29
BIOMETRICS By Sukanta Bhattacharyya Registration # 1651210007

Biometrics-Sukanta Bhattacharyya

Embed Size (px)

DESCRIPTION

Describes the innovative means of securing and authenticating secrets keeping away the hectic of remembering passwords and PIN numbers

Citation preview

Page 1: Biometrics-Sukanta Bhattacharyya

BIOMETRICS

BySukanta Bhattacharyya Registration # 1651210007

Page 2: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

2

• Forget passwords ...

• Forget pin numbers ...

• Forget all your security concerns ...Just stay cool

Why ?????????????????????

Because here comes BIOMETRICS……

Page 3: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

3

Introduction:The nuisance of forgotten passwords and ID codes is over as biometrics-based authentication is here. Our fingerprints, iris pattern, and voice will verify our identity at ATMs, airports, etc. We can unlock our house or withdraw money from our bank with just a blink of an eye, a tap of our finger or just showing you face 

BIOMETRICS is a means of using parts of the human body as a kind of permanent password.

Just as your fingerprints are unlike those of any other person, your eyes, ears, hands, voice, and face are also unique. Technology has advanced to the point where computer systems can record and recognize the patterns, hand shapes, ear lobe contours, and a host of other physical characteristics. Using these biometrics, laptop and other portable devices can be empowered with the ability to instantly verify your identity and deny access to everybody else.

Page 4: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

4

Biometrics ?

The automated measurement of physiological and behavioral

characteristics to determine or authenticate identity is termed as biometrics. Automated means no human involvement. Physiological traits include fingerprint, hand, eyes, face while behavior traits include actions performed by humans such as ‘user speaks, types on a keyboard’ etc. These combine to recognize the identity of the user and also to authenticate the particular user for the particular job.

Page 5: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

5

Why Biometrics ?

• Traditional methods involving passwords and PIN numbers

• Biometrics highest level of security

Page 6: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

6

Biometric System

Data CollectionTransmissionSignal ProcessingData StorageDecision

Page 7: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

7

A generic biometric model or system consists of five subsystems namely data collection, transmission, signal processing, decision making and data storage. Data collection involves use of sensors to detect and measure an individual’s physiological or behavioral characteristics. Data collection stage consists of a number of sensing elements such as sensors.

Page 8: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

8

Biometric Process:

Page 9: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

9

Explanation:

The basic block diagram of a biometric system is studied in the following two modes namely verification and identification.

In verification mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be. Three steps involved in person verification. In the first step, reference models for all the users are generated and stored in the model database. In the second step, some samples are matched with reference models to generate the genuine and impostor scores and calculate the threshold. Third step is the testing step.

In identification mode the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold.

Page 10: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

10

In short

The hardware captures the salient human characteristics and the software interprets the resulting data and determines acceptability.

Page 11: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

11

Characteristics used as input data:FingerprintsVoiceprintsFacial featuresWriting patternsIris patternsHand geometry

Page 12: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

12

Fingerprint recognition system

One of the oldest form of biometrics which is highly reliable and uses distinctive finger features for the purpose of identification and verification.

Process: The process is similar to the working of a general biometrics system. The process is carried out in the following steps A fingerprint image is read from a captured

device Features are extracted from the image A template is created for comparison

Page 13: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

13

Page 14: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

14

Detailed process of finger recognition biometrics

Three steps are required for the process. They are

Fingerprint Scanning: It’s the acquisition and recognition of a

person’s fingerprint characteristics for identification purposes Fingerprint Matching: It involves the matching of the new

enrollment with the pre-captured database Identification: Finally identifies the person or subject based on

the above steps.

Page 15: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

15

Fingerprint scanning or image acquisition: Finger imprint image is taken by different techniques• Optical• Thermal• Capacitance• Ultra Sound

Page 16: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

16

Feature Extraction process:

This is followed by image acquisition stage. The different features are extracted from the acquired image. These features are called global features.

Page 17: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

17

Fingerprint matching (template matching) which is followed by feature extraction process.

Matching is done between the acquired image and the already available image in the database.

Page 18: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

18

Coding: Computation of coding is done along with the template matching technique.

Bridge coding Spur Coding

Page 19: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

19

Overall process of fingerprint recognition:

Page 20: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

20

Applications of fingerprint recognition system:

Logical access control-PC lock systemPhysical access control-Door lock systemLockersTime and attendance systems at educational institutes and

firms

Page 21: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

21

Other biometric systems:

Iris recognition system

Face recognition system

Speech /voice recognition system

Page 22: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

22

Applications of Biometrics in use:

Banks nowadays scan the fingerprints of its customers, instead of using a personal identification number (PIN), when they wish to withdraw cash.

Basically, the biometrics security technique acts as a front end to a system that requires precise identification before it can be accessed or used. The system could be a sliding door with electronic locking mechanisms, an operating system (OS), or an application where individual users have their own rights and permissions.

A biometric chip reader incorporated into a PC can facilitate secure Internet-based online transactions. Applications that are being developed to accept biometric data include computer networks, cars, cellular phones, and hoards of other types of embedded systems. Biometrics could authenticate e-mail and other documents transmitted via computer networks. In hospitals, biometric techniques could replace ID bracelets to establish patients identities for instance during blood administration.

  With existing voice-transmission technology, voice recognition biometric techniques

can function over long distances using the ordinary telephone. A well conceived and properly implemented voice-based security system could provide a greater safety to financial transaction conducted over the telephone.

Page 23: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

23

Other applications:

• Criminal identification• Prison security• ATM• Aviation security• Border crossing controls• Database access

Page 24: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

24

Benefits:

Page 25: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

25

Limitations:

Page 26: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

26

Future projects of biometrics:

Smell recognition system Ear Shape Finger nail bed Facial 3D

Page 27: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

27

Conclusion:There are always concerns about adapting to new technologies. This study shows that some people are reluctant to accept biometrics because it profoundly affects personal privacy and safety, even though they are well aware of its benefits. Furthermore, since biometrics involves personal characteristics, many are concerned that privacy should be protected, and that both government and business must maintain the public’s trust.

The future of biometrics looks increasingly bright with the demand for security rising daily.

Page 28: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

28

References:www.google.com

Google images

Page 29: Biometrics-Sukanta Bhattacharyya

Tuesday, April 11, 2023 Sukanta Bhattacharyya (Reg #1651210007)

29