26-11-2010, 11:39 AM
[attachment=7301]
Presented By:M. S. Wakade
BIOMETRICS SECURITY
introduction
The prevailing techniques of user authentication have some limitations.
Biometric property is an intrinsic property of an individual.
Biometrics can provide the security advantages of long passwords.
Limited number of biometric features (one face, ten fingers, two eyes).
Biometric System Components
MAJOR COMPONANTS :
A mechanism to scan and capture a digital or
analog image .
Software for storing, processing and comparing
the image .
An interface with the applications system that will use the result to confirm an individual’s identity
Biometric System Process
Extraction from biometric image to template.
Fingerprint Authentication
Uniqueness and a Means of Positive Identification.
Print patterns (Made from thirty different types of minutia points ):
~ Loops
~ Arches
~ Whorls
Strikers
Cold finger
Dry/oily finger
High/low humidity
Angle of placement
Pressure of placement
Location of finger on platen
Poorly placed core
The Algorithm
The Algorithm
The first step is location of the iris by a dedicated camera no more than 3 feet from the eye.
After the camera situates the eye, the algorithm narrows in from the right and left of the iris to locate its outer edge.
It simultaneously locates the inner edge of the iris (at the pupil), excluding the lower 90 degrees because of inherent moisture and lighting issues .
The monochrome camera uses both visible and infrared light, the latter of which is located in the 700-900 nm range (this is in the lower range of IR).
The false acceptance rate for the iris recognition system is 1 in 1.2 million and the false rejection rate is 0%
Voice authentication
Speech production organs:
Laryngeal pharynx
Oral pharynx
Oral cavity
Nasal pharynx
Nasal cavity
Critical conditions
Who permanently lose their voices
Who have done surgery
Factors like
Aging
Medical conditions
Emotional state
Hence not use in large scale
application
ATM machine use
Workstation and network access
Travels and tourism
Internet transactions
Telephone transactions.
Public identity cards.
conclusion
Biometrics can be used for accurate identification
Initial cost is high
Biometrics are easier to use
Biometrics can’t be forgotten or left at home
Biometrics don’t have to be changed periodically like passwords.