Biometric security

Views:
 
     
 

Presentation Description

No description available.

Comments

By: mohd.shakib (41 month(s) ago)

mast hai ..... best

By: kshitiz03 (41 month(s) ago)

plzz send me this ppt at kshitiz03@yahoo.com ...plzz plzzz its wonderfull! need it

By: akanshamishra (42 month(s) ago)

pls send me this ppt on my email id akanshamishra76@gmail.com

By: mloveyou2 (47 month(s) ago)

hellooo sir,i want the ppt about future use of biometric system authentication and security. so plz mail me appropriate ppt as early as possible.its urgent plzzz sir

By: pooja55 (47 month(s) ago)

i need this presentation. plzzz mail me this presentation zs it vry imp for me

See all

Presentation Transcript

SEMINAR ON BIOMETRIC SECURITY SYSTEMS : 

SEMINAR ON BIOMETRIC SECURITY SYSTEMS Prepared By: Charmy Mota B.E. 4th ,7th Semester (CO), Valia Institute Of Technology, Valia Guide: Mr. Anand Desai

Slide 2: 

Traditional ways of security : password security. BIOMETRIC : A measurable, physical characteristic or personal behavioral trait used to recognize the identity or verify the claimed identity of an enrolled user. Disadvantage : Password is to be remembered or may leak out.

A FUTURE WITHOUT PASSWORDS : 

A FUTURE WITHOUT PASSWORDS End of “PASSWORD OVERLOAD” WORKPLACE DESKTOP COMPUTER CORPORATE COMPUTER NETWORK INTERNET & E-MAIL

CLASSIFICATION : 

CLASSIFICATION IDENTIFICATION PHYSIOLOGICAL BEHAVIORAL VERIFICATION OR OR

Slide 5: 

BIOMETRIC PROCESS Present Biometric Capture Process Present Biometric Capture Process COMPARE STORE ENROLLMENT VERIFICATION NO MATCH MATCH

Slide 6: 

TECHNOLOGIES BIOMETRICS SECURITY FINGER SIGNATURE FACE VOICE IRIS HAND

IRIS RECOGNITION : 

IRIS RECOGNITION Iris patterns are extremely complex. Patterns are individual Patterns are formed by six months after birth, stable after a year. They remain the same for life. Imitation is almost impossible. Patterns are easy to capture and encode

FINGERPRINT RECOGNITION : 

FINGERPRINT RECOGNITION Oldest method Everyone is known to have unique, immutable fingerprints. The uniqueness pattern of ridges and furrows as well as the minutiae points.

HOW IT WORKS : 

HOW IT WORKS SUBMISSION FEATURE EXTRACTION IMAGE ENHANCEMENT MATCHING

FACE RECOGNITION : 

FACE RECOGNITION COMFORTABLE IMAGE QUALITY IS A VITAL FACTOR HIGH SUSCEPTIBILITY TO FALSE POSITIVES & FALSE NEGATIVES FOUR PRIMARY TECHNOLOGIES

VOICE RECOGNITION : 

VOICE RECOGNITION The software remembers the way you say each word. Voice recognition possible even though everyone speaks with varying accents and inflection. Telephony : the primary growth area

HAND GEOMETRY : 

HAND GEOMETRY 32,000-pixel CCD digital camera . The hand-scan device can process the 3-D images in less than 5 seconds & the verification usually takes less than 1 second. U.S INPASS PROGRAM

SIGNATURE RECOGNITION : 

SIGNATURE RECOGNITION How the signature was made. i.e. changes in speed, pressure and timing that occur during the act of signing An expert forger may be able to duplicate what a signature looks like, but it is virtually impossible to duplicate the timing changes in X, Y and Z (pressure)

Slide 14: 

A multimodal biometric system uses the integration of biometric systems in order to meet stringent performance requirements. Much more vital to fraudulent technologies

TOKENS, SMART CARDS & BIOMETRIC AUTHENTICATION SCHEMES : 

TOKENS, SMART CARDS & BIOMETRIC AUTHENTICATION SCHEMES INTEGRATION IS ESSENTIAL

Slide 16: 

Hand-held PDA PL - 500 VIRDI 300 BAC SecureTouch Targus DEFCON Authenticator BioLink MatchBook MIB Mifare Biometric Logon Reader

Slide 17: 

COMPARISON

Slide 18: 

AN EXTRA LAYER OF SECURITY The mathematical templates, if stolen, can be dangerous. IBM SOLUTION Now biometric fraud will become more sophisticated — and problematic.

MARKET SHARE : 

MARKET SHARE

LOOP HOLES : 

LOOP HOLES

Slide 21: 

ATM machine use. Workstation and network access Travel and tourism Internet transactions Telephone transactions Public identity cards FUTURE APPLICATIONS :

CONCLUSION : 

CONCLUSION Once the exclusive preserve of sci-fi books and movies, biometrics now has to be considered as one of the many challenges of modern day management.

Slide 23: 

QUERIES ???