Bis

  • Uploaded by: amazing journey
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Bis as PDF for free.

More details

  • Words: 1,097
  • Pages: 32
Biometrics Identification Systems Mikhail Parmar

2009129

Parth Bhatt

2009135

Pooja Surana

2009136

Nikeeta Kataruka

2009146

Prerana Lochav

2009178

Introduction ü Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. ü In information technology, in particular, biometrics is used as a form of identity access management and access control. ü It is also used to identify individuals in groups that are under surveillance.

Classification 1. Behavioral are related to the behavior of a person. • Examples include to typing rhythm, handwriting, voice etc. • Some researchers have coined the term behaviometrics for this class of biometrics.

Voice

The analysis of the pitch, tone, cadence and frequency of a person's voice

Applications • Automotive speech recognition (e.g., Ford Sync) • Court reporting (Real time Voice Writing) • Hands-free computing: voice command recognition computer user interface • Home automation • Interactive voice response • Mobile telephony, including mobile email • Multimodal interaction • Pronunciation evaluation in computer-aided language learning applications • Robotics • Transcription (digital speech-to-text). • Speech-to-text (transcription of speech into mobile text messages) • Air Traffic Control Speech Recognition

Hand-Writing

The way you sign your name does change over time, and can be consciously changed to some extent, it provides a basic means of identification

Classification 2. Physiological are related to the shape of the body. • Examples include fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, odor/scent etc.

Face Recognition

Facial characteristics (the size and shape of facial characteristics, and their relationship to each other). Typically, this method uses relative distances between common landmarks on the face to generate a unique "face print."

Applications • Document control (digital chip in passports, drivers‘ licenses) • Transactional authentication (credit cards, ATMs, point-of-sale) • Computer security (user access verification) • Physical access control (smart doors) • Voter registration (election accuracy) • Time and attendance (entry and exit verification)

DNA A system that recognizes human DNA. DNA evidence has been used in courts of law since 1985 to prove guilt or innocence. It is also used for paternity testing, identification of missing or dead people

Applications • DNA Testing in Forensics • DNA Testing in Healthcare • DNA Testing in Legal • DNA Testing in archeology and human genome • DNA Testing in Agriculture

Hand & Palm Geometry Hand geometry is the measurement and comparison of the different physical characteristics of the hand. It is a popular means of biometric authentication

Applications • Security systems: physical admission into secured areas with door lock and integrated building security systems • Log-in control: network or PC access • Healthcare: ID verification for medical equipment, electronic record management • Banking and financial services: access to ATM, kiosks, vault

Iris Recognition

An iris scan provides an analysis of the rings, furrows and freckles in the colored ring that surrounds the pupil of the eye. More than 200 points are used for comparison.

Applications • National border controls: the iris as a living passport • Computer login: the iris as a living password • Cell phone and other wireless-device-based authentication • Secure access to bank accounts at cash machines • Ticketless travel; authentication of rights to services • Driving licenses; other personal certificates • Entitlements and benefits authorization • Forensics; birth certificates; tracing missing or wanted persons • Credit-card authentication • Automobile ignition and unlocking; anti-theft

Finger Print

Finger Print Fingerprint recognition is based on two facts: • Fingerprints never change Small ridges form on a person's hands and feet before they are born and do not change throughout the person's life. • No two fingerprints are the same. In the over 140 years that fingerprints have been routinely compared world wide, no two areas of friction skin on any two persons (including identical twins) have been found to contain the same individual

Finger Print • The ridges on the hands and feet of all persons have three characteristics (ridge endings, bifurcations and dots) that appear in combinations that are never repeated in any two persons. • It has a strong combination of accuracy, speed and ease of use.

Finger Print Elements

Procedure • Enrolment: capturing a fingerprint image. An image of the fingerprint in question is created using a fingerprint sensor. The requirements on image size and precision depend on how much information is needed for a proper identification. • Extraction: removal of redundant information. The characteristic traits are extracted from the image and all unnecessary information is removed. The more unique this information becomes, the

Procedure • Matching: template.

comparison

with

stored

• Verification: Comparison of the input image with the image stored that represents an individual. • Identification: Comparison of the input image with all templates in a database

Components

Advantages • Acceptance—As most people are familiar with the use of fingerprinting for identification purposes, it is generally accepted as a technology. • Accuracy—Fingerprint technology is accurate. There is very low chance of accepting a false print or a chance of rejecting a legitimate print.

Advantages • Ease of use—Very little time is required for enrolment with a fingerprint scanning system. • Uniqueness—Fingerprints are a unique identifier specific to the individual.

Advantages • Installation—Changes in technology have made fingerprint scanners relatively easy to install and inexpensive. • Most fingerprint scanners are now very small and portable. Plug-and-play technologies have made installation very easy. • In many cases, the scanning device has been incorporated into keyboards, mouse

Advantages • Security—Fingerprints cannot be lost or stolen, and are difficult to reproduce. • Storing fingerprint templates as statistical algorithms rather than complete copies ensures that the ability to reproduce these unique identifiers is significantly reduced.

Disadvantages • Acceptance—User acceptance is not guaranteed. Fingerprint scanning is utilizing part of an individual’s body to identify him/her. Some people view this as an invasion of privacy or worse. • Training—Due to the intuitive nature of scanning fingerprints, such devices require training to use and to support.

Disadvantages • Injury—Injury, whether temporary or permanent, can interfere with the scanning process. In some cases reenrolment is required. • For example, bandaging a finger for a short period of time can impact an individual if fingerprint scanning is used in a wide variety of situations.

Disadvantages • Security—As some authors have argued, there is nothing to suggest that the same technology that is used to store fingerprints as statistical algorithms cannot also be used or modified to recreate accurate depiction of the print itself. • This raises serious concerns related to how such data should be stored, maintained and protected to prevent fraudulent use.

Applications

Example!!!

Related Documents

Bis
May 2020 53
Bis
August 2019 92
Bis
May 2020 54
Bis
June 2020 26
Bis
May 2020 32
Bis
October 2019 84

More Documents from ""