Biometrics (Download Full Report And Abstract)
#21
Presented by:
G.PPANEETHA
A.SRUJANA
Y.KANTHI SRI

[attachment=9937]
ABSTRACT:
The information age is quickly revolutionizing the way transactions are completed which has led to the invention of many security items. Every day actions are increasingly being handled electronically, this growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Traditional means of security using personal identification numbers (PIN) through passwords or security-access cards (smart cards) has a major drawbacks as they recognize the PIN but not the person who has provided it.
Biometrics can use physical characteristics, like your face, fingerprints, irises or veins, or behavioral characteristics like your voice, handwriting or typing rhythm. Unlike keys and passwords, your personal traits are extremely difficult to lose or forget. They can also be very difficult to copy. For this reason, many people consider them to be safer and more secure than keys or passwords.
Biometric devices consist of a reader or
scanning device software that converts the scanned information into digital form, and, wherever the data is to be analyzed, a database that stores the biometric data for comparison with entered biometric data.
Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometrics is seen by many as a solution to a lot of the user identification and security problems in today’s networks. There are number of applications of biometrics. widely used in forensics such as criminal identification, prison security and in a large number of civilian applications. Biometrics can also help in the prevention of unauthorized access to ATMs ,cellular phones, smart cards, desktop PCs, workstations, and computer networks and it can be used during transactions conducted via telephone and Internet (electronic commerce and electronic banking) to minimize risks Biometric authentication offers a highly secure , reliable and efficient solution.
So where security is highly required implementation of biometrics security is a very good solution as there is a fear of stealing /forgetting password.
1..Introduction:
Biometrics is the science and technology of authentication (i.e. establishing the identity of an individual) by measuring the person's physiological / behavioral features. The term is derived from the Greek words "bios" for life and "metron" for degree. Biometrics ensures that the individual trying to
log on is actually the authorized person and not just someone who maliciously found a card or cracked a password.
This technology gathers unique physiological and behavioral attributes of a person for storing in a database or comparing it with one already present. In the development of biometric identification systems, physical and behavioral features for recognition are required which must possess:
 •Uniqueness: that is, an identical trait shouldn't appear in two people:
 •Universality: occur in as many people as possible
 •Permanence: don't change over time
 •Measurability: measurable with simple technical instruments
 •User-friendliness: easy and comfortable to measure:
Thus, 2 categories of biometrics are present:
1) Physiological, called static biometrics: Biometrics based on data derived from the measurement of a part of person's anatomy. E.g.: fingerprints, iris patterns, facial features, hand geometry, retinal blood vessels.
2) Behavioral: Biometrics based on data derived from measurement of an action performed by a person and distinctly, incorporating time as a metric, i.e. the measured action. Eg:voice(speaker verification).
Biometric systems seems to be complicated, but they all use the same three steps:
• Enrollment: The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait.
• Storage: Contrary to what you may see in movies, most systems don't store the complete image or recording.
• Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be.
Systems also use the same three components:
1) A sensor that detects the characteristics being used for identification
2) A computer that reads and stores the information
3) A Software that analyzes the characteristics, translates it into a graph or code and performs the actual comparisons
2.History:
Initially British scientist Sir Francis Galton proposed the use of fingerprints for identification purposes in the late 19th century. Later, British police official Sir Richard Edward Henry introduced fingerprinting in the 1890s as a means of identifying criminals. Automatic finger print based identification systems have been commercially available since the early 1960s. Until the 1990s these systems were used primarily by the police and in certain security applications Personal Identification Numbers (PIN) were one of the first methods used for identification.
3.THE POPULAR BIOMETRICS TECHNOLOGIES
1. Finger print recognition.
2. Face recognition.
3. Hand geometry.
4. Voice recognition.
5. Iris recognition.
6. Signature recognition.
3.1.FINGER-PRINT RECOGNITION:
Among all the biometric techniques, fingerprint-based identification is the oldest method which has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minute points. Minute points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: report of bogus voter identification use biometric, absract for report on biometric, biometric atm seminar reportreport downlod report,
Popular Searches: abstract for biometrics based authentication, ppt free download on biometrics, who is acer scarlett, fulton county, use of biometrics, who is fakesky on full, biometrics fingerprint devices,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Biometrics (Download Full Report And Abstract) - by seminar class - 10-03-2011, 12:33 PM
RE: Biometrics (Download Full Report And Abstract) - by Guest - 29-01-2013, 10:07 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,974 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,840 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 26,000 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,713 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,100 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,265 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,518 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,655 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,433 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 26,387 08-06-2015, 03:26 PM
Last Post: seminar report asees

Forum Jump: