logging in or signing up Biometric security ahbhd Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 6308 Category: Science & Tech.. License: All Rights Reserved Like it (5) Dislike it (0) Added: April 06, 2010 This Presentation is Public Favorites: 8 Presentation Description No description available. Comments Posting comment... By: mohd.shakib (35 month(s) ago) mast hai ..... best Saving..... Post Reply Close Saving..... Edit Comment Close By: kshitiz03 (36 month(s) ago) plzz send me this ppt at firstname.lastname@example.org ...plzz plzzz its wonderfull! need it Saving..... Post Reply Close Saving..... Edit Comment Close By: akanshamishra (36 month(s) ago) pls send me this ppt on my email id email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: mloveyou2 (41 month(s) ago) hellooo sir,i want the ppt about future use of biometric system authentication and security. so plz mail me appropriate ppt as early as possible.its urgent plzzz sir Saving..... Post Reply Close Saving..... Edit Comment Close By: pooja55 (41 month(s) ago) i need this presentation. plzzz mail me this presentation zs it vry imp for me Saving..... Post Reply Close Saving..... Edit Comment Close loading.... See all Premium member Presentation Transcript SEMINAR ON BIOMETRIC SECURITY SYSTEMS : SEMINAR ON BIOMETRIC SECURITY SYSTEMS Prepared By: Charmy Mota B.E. 4th ,7th Semester (CO), Valia Institute Of Technology, Valia Guide: Mr. Anand Desai Slide 2: Traditional ways of security : password security. BIOMETRIC : A measurable, physical characteristic or personal behavioral trait used to recognize the identity or verify the claimed identity of an enrolled user. Disadvantage : Password is to be remembered or may leak out. A FUTURE WITHOUT PASSWORDS : A FUTURE WITHOUT PASSWORDS End of “PASSWORD OVERLOAD” WORKPLACE DESKTOP COMPUTER CORPORATE COMPUTER NETWORK INTERNET & E-MAIL CLASSIFICATION : CLASSIFICATION IDENTIFICATION PHYSIOLOGICAL BEHAVIORAL VERIFICATION OR OR Slide 5: BIOMETRIC PROCESS Present Biometric Capture Process Present Biometric Capture Process COMPARE STORE ENROLLMENT VERIFICATION NO MATCH MATCH Slide 6: TECHNOLOGIES BIOMETRICS SECURITY FINGER SIGNATURE FACE VOICE IRIS HAND IRIS RECOGNITION : IRIS RECOGNITION Iris patterns are extremely complex. Patterns are individual Patterns are formed by six months after birth, stable after a year. They remain the same for life. Imitation is almost impossible. Patterns are easy to capture and encode FINGERPRINT RECOGNITION : FINGERPRINT RECOGNITION Oldest method Everyone is known to have unique, immutable fingerprints. The uniqueness pattern of ridges and furrows as well as the minutiae points. HOW IT WORKS : HOW IT WORKS SUBMISSION FEATURE EXTRACTION IMAGE ENHANCEMENT MATCHING FACE RECOGNITION : FACE RECOGNITION COMFORTABLE IMAGE QUALITY IS A VITAL FACTOR HIGH SUSCEPTIBILITY TO FALSE POSITIVES & FALSE NEGATIVES FOUR PRIMARY TECHNOLOGIES VOICE RECOGNITION : VOICE RECOGNITION The software remembers the way you say each word. Voice recognition possible even though everyone speaks with varying accents and inflection. Telephony : the primary growth area HAND GEOMETRY : HAND GEOMETRY 32,000-pixel CCD digital camera . The hand-scan device can process the 3-D images in less than 5 seconds & the verification usually takes less than 1 second. U.S INPASS PROGRAM SIGNATURE RECOGNITION : SIGNATURE RECOGNITION How the signature was made. i.e. changes in speed, pressure and timing that occur during the act of signing An expert forger may be able to duplicate what a signature looks like, but it is virtually impossible to duplicate the timing changes in X, Y and Z (pressure) Slide 14: A multimodal biometric system uses the integration of biometric systems in order to meet stringent performance requirements. Much more vital to fraudulent technologies TOKENS, SMART CARDS & BIOMETRIC AUTHENTICATION SCHEMES : TOKENS, SMART CARDS & BIOMETRIC AUTHENTICATION SCHEMES INTEGRATION IS ESSENTIAL Slide 16: Hand-held PDA PL - 500 VIRDI 300 BAC SecureTouch Targus DEFCON Authenticator BioLink MatchBook MIB Mifare Biometric Logon Reader Slide 17: COMPARISON Slide 18: AN EXTRA LAYER OF SECURITY The mathematical templates, if stolen, can be dangerous. IBM SOLUTION Now biometric fraud will become more sophisticated — and problematic. MARKET SHARE : MARKET SHARE LOOP HOLES : LOOP HOLES Slide 21: ATM machine use. Workstation and network access Travel and tourism Internet transactions Telephone transactions Public identity cards FUTURE APPLICATIONS : CONCLUSION : CONCLUSION Once the exclusive preserve of sci-fi books and movies, biometrics now has to be considered as one of the many challenges of modern day management. Slide 23: QUERIES ??? You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.