Sie sind auf Seite 1von 25

Kottam college of engineering

Chinnatekur
kurnool

Prepared By
A.Goutami
REG NO:13EH1D5814

What is Authentication ?

Types of Authentication

What is Biometric?

Why Biometric?

Characteristics of Biometric

Mode of Biometric system

Working of Biometrics System

Different Biometric techniques

Comparison Between Different Techniques

Advantages of Biometric Authentication

Limitations of Biometric System

Conclusion

Authentication is the act of confirming


something what it claims to be.
It is the process of giving someone identity so
that he or she can access that particular
application or data.
For e.g.: giving identity-card to a student of an
institute.

By using passwords, PIN

By using smart card or swipe card

By using Biometric

Biometric is a combination of two Greek words Bio(Life)


and Metric(To Measure).
It actually measures and analyzes the biological traits of a
human being.
Biometric is the automated process of identifying or
verifying an individual based upon his or her behavioral
or physical characteristics.

Identity theft is not possible


password remembrance problem does not exist
Cannot be predicted or hacked
Cannot be shared
Perceived as more secure

Automated method of recognizing an individual is


based
on two main characteristics :
Physical characteristics are related to physical shape of
the body. For e.g.: fingerprint ,face recognition, hand
geometry, iris recognition etc.
Behavioral characteristics are related to the behavior of
a person. For e.g.: voice pitch, speaking style, typing
rhythm, signature etc.

[3]

Identification
One-to-many comparison
It search for a sample against a database of templates
It identifies an unknown individual.
For e.g.: who is x?
Verification
One-to-one comparison
It compares a sample against a single stored template
It verifies that the individual is who he claims to be
For e.g.: is this x?

Steps:
Capturing
Pre-processing
Feature extraction
Template matching
Matcher/Comparison
Application Device

[3]

Authentication: In this stage, the registered


biometric sample during the enrollment process
are matched against newly capturing biometric
sample.

A scanning device
A software which converts scanned
information into digital forms and compares on
some matching points
A database that stores biometric features for
further comparison

Fingerprint technology:
It is the oldest and most widely used method.
It needs a fingerprint reader.
Registered points are located and compared.
Optical sensors are used for scanning purpose.
It can be used for many applications like pc login
security, voting system,
attendance system etc.

[12]

Uses the ridge endings and bifurcation's on a


persons finger to plot points known as
Minutiae
The number and locations of the minutiae vary
from finger to finger in any particular person,
and from person to person for any particular
finger

Finger Image

Finger Image + Minutiae

Minutiae

Face recognition technology:


Face Recognition is a biometric technique for
automatic identification or verification of a person from
a digital image.
These include the position/size/shape of the eyes, nose,
cheekbones and jaw line.

Iris Recognition Technology:


It measures the iris pattern of the eye i.e. the colored part
of the eye that surrounds the pupil.
The iris canner analyzes features like rings, furrows, and
freckles existing in the colored tissue surrounding the
pupil.
Iris pattern is not changed over
years or by glasses, contact lens

Places

hand on the system, which takes the three


dimensional image of the hand.

[6]

Speaker recognition technology:


Voice Recognition or Speaker Recognition is a biometric
process of validating a user's claimed identity using
characteristics extracted from their voices.
It uses the pitch, pattern, tone, frequency, rhythm of
speech for identification purposes.
A telephone or microphone can act as a sensor.

[3]

Criminal identification
Internet banking
Attendance system
Airport, Bank security
PC login security
Prevents unauthorized access to private data
Financial transaction management

Presence of noise in the sensed data


Variations in the enrolled data
Non-universality
It is an expensive security solution

The development of e-commerce or egovernment sites can be achieved through the


utilization of this strong authentication process.
The greatest strength of the biometric system
is that they does not change over time so it is
much more efficient than other traditional
security mechanism.

Das könnte Ihnen auch gefallen