SEMINAR ON BIOMETRIC SECURITY SYSTEMS : SEMINAR ON BIOMETRIC SECURITY SYSTEMS Prepared By: Charmy Mota
B.E. 4th ,7th Semester (CO),
Valia Institute Of Technology, Valia
Guide: Mr. Anand Desai Slide 2: Traditional ways of security : password security. BIOMETRIC : A measurable, physical characteristic
or personal behavioral trait used to recognize the
identity or verify the claimed identity of an enrolled
user. Disadvantage : Password is to be
remembered or may leak out. A FUTURE WITHOUT PASSWORDS : A FUTURE WITHOUT PASSWORDS End of “PASSWORD OVERLOAD”
INTERNET & E-MAIL CLASSIFICATION : CLASSIFICATION IDENTIFICATION PHYSIOLOGICAL BEHAVIORAL VERIFICATION OR OR Slide 5: BIOMETRIC PROCESS Present
Biometric Capture Process Present
Biometric Capture Process COMPARE STORE ENROLLMENT VERIFICATION NO MATCH MATCH Slide 6: TECHNOLOGIES BIOMETRICS SECURITY FINGER SIGNATURE FACE VOICE IRIS HAND IRIS RECOGNITION : IRIS RECOGNITION Iris patterns are extremely complex.
Patterns are individual
Patterns are formed by six months after birth, stable after a year. They remain the same for life.
Imitation is almost impossible.
Patterns are easy to capture and encode FINGERPRINT RECOGNITION : FINGERPRINT RECOGNITION Oldest method
Everyone is known to have unique, immutable fingerprints. The uniqueness pattern of ridges and furrows as well as the minutiae points. HOW IT WORKS : HOW IT WORKS SUBMISSION FEATURE EXTRACTION IMAGE ENHANCEMENT MATCHING FACE RECOGNITION : FACE RECOGNITION COMFORTABLE
IMAGE QUALITY IS A VITAL FACTOR
HIGH SUSCEPTIBILITY TO FALSE POSITIVES & FALSE NEGATIVES
FOUR PRIMARY TECHNOLOGIES VOICE RECOGNITION : VOICE RECOGNITION The software remembers the way you say each word.
Voice recognition possible even though everyone speaks with varying accents and inflection.
Telephony : the primary growth area HAND GEOMETRY : HAND GEOMETRY 32,000-pixel CCD digital camera .
The hand-scan device can process the 3-D images in less than 5 seconds & the verification usually takes less than 1 second.
U.S INPASS PROGRAM SIGNATURE RECOGNITION : SIGNATURE RECOGNITION How the signature was made. i.e. changes in speed, pressure and timing that occur during the act of signing
An expert forger may be able to duplicate what a signature looks like, but it is virtually impossible to duplicate the timing changes in X, Y and Z (pressure) Slide 14: A multimodal biometric system uses the integration of biometric systems in order to meet stringent performance requirements. Much more vital to fraudulent technologies TOKENS, SMART CARDS & BIOMETRIC AUTHENTICATION SCHEMES : TOKENS, SMART CARDS & BIOMETRIC AUTHENTICATION SCHEMES INTEGRATION IS ESSENTIAL Slide 16: Hand-held PDA PL - 500 VIRDI 300 BAC SecureTouch Targus DEFCON
MatchBook MIB Mifare
Biometric Logon Reader Slide 17: COMPARISON Slide 18: AN EXTRA LAYER OF SECURITY The mathematical templates, if stolen, can be dangerous.
Now biometric fraud will become more sophisticated — and problematic. MARKET SHARE : MARKET SHARE LOOP HOLES : LOOP HOLES Slide 21: ATM machine use.
Travel and tourism Internet
cards FUTURE APPLICATIONS : CONCLUSION : CONCLUSION Once the exclusive preserve of sci-fi books and movies, biometrics now has to be considered as one of the many challenges of modern day management. Slide 23: QUERIES ???