Biometrics(By Aashish Tanania)
• In the terms of computer security, biometrics refers to
authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified.
• A Biometric System is a system for the automated
recognition of individuals based on their behavioral and
biological characteristics.
• Depending on the context, in a biometric system, there are
two different ways to resolve a person’s identity
i. VERIFICATION
ii. IDENTIFICATION
Verification:- Comparing a sample against
a single stored template is called
verification
stored Template
? 1
Input Data
Identification :- Search a sample
against a database of
templates.
input data
database
1
Biometrics Process
No
Yes
Biometric
Data Collection
Transmission
Quality
Sufficient?
Yes
Template Match
Signal Processing,
Feature Extraction,
Representation
Database
Generate Template
Decision
Confidence?
new biometric sample is requested.
No
Physical biometrics:
 Fingerprint—Analyzing fingertip patterns
 Facial recognition/face location—Measuring facial
characteristics
 Hand geometry—Measuring the shape of the hand
 Iris scan—Analyzing features of colored ring of the eye.
 Retinal scan—Analyzing blood vessels in the eye
 Vascular patterns—Analyzing vein patterns
 DNA—Analyzing genetic makeup.
 Fingerprint Recognition is the identification by using patterns
of friction ridges and valleys on an individual's fingertips
which are unique to that individual.
o Face recognition uses the visible physical structure of the
face and analyses the spatial geometry of distinguishing
features in it to identify an individual.
o The distance between eyes
o Size of mouth
o It is sensitive to environmental variables such as dust and
lighting and other factors such as facial expression, facial
hair, hats and spectacles.
o Templates are typically between 80 and 1,000 bytes in
size.
Face recognition process:
Database
Input face
image
Extraction of
face image
Extraction of
face features
Positive
negative
 The colored ring surrounding
 The pupil of the eye
 Iris patterns are formed in the eighth month of age and,
remain stable throughout the life of the individual
 The iris can have approximately 270 distinct
characteristics including meshwork, striations, rings,
freckles.
 high-quality black and white image of the iris is taken for
processing into a template that is typically around 256
bytes in size.
Iris Identification Steps:
Database
 Retinal scans record the pattern of blood vessels at
the back of the eyeball
 The biometric sensor projects a light into the eye
and requires close proximity and a high degree of
user co- operation.
 Retinal patterns are affected by medical conditions,
for example high blood pressure or eye disease
 Retinal scan templates are typically 40 to 100 bytes
in size.
Behavioral Biometrics:
• Speaker/voice recognition—Analyzing vocal
behavior
• Signature/handwriting—Analyzing signature
dynamics
• Keystroke/patterning—Measuring the time
spacing of typed words
1. It’s a habitual speaking recognition.
2. Voice recognition systems analyze differences such
as in pitch, and tone.
3. This biometric is also sensitive to
environmental conditions such as background
noise.
4 . Template size can vary significantly according to
the length of the pass phrase.
Construct voice
reference template
Database
 This biometric analyses signature characteristics
such as total time, speed, acceleration, character
direction, stroke order, stroke count, pressure and
contact with the writing surface.
 These templates are typically 50 to 300 bytes in size.
Signature Verification
Process
Database
Profile
• Similar to signature verification, this measures the
characteristics of an individual’s input of a pass phrase
or password. Characteristics may include total time,
speed with particular keys and pressure.
• Again the template size can vary significantly
depending on the length of the password or
phrase.
1. Sensing
◦ User’s characteristic must be presented to a sensor
◦ Output is a function of:
 Biometric measure
 The way it is presented
 Technical characteristics of sensor
2. Signal Processing
◦ Feature extraction
◦ Extract the desired biometric pattern
 remove noise and signal losses
 discard qualities that are not distinctive/repeatable
 Determine if feature is of “good quality”
3. Pattern matching
◦ Sample compared to original signal in database
◦ Closely matched patterns have “small distances” between them
◦ Distances will hardly ever be 0 (perfect match)
4. Decisions
◦ Decide if the match is close enough
◦ Trade-off:
  false non-matches leads to false matches
Biometrics(By Aashish Tanania)
Something you have:
(token: key, card)
Something you know:
(Password, Pin )
Something you are:
(biometric :physiological, behavioral)
Biometric
representation
Capture &
processing
Feature
extraction
Template
creation
Storage
Or database
1 . Location
2. Security
3. Task( identification,
verification)
4 . Number of users
5 . Circumstances(user’s)
6 . Existing data
i . Biometrics is a rapidly evolving technology that is being
widely used in forensics, such as criminal identification and prison
security, and that has the potential to be used in a large range of
civilian application areas.
i i . Biometrics can be used to prevent unauthorized access to
ATMs, cellular phones, smart cards, desktop PCs, workstations,
and computer networks.
i i i . It can be used during transactions conducted by telephone and
Internet (electronic commerce and electronic banking).
i v . In automobiles, biometrics can replace keys with keyless entry
devices.
Markets/sectors that are using
biometrics:
✓Government—Passports, national identification (ID) cards, voter
cards, driver’s licenses, social services, and so on
✓Transportation—Airport security, boarding passes, and commercial
driver’s licenses
✓Healthcare—Medical insurance cards, patient/employee identity cards
✓Financial—Bankcards, ATM cards, credit cards, and debit cards
✓Security—Access control and identity verifications, including time and
attendance
✓Education—Student/teacher identity verification and access control.
Biometrics are now being implemented in large-scale ID systems around
the globe.
1. Uniqueness
2. Universality
3. Permanence
4. Measurability
5. User friendliness
6. Accuracy
7. Comfort
• Biometrics cannot be lost, stolen or forgotten. Barring disease or
serious physical injury, the biometric is consistent and permanent.
• It is also secure in that the biometric itself cannot be socially
engineered, shared or used by others.
• There is no requirement to remember passwords, or PINs, thus
eliminating an overhead cost. The biometric is always available to
the individual;
• Coupled with a smart card, biometrics provide strong security for
any credentials on the smart card.
• Biometric system provide a high degree of confidence in user
identity.
• Organizations can implement recognition systems to obviate the
need to log onto a system manually.
i. Costly
ii. Missing body part problem.
iii. Lack of standardization
iv. While the reliability and the accuracy of biometric
devices continues to improve.
v. Biometric systems must be able to accommodate
changes to the biometric over time which may be
caused by ageing, illness or injury.
vi. The effectiveness of the sample collection process is
strongly influenced by environmental conditions, user
training and usability. For example, lighting, facial
orientations, expression, image resolution and the
wearing of hats can affect the quality of the sample.
Conclusion
Not perfect yet.
Successful applications.
Decreasing costs and increasing convenience.
Increasing both privacy and identity security.
The field of biometrics is evolving.
Benefit from this technology .
References:
• The Biometric Consortium - http://www.biometrics.org/
•National Institute of Standards and Technology - http://www.nist.gov/
•The Biometric Catalog - http://www.biometricscatalog.org/
•ITPro - http://www.computer.org/
•Georgia Institute of Technology - http://www.gatech.edu/
•http://www.biometricgroup.com/abio1/technology/researchtechnology
.htm
•http://www.conspiracyarchive.com/images/biometrics.jpg
• http://www.information-security-
topics.org/information_security_index/V
http://www.bromba.com/faq/fpfaqe.htm
Biometrics(By Aashish Tanania)

More Related Content

PPT
Ear Biometrics
PDF
Fingerprint recognition
PPTX
Applications of Biometrics in Technology
PPTX
Biometrics technology
PPTX
Biometrics
PPTX
IRIS &RETINAL SCANNING PPT
ODP
Biometrics final ppt
PPT
Iris recognition
Ear Biometrics
Fingerprint recognition
Applications of Biometrics in Technology
Biometrics technology
Biometrics
IRIS &RETINAL SCANNING PPT
Biometrics final ppt
Iris recognition

What's hot (20)

PPTX
face recognition
PPTX
Introduction to biometric systems security
PPT
Biometric
PPT
Biometric ppt
PPTX
Biometrics
PPTX
Biometrics
PPTX
Finger vein technology
PPTX
Biometrics
PPT
Biometric's final ppt
PPT
Multimodal Biometric Systems
PPT
Voice recognition
PPT
Retina recognition biometrics drishtysharma
PPT
1.4 Performance Measures.ppt
PPTX
Face Detection
PPT
Ear recognition system
PPTX
Introduction To Biometrics
PPTX
Face Recognition Techniques
PPT
Ridgeology
PPTX
Biometric technology
PPTX
Biometric Systems and Security
face recognition
Introduction to biometric systems security
Biometric
Biometric ppt
Biometrics
Biometrics
Finger vein technology
Biometrics
Biometric's final ppt
Multimodal Biometric Systems
Voice recognition
Retina recognition biometrics drishtysharma
1.4 Performance Measures.ppt
Face Detection
Ear recognition system
Introduction To Biometrics
Face Recognition Techniques
Ridgeology
Biometric technology
Biometric Systems and Security
Ad

Similar to Biometrics(By Aashish Tanania) (20)

PPT
Biometric Security advantages and disadvantages
PPT
Biometric
PPTX
Biometrics and its applications in Medical
PPTX
Biometrics and its applications for system Analysis
PPTX
Biometrics and its applications for system Analysis
PPTX
Biometrics and its applications in Medical
PPTX
Biometrics
PPTX
Biometrics
PPTX
Biometrics
PPTX
Biometric Systems
PPTX
CSE Biometric Security Systems ppt.pptx
PPTX
Biometric Security Systems ppt
PPTX
PPT
Biometics technology
PPTX
Bio-metric Safety engineering in mobile devices
PPTX
INTRODUCTION TO BIOMETRIC.pptx
PPTX
biometrics
PPTX
Biometrics -Mayank.pptx
PDF
B VOC Level-7: Biometric Recognition that aims towards establishing one’s ide...
PPT
Biometrics - Chapter 1 Introduction.pptx
Biometric Security advantages and disadvantages
Biometric
Biometrics and its applications in Medical
Biometrics and its applications for system Analysis
Biometrics and its applications for system Analysis
Biometrics and its applications in Medical
Biometrics
Biometrics
Biometrics
Biometric Systems
CSE Biometric Security Systems ppt.pptx
Biometric Security Systems ppt
Biometics technology
Bio-metric Safety engineering in mobile devices
INTRODUCTION TO BIOMETRIC.pptx
biometrics
Biometrics -Mayank.pptx
B VOC Level-7: Biometric Recognition that aims towards establishing one’s ide...
Biometrics - Chapter 1 Introduction.pptx
Ad

Recently uploaded (20)

PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PDF
Mechanics of materials week 2 rajeshwari
PPTX
Agentic Artificial Intelligence (Agentic AI).pptx
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
MAD Unit - 3 User Interface and Data Management (Diploma IT)
PDF
Micro 4 New.ppt.pdf a servay of cells and microorganism
PPTX
Wireless sensor networks (WSN) SRM unit 2
PPTX
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
PPTX
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
PPTX
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
PPTX
CS6006 - CLOUD COMPUTING - Module - 1.pptx
PDF
Micro 3 New.ppt.pdf tools the laboratory the method
PDF
Principles of operation, construction, theory, advantages and disadvantages, ...
Environmental studies, Moudle 3-Environmental Pollution.pptx
Software-Development-Life-Cycle-SDLC.pptx
Design ,Art Across Digital Realities and eXtended Reality
Mechanics of materials week 2 rajeshwari
Agentic Artificial Intelligence (Agentic AI).pptx
Cryptography and Network Security-Module-I.pdf
MAD Unit - 3 User Interface and Data Management (Diploma IT)
Micro 4 New.ppt.pdf a servay of cells and microorganism
Wireless sensor networks (WSN) SRM unit 2
Module1.pptxrjkeieuekwkwoowkemehehehrjrjrj
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
Environmental studies, Moudle 3-Environmental Pollution.pptx
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
Beginners-Guide-to-Artificial-Intelligence.pdf
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
CS6006 - CLOUD COMPUTING - Module - 1.pptx
Micro 3 New.ppt.pdf tools the laboratory the method
Principles of operation, construction, theory, advantages and disadvantages, ...

Biometrics(By Aashish Tanania)

  • 2. • In the terms of computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified. • A Biometric System is a system for the automated recognition of individuals based on their behavioral and biological characteristics. • Depending on the context, in a biometric system, there are two different ways to resolve a person’s identity i. VERIFICATION ii. IDENTIFICATION
  • 3. Verification:- Comparing a sample against a single stored template is called verification stored Template ? 1 Input Data
  • 4. Identification :- Search a sample against a database of templates. input data database 1
  • 5. Biometrics Process No Yes Biometric Data Collection Transmission Quality Sufficient? Yes Template Match Signal Processing, Feature Extraction, Representation Database Generate Template Decision Confidence? new biometric sample is requested. No
  • 6. Physical biometrics:  Fingerprint—Analyzing fingertip patterns  Facial recognition/face location—Measuring facial characteristics  Hand geometry—Measuring the shape of the hand  Iris scan—Analyzing features of colored ring of the eye.  Retinal scan—Analyzing blood vessels in the eye  Vascular patterns—Analyzing vein patterns  DNA—Analyzing genetic makeup.
  • 7.  Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual.
  • 8. o Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual. o The distance between eyes o Size of mouth o It is sensitive to environmental variables such as dust and lighting and other factors such as facial expression, facial hair, hats and spectacles. o Templates are typically between 80 and 1,000 bytes in size.
  • 9. Face recognition process: Database Input face image Extraction of face image Extraction of face features Positive negative
  • 10.  The colored ring surrounding  The pupil of the eye  Iris patterns are formed in the eighth month of age and, remain stable throughout the life of the individual  The iris can have approximately 270 distinct characteristics including meshwork, striations, rings, freckles.  high-quality black and white image of the iris is taken for processing into a template that is typically around 256 bytes in size.
  • 12.  Retinal scans record the pattern of blood vessels at the back of the eyeball  The biometric sensor projects a light into the eye and requires close proximity and a high degree of user co- operation.  Retinal patterns are affected by medical conditions, for example high blood pressure or eye disease  Retinal scan templates are typically 40 to 100 bytes in size.
  • 13. Behavioral Biometrics: • Speaker/voice recognition—Analyzing vocal behavior • Signature/handwriting—Analyzing signature dynamics • Keystroke/patterning—Measuring the time spacing of typed words
  • 14. 1. It’s a habitual speaking recognition. 2. Voice recognition systems analyze differences such as in pitch, and tone. 3. This biometric is also sensitive to environmental conditions such as background noise. 4 . Template size can vary significantly according to the length of the pass phrase. Construct voice reference template Database
  • 15.  This biometric analyses signature characteristics such as total time, speed, acceleration, character direction, stroke order, stroke count, pressure and contact with the writing surface.  These templates are typically 50 to 300 bytes in size.
  • 17. • Similar to signature verification, this measures the characteristics of an individual’s input of a pass phrase or password. Characteristics may include total time, speed with particular keys and pressure. • Again the template size can vary significantly depending on the length of the password or phrase.
  • 18. 1. Sensing ◦ User’s characteristic must be presented to a sensor ◦ Output is a function of:  Biometric measure  The way it is presented  Technical characteristics of sensor 2. Signal Processing ◦ Feature extraction ◦ Extract the desired biometric pattern  remove noise and signal losses  discard qualities that are not distinctive/repeatable  Determine if feature is of “good quality”
  • 19. 3. Pattern matching ◦ Sample compared to original signal in database ◦ Closely matched patterns have “small distances” between them ◦ Distances will hardly ever be 0 (perfect match) 4. Decisions ◦ Decide if the match is close enough ◦ Trade-off:   false non-matches leads to false matches
  • 21. Something you have: (token: key, card) Something you know: (Password, Pin ) Something you are: (biometric :physiological, behavioral)
  • 23. 1 . Location 2. Security 3. Task( identification, verification) 4 . Number of users 5 . Circumstances(user’s) 6 . Existing data
  • 24. i . Biometrics is a rapidly evolving technology that is being widely used in forensics, such as criminal identification and prison security, and that has the potential to be used in a large range of civilian application areas. i i . Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. i i i . It can be used during transactions conducted by telephone and Internet (electronic commerce and electronic banking). i v . In automobiles, biometrics can replace keys with keyless entry devices.
  • 25. Markets/sectors that are using biometrics: ✓Government—Passports, national identification (ID) cards, voter cards, driver’s licenses, social services, and so on ✓Transportation—Airport security, boarding passes, and commercial driver’s licenses ✓Healthcare—Medical insurance cards, patient/employee identity cards ✓Financial—Bankcards, ATM cards, credit cards, and debit cards ✓Security—Access control and identity verifications, including time and attendance ✓Education—Student/teacher identity verification and access control. Biometrics are now being implemented in large-scale ID systems around the globe.
  • 26. 1. Uniqueness 2. Universality 3. Permanence 4. Measurability 5. User friendliness 6. Accuracy 7. Comfort
  • 27. • Biometrics cannot be lost, stolen or forgotten. Barring disease or serious physical injury, the biometric is consistent and permanent. • It is also secure in that the biometric itself cannot be socially engineered, shared or used by others. • There is no requirement to remember passwords, or PINs, thus eliminating an overhead cost. The biometric is always available to the individual; • Coupled with a smart card, biometrics provide strong security for any credentials on the smart card. • Biometric system provide a high degree of confidence in user identity. • Organizations can implement recognition systems to obviate the need to log onto a system manually.
  • 28. i. Costly ii. Missing body part problem. iii. Lack of standardization iv. While the reliability and the accuracy of biometric devices continues to improve. v. Biometric systems must be able to accommodate changes to the biometric over time which may be caused by ageing, illness or injury. vi. The effectiveness of the sample collection process is strongly influenced by environmental conditions, user training and usability. For example, lighting, facial orientations, expression, image resolution and the wearing of hats can affect the quality of the sample.
  • 29. Conclusion Not perfect yet. Successful applications. Decreasing costs and increasing convenience. Increasing both privacy and identity security. The field of biometrics is evolving. Benefit from this technology .
  • 30. References: • The Biometric Consortium - http://www.biometrics.org/ •National Institute of Standards and Technology - http://www.nist.gov/ •The Biometric Catalog - http://www.biometricscatalog.org/ •ITPro - http://www.computer.org/ •Georgia Institute of Technology - http://www.gatech.edu/ •http://www.biometricgroup.com/abio1/technology/researchtechnology .htm •http://www.conspiracyarchive.com/images/biometrics.jpg • http://www.information-security- topics.org/information_security_index/V http://www.bromba.com/faq/fpfaqe.htm