Biometrics

Views:
 
Category: Education
     
 

Presentation Description

No description available.

Comments

By: vishalkulkarnib (104 month(s) ago)

i have got some information from this site http://infokatta.com

Presentation Transcript

PowerPoint Presentation:

Free Powerpoint Templates BIOMETRICS by Malpure Saurabh.S . Thorat Gaurav.R .

PowerPoint Presentation:

Introduction The word biometric can be defined as "life - measure." It is used in security and access control applications to mean measurable physical characteristics of a person that can be checked on an automated basis. Biometric data that does not change Security personnel look for biometric data that does not change over the course of your life; that is, they look for physical characteristics that stay constant and that are difficult to fake or change on purpose.

PowerPoint Presentation:

Characteristics of successful biometric identification methods The following factors are needed to have a successful biometric identification method: The physical characteristic should not change over the course of the person's lifetime The physical characteristic must identify the individual person uniquely The physical characteristic needs to be easily scanned or read in the field, preferably with inexpensive equipment, with an immediate result The data must be easily checked against the actual person in a simple, automated way. Ease of use by individuals and system operators The willing (or knowing) participation of the subject is not required Uses legacy data (such as face recognition or voice analysis).

Biometric identification systems :

Biometric identification systems Biometric identification systems can be grouped based on the main physical characteristic that lends itself to biometric identification: 1) Fingerprint identification 2) Hand geometry. 3) Palm Vein Authentication. 4) Retina scan. 5) Iris scan. 6) Face recognition. 7) Signature. 8) Voice analysis.

Fingerprint identification:

Fingerprint identification Fingerprint ridges are formed in the womb; you have fingerprints by the fourth month of fetal development. Once formed, fingerprint ridges (raised surface where two sloping surfaces meet) are like a picture on the surface of a balloon. As the person ages, the fingers get do get larger. However, the relationship between the ridges stays the same, just like the picture on a balloon is still recognizable as the balloon is inflated.

Hand geometry:

Hand geometry Hand geometry is the measurement and comparison of the different physical characteristics of the hand. Although hand geometry does not have the same degree of permanence or individuality as some other characteristics, it is still a popular means of biometric authentication.

Palm Vein Authentication :

Palm Vein Authentication This system uses an infrared beam to penetrate the users hand as it is waved over the system; the veins within the palm of the user are returned as black lines. vein authentication has a high level of authentication accuracy due to the complexity of vein patterns of the palm. Because the palm vein patterns are internal to the body, this would be a difficult system to counterfeit.

Retina scan :

Retina scan A retina scan provides an analysis of the capillary blood vessels located in the back of the eye; the pattern remains the same throughout life. A scan uses a low-intensity light to take an image of the pattern formed by the blood vessels. Retina scans were first suggested in the 1930's.

Iris scan:

Iris scan An iris scan provides an analysis of the rings, furrows and freckles in the colored ring that surrounds the pupil of the eye. More than 200 points are used for comparison. Iris scans were proposed in 1936, but it was not until the early 1990's that algorithms for iris recognition were created. All current iris recognition systems use these basic patents, held by Iridian Technologies.

Face recognition:

Face recognition Facial characteristics (the size and shape of facial characteristics, and their relationship to each other). Typically, this method uses relative distances between common landmarks on the face to generate a unique "faceprint."

Voice analysis:

Voice analysis The analysis of the pitch, tone, cadence and frequency of a person's voice.

Biometric identification - advantages :

Biometric identification - advantages There are a number of advantages to this technology: 1) Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly. 2) Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords). 3) Automated biometric identification can be done very rapidly and uniformly, with a minimum of training. 4) Your identity can be verified without resort to documents that may be stolen, lost or altered.

Biometric technology on the leading edge :

Biometric technology on the leading edge Some leading edge applications: 1) Fingerprint scanners (and the necessary software to store and compare fingerprints) have already been installed in laptop computers and PDAs like the iPaq. 2) Sensors installed in automobiles can identify the driver, and adjust mirrors, seat positions and climate controls. 3) Special readers can measure various elements of hand geometry, comparing the result with data on file for each person. 4) Surveillance cameras can search crowds for missing persons or criminal suspects. 5) Face recognition software can be modified to recognize gestures, leading to improved assistive technologies for quadriplegic patients.

authorStream Live Help