Biometrics Security System Full Download Seminar Report and Paper Presentation
#6
[attachment=7301]

Presented By:M. S. Wakade

BIOMETRICS SECURITY



introduction

The prevailing techniques of user authentication have some limitations.
Biometric property is an intrinsic property of an individual.
Biometrics can provide the security advantages of long passwords.
Limited number of biometric features (one face, ten fingers, two eyes).


Biometric System Components
MAJOR COMPONANTS :
A mechanism to scan and capture a digital or
analog image .
Software for storing, processing and comparing
the image .
An interface with the applications system that will use the result to confirm an individual’s identity

Biometric System Process
Extraction from biometric image to template.

Fingerprint Authentication
Uniqueness and a Means of Positive Identification.
Print patterns (Made from thirty different types of minutia points ):
~ Loops
~ Arches
~ Whorls


Strikers
Cold finger
Dry/oily finger
High/low humidity
Angle of placement
Pressure of placement
Location of finger on platen
Poorly placed core

The Algorithm



The Algorithm



The first step is location of the iris by a dedicated camera no more than 3 feet from the eye.
After the camera situates the eye, the algorithm narrows in from the right and left of the iris to locate its outer edge.
It simultaneously locates the inner edge of the iris (at the pupil), excluding the lower 90 degrees because of inherent moisture and lighting issues .
The monochrome camera uses both visible and infrared light, the latter of which is located in the 700-900 nm range (this is in the lower range of IR).
The false acceptance rate for the iris recognition system is 1 in 1.2 million and the false rejection rate is 0%

Voice authentication
Speech production organs:
Laryngeal pharynx
Oral pharynx
Oral cavity
Nasal pharynx
Nasal cavity

Critical conditions
Who permanently lose their voices
Who have done surgery
Factors like
Aging
Medical conditions
Emotional state
Hence not use in large scale


application
ATM machine use
Workstation and network access
Travels and tourism
Internet transactions
Telephone transactions.
Public identity cards.

conclusion
Biometrics can be used for accurate identification
Initial cost is high
Biometrics are easier to use
Biometrics can’t be forgotten or left at home
Biometrics don’t have to be changed periodically like passwords.

















Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: dowry system ppt presentation download, seminar of biometrics system, what is biometrics fingerprint biometrics, topic in biometrics in signature, biometrics verification, paper presentation network security, seminar on nonconvection refrigerater system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Biometrics Security System Full Download Seminar Report and Paper Presentation - by projectsofme - 26-11-2010, 11:39 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,061 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 43,967 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,835 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,992 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,708 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,092 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,241 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,512 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,648 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,426 16-09-2015, 02:51 PM
Last Post: seminar report asees

Forum Jump: