Biometrics (Download Full Report And Abstract)
#28

Presented by:
Vartika Paul

[attachment=10730]
BIOMETRICS
What is Biometrics?
Definition

"Biometrics is the automated identification, or verification of human identity through the measurement of repeatable physiological, or behavioral characteristics”
Identification:
The search of a biometric sample against a database of other samples in order to ascertain whether the donor is already contained in, or new to the database.
Verification:
It refers to the 'one to one' comparison between a sample and another to ask the question, 'are you who you say you are.'
The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). For our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral characteristics, such as fingerprints, irises, voice patterns, facial patterns, and hand measurements, for identification and verification purposes.
Identification and verification have long been accomplished by showing something you have, such as a license or a passport. Sometimes it also required something you know, such as a password or a PIN. As we move into a time when we need more secure and accurate measures, we begin to look at using something you are: biometrics.
Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.
History of BIOMETRICS:
Chinese Precursor:

Possibly the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century, as reported by explorer Joao de Barros. He wrote that the Chinese merchants were stamping children's palm prints and footprints on paper with ink to distinguish the young children from one another. This is one of the earliest known cases of biometrics in use and is still being used today.
European Origins:
Until the late 1800s, identification largely relied upon "photographic memory." In the 1890s, an anthropologist and police desk clerk in Paris named Alphonse Bertillon sought to fix the problem of identifying convicted criminals and turned biometrics into a distinct field of study. He developed a method of multiple body measurements which got named after him (Bertillonage). His system was used by police authorities throughout the world, until it quickly faded when it was discovered that some people shared the same measurements and based on the measurements alone, two people could get treated as one. After the failure of Bertillonage, the police started using finger printing, which was developed by Richard Edward Henry of Scotland Yard, essentially reverting to the same methods used by the Chinese for years.
Modern Times:
In the past three decades biometrics has moved from a single method (fingerprinting) to more than ten discreet methods. Companies involved with new methods number in the hundreds and continue to improve their methods as the technology available to them advances. Prices for the harware required continue to fall making systems more feasible for low and mid-level budgets. As the industry grows however, so does the public concern over privacy issues. Laws and regulations continue to be drafted and standards are beginning to be developed. While no other biometric has yet reached the breadth of use of fingerprinting, some are beginning to be used in both legal and business areas.
WORKING PRINCIPLE OF BIOMETRICS
Biometric devices consist of a reader or s
canning device, software that converts the gathered information into digital form, and a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database.
All Biometric authentications require comparing a registered or enrolled biometric sample (biometric template or identifier) against a newly captured biometric sample (for example, a fingerprint captured during a login).
Enrollment Mode:
A sample of the biometric trait is captured, processed by a computer, and stored for later comparison. Biometric recognition can be used in Identification mode, where the biometric system identifies a person from the entire enrolled population by searching a database for a match based solely on the biometric. For example, an entire database can be searched to verify a person has not applied for entitlement benefits under two different names. This is sometimes called “one-to-many” matching.
Verification Mode:
In this mode biometric system authenticates a person’s claimed identity from their previously enrolled pattern. This is also called “one-to-one” matching. In most computer access or network access environments, verification mode would be used. A user enters an account, user name, or
inserts a token such as a smart card, but instead of entering a password, a simple glance at a camera is enough to authenticate the user.
TYPES OF BIOMETRICS:
There are two types of biometrics: behavioral and physical.
Behavioral biometrics - Used for verification .
Physical biometrics - Used for either identification or verification.
Physical biometrics :
 Fingerprint - Analyzing fingertip patterns.
 Facial Recognition - Measuring facial characteristics.
 Hand Geometry - Measuring the shape of the hand.
 Iris recognition - Analyzing features of colored ring of the eye.
 Vascular Patterns - Analyzing vein patterns.
 Retinal Scan - Analyzing blood vessels in the eye.
 Bertillonage - Measuring body lengths (no longer used).
Behavioral biometrics:
 Speaker Recognition - Analyzing vocal behavior.
 Signature- Analyzing signature dynamics.
 Keystroke - Measuring the time spacing of typed words.
CHARACTERISTICS OF BIOMETRICS:
Biometric characteristics can be divided in two main classes, as represented in figure on the right:
• Physiological are related to the shape of the body. The oldest traits, that have been used for more than 100 years, are fingerprints. Other examples are face recognition, hand geometry and iris recognition.
• Behavioral are related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voice.
FUTURE OUTLOOK:
According to most experts, the future of biometrics is dependant upon two critical areas: standardization and the use of hybrid technologies.
Standardization:
Currently, the biometrics industry is very fragmented, with more than 150 companies with their own proprietary systems and methodologies. Standards have only recently been established in order to provide direction for the development of a common interface that will allow for shared biometric templates. The BioAPI standard created by the BioAPI Consortium, a group of more than 60 vendors and government agencies, defines a common structure for interfacing with biometrics. Yet, competitive forces remain as technology giants like Microsoft have abandoned the consortium and the BioAPI standard in order to develop their own proprietary software standards. The development and acceptance of a primary standard is critical for the growth and applicability of the biometrics industry. Only after the technological standard is more established can systems integrate and interact efficiently.
Hybrid Technologies:
One of the critical concerns with the use of biometric technologies is that of privacy and security of stored personal biometric data. To have personal data stored in a centralized database leaves the information potentially open to theft or compromise. The concept of combining smart card or public key infrastructures with biometric readers where the biometric template is stored on an individually controlled key has been suggested as a solution for the privacy concern and is considered by some critical to the advancement of biometric applications.
Biometrics is a powerful combination of science and technology that can be used to protect and secure our most valuable information and property. The future holds no limits for this industry as more applications are found. Further, the technology itself continues to improve in terms of application and accuracy. From the application of total body scanning for highest security areas to speed and accuracy of identification when shopping on-line, the applications are boundless.
Imagine a world where interstate air travel is allowed automatically via a full body scan that not only verifies identity but simultaneously searches for insecure or illegal paraphernalia. Where access to one is bank or credit accounts is only granted after identification via iris or retina scan. Where a shopping trip is made possible by a vehicle that operates only with biometric verification of ownership and payment is made via a fingerprint scan that links directly to one is credit account.
In the future, we will live in a faster paced, more secure world where verification of one is identity is critical for daily activities. While some might argue that privacy and personal "freedom" are sacrificed with this level of control, most believe that it is the necessary price for a secure world environment.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: absract for report on biometric, biometric atm seminar reportreport downlod report, report of bogus voter identification use biometric,
Popular Searches: bioapi 20, mn dept of, sahara, www biometrics in secre etransaction com, download full report and abstract, biometrics paper presentation download, impact of the lips for biometrics computer science,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Biometrics (Download Full Report And Abstract) - by seminar class - 22-03-2011, 12:19 PM
RE: Biometrics (Download Full Report And Abstract) - by Guest - 29-01-2013, 10:07 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,924 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,814 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,972 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,687 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,065 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,164 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,491 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,626 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,375 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 26,376 08-06-2015, 03:26 PM
Last Post: seminar report asees

Forum Jump: