Can %e automated& and oupled ith speeh reognition systems

  8 9o perei#ed in#asi#eness

Weaknesses of #oice biometric systems

  8 High false& non6mathing rates

Applications of #oice biometrics

•*elephony6%ased appliations.

•oie #erifiation is used for go#ernment& healthare& all enters&

eletroni ommere& finanial ser#ies& ustomer authentiation for

ser#ie alls.

Page 17: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 17/28

$%TH&'S &F BI&$%TRI(S

)abor Filtering

•Ga%or elementary funtions are Gaussians modulated %y sinusoidal

funtions.• / to dimensional (2D) e#en Ga%or filter an %e represented %y the

folloing e,uation in the spatial domain-

• *he entral fre,uenies used are 2& 5& @& 1A& and 32 ylesdegree.

• 4or eah entral fre,ueny  f  & filtering is performed at ==& 5>=& ==&and 13>=.

• *here are a total of 2= Ga%or filters ith different fre,uenies and

diretions.

Page 18: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 18/28

4ig. 3.2 (a) Original "mage. (%) Ga%or 4ilter. () Ga%or filtered "mage.

Page 19: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 19/28

*on Filter+base Techni,ue

On the iris images e applied the preproessing steps of F.Daugman's

algorithm .

 *he preproessing step inludes-

1. "ris 9oali$ation- *he slera& pupil and eyelids are segmented (4ig . a).2. "ris Normali$ation- *ransformation of loali$ed iris region from

Cartesian oordinates to Polar oordinates (4ig . %).

3. ;asking- *he region orresponding to eyelids and eyelashes are then

masked (4ig . C).

Page 20: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 20/28

Wa#elet Transform

*he a#elet transform di#ides the original image into four su%6%ands

and they are denoted %y 99(lo6lo)& 9H(lo6high)& H9(high6lo)and HH(high6high) fre,ueny su%6%ands.

fig. a. Failure case Fig. b. Success case

Figure 5. Localization of the iris pattern result

 

Page 21: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 21/28

*eural *etwork 

4ig. Outline of 4ae <eognition !ystem %y using Bak6propagation

 Neural Netork 

Page 22: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 22/28

A#antage

• *here is no etra learning proess inluded here& only %y sa#ing the

fae information of the person and appending the person's name in the

learned data%ase ompletes the learning proess.

•Etrated features are fed into the input of the multilayer Neural

 Netork and the netork is trained to reate a knoledge %ase for

reognition hih is then used for reognition.

T bl A ( i f Bi t i

Page 23: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 23/28

Table A: Comparison of Biometric Technologies

Biometrics Permanence Performance Uniqueness Acceptability

FingerprintH H H M

Hand GeometryM M M M

Retinal ScanningM H H L

Iris ScanningH H H L

Facial RecognitionM L L H

Dynamic SignatureL L L H

Keystroke DynamicsL L L M

Voice RecognitionL L L H

H= High, M= Meium, != !o"

  Table A- (omparison of Biometric

Technologies

Page 24: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 24/28

S%.%(TI&* (RIT%RIA F&R BI&$%TRI( T/0%S

• Eonomi 4easi%ility or Cost

• <isk /nalysis

• Pereption of +sers

• *ehno !oio 4easi%ility

• !eurity

• +ser friendly and soial aepta%ility

• 9egal 4easi%ility• Pri#ay

A li ti

Page 25: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 25/28

Applications

•Prison #isitor systems.

•Dri#er's lienses.

•Canteen administration•Benefit payment systems.

•Border ontrol.

•oting systems.

Page 26: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 26/28

Future Applications+Some common ieas

 /*; mahine use

 0orkstation and netork aess *ra#el and tourism "nternet transations *elephone transations Pu%li identity ards

Page 27: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 27/28

A#antages

 /uthentiate the user.

 +sers annot pass %iometri harateristis to other users as easilyas they do ards or passords.

 Biometri o%:ets annot %e stolen.

 ;ost %iometri tehni,ues are %ased on features that annot %e lostor forgotten.

 Biometri authentiation systems re,uires less speed.

Page 28: Bio Presentation 01

7/25/2019 Bio Presentation 01

http://slidepdf.com/reader/full/bio-presentation-01 28/28

'rawbacks of biometrics

*hat the system ill enhane the poer o#er indi#iduals of partiular

organi$ations and the !tate*hat high6integrity identifiation em%odies an in#ersion of the

appropriate relationship %eteen the iti$en and the !tate

*hat soiety is %eoming dri#en %y tehnology6assisted %ureauray&

rather than %y eleted go#ernment

•*hat eemptions and eeptions ill eist for poerful indi#idualsand organi$ations& and that the system ill entrenh fraud and

riminality

• *hat suh identifiation shemes are the mehanism foretold in

religious prophey (e.g. ?the ;ark of the Beast?).