Sie sind auf Seite 1von 3

Seminar Report

On

BIOMETRICS
Based
AUTHENTICATION

SUBMITTED IN THE PARTIAL FULFILLMENT FOR THE AWARD


OF DEGREE OF BACHELOR OF TECHNOLOGY
In
INFORMATION TECHNOLOGY

SUBMITTED BY: SUBMITTED TO:


Anil kumar Er. Anil Jakhar
(1707123)

DEPARTMENT OF INFORMATION TECHNOLOGY


HARYANA COLLEGE OF TECHNOLOGY AND MANAGEMENT, KAITHAL-
136027 (HARYANA)

-1-
ACKNOWLEDGEMENT

I take this occasion to thank the Almighty God for the blessing me with his grace and
taking my endeavor to a successful culmination. I extend sincere and heartfelt thanks
to my esteemed guide Er. Anil Jakhar and Head of the Department, Information
Technology, H.C.T.M., Er. Saurabh Mittal, for providing me with the right
guidance and advice at crucial junctures and for allowing me to use the facilities
available. I would also like to thank the other faculty members in this regard. I
express sincere gratitude and respect to my parents, who, though not directly related
to this effort have been a constant source of inspiration. Finally yet importantly, I
would like to thank my friends for the support and encouragement they have given
me during the course of this work.

-Anil kumar

-2-
CONTENTS

1. Introduction 1
2. What is Biometrics 4
2.1 Biometrics Components & Process. 4
2.2 Biometrics Components 4
2.3 biometrics Process 5
2.3.1 Enrollment 5
2.3.2 Verification 5
2.4 Accuracy 7
3. Selecting A Biometric Technology 8
3.1 Fingure Print Authentication 9
3.1.1 Features of Fingure Print 11
3.1.2 Components of Fingure print 12
3.1.3 11
4. Mechanism of the Attack 12
5. Methods to Prevent IP Spoofing 19
5.1 Packet Filtering 19
5.2 Filtering at the Router 21
5.3 Encryption and Authentication 21
5.4 Be Un-trusting and Un-trustworthy 22
5.5 Cryptographic Methods 22
5.6 Initial Sequence Numbering Randomizing 22
6. Conclusion 23
7. References 24

-3-

Das könnte Ihnen auch gefallen