Biometrics Security System Full Download Seminar Report and Paper Presentation
#12
Submitted By
G.V. Ramesh
A.Kamalakkannan

[attachment=10315]
Biometrics
The word biometric can be defined as "life - measure." It is used in security and access control applications to mean measurable physical characteristics of a person that can be checked on an automated basis.
Although you may not think about it, your driver's license contains biometric information about you. Your height, weight, hair color and eye color are all physical characteristics that can easily be checked. However, your height changes with age (16 year old drivers get taller, senior citizens get shorter). Your hair color changes naturally (and on purpose). You can wear colored contact lenses that change your eye color; everyone's weight fluctuates over time.
Biometric data that does not change
Security personnel look for biometric data that does not change over the course of your life; that is, they look for physical characteristics that stay constant and that are difficult to fake or change on purpose.
Most of us can remember when biometric security checks were the stuff of science fiction or action movies like James Bond. However, biometric identification is becoming commonplace as hardware and software come down in price.
Characteristics of successful biometric identification methods
The following factors are needed to have a successful biometric identification method:
• The physical characteristic should not change over the course of the person's lifetime
• The physical characteristic must identify the individual person uniquely
• The physical characteristic needs to be easily scanned or read in the field, preferably with inexpensive equipment, with an immediate result
• The data must be easily checked against the actual person in a simple, automated way.
Other characteristics that may be helpful in creating a successful biometric identification scheme are:
• Ease of use by individuals and system operators
• The willing (or knowing) participation of the subject is not required
• Uses legacy data (such as face recognition or voice analysis).
Biometric identification systems
Biometric identification systems can be grouped based on the main physical characteristic that lends itself to biometric identification:
Fingerprint identification
Fingerprint ridges are formed in the womb; you have fingerprints by the fourth month of fetal development. Once formed, fingerprint ridges are like a picture on the surface of a balloon. As the person ages, the fingers get do get larger. However, the relationship between the ridges stays the same, just like the picture on a balloon is still recognizable as the balloon is inflated.
Hand geometry
Hand geometry is the measurement and comparison of the different physical characteristics of the hand. Although hand geometry does not have the same degree of permanence or individuality as some other characteristics, it is still a popular means of biometric authentication.
• Palm Vein Authentication
This system uses an infrared beam to penetrate the users hand as it is waved over the system; the veins within the palm of the user are returned as black lines. Palm vein authentication has a high level of authentication accuracy due to the complexity of vein patterns of the palm. Because the palm vein patterns are internal to the body, this would be a difficult system to counterfeit. Also, the system is contactless and therefore hygienic for use in public areas.
• Retina scan
A retina scan provides an analysis of the capillary blood vessels located in the back of the eye; the pattern remains the same throughout life. A scan uses a low-intensity light to take an image of the pattern formed by the blood vessels. Retina scans were first suggested in the 1930's.
• Iris scan
An iris scan provides an analysis of the rings, furrows and freckles in the colored ring that surrounds the pupil of the eye. More than 200 points are used for comparison. Iris scans were proposed in 1936, but it was not until the early 1990's that algorithms for iris recognition were created (and patented). All current iris recognition systems use these basic patents, held by Iridian Technologies.
• Face recognition
Facial characteristics (the size and shape of facial characteristics, and their relationship to each other). Although this method is the one that human beings have always used with each other, it is not easy to automate it. Typically, this method uses relative distances between common landmarks on the face to generate a unique "faceprint."
• Signature
Although the way you sign your name does change over time, and can be consciously changed to some extent, it provides a basic means of identification.
• Voice analysis
The analysis of the pitch, tone, cadence and frequency of a person's voice.
Biometric technology on the leading edge
Some leading edge applications:
• Fingerprint scanners (and the necessary software to store and compare fingerprints) have already been installed in laptop computers and PDAs like the iPaq.
• Sensors installed in automobiles can identify the driver, and adjust mirrors, seat positions and climate controls.
• Special readers can measure various elements of hand geometry, comparing the result with data on file for each person (See Biometric Hand Reader for an example.)
• Surveillance cameras can search crowds for missing persons or criminal suspects.
• Face recognition software can be modified to recognize gestures, leading to improved assistive technologies for quadriplegic patients.
Biometric security and business ethics
A variety of ethical concerns with biometric identification methods have been registered by users:
• Some biometric identification methods are relatively intrusive (like retina scans)
• The gathering of biometric information like fingerprints is associated with criminal behavior in the minds of many people
• Traditionally, detailed biometric information has been gathered by large institutions, like the military or police; people may feel a loss of privacy or personal dignity
• People feel embarrassed when rejected by a public sensor
• Automated face recognition in public places could be used to track everyone's movements without their knowledge or consent.
There are also many questions about how this data will be stored and used:
• How will masses of biometric data be stored? These are not fingerprint cards stored in a secured building; this is easily moved and duplicated electronic information. How will this information be safeguarded?
• Who will have access to this information? Will companies be allowed access to face biometrics, letting them use security cameras to positively identify customers on a routine basis? How would you feel about walking into a store you've never been in before, only to be greeted by name by a sales associate who has just read a summary of all of your recent purchases?
Biometric authentication: what method works best?
There does not appear to be any one method of biometric data gathering and reading that does the "best" job of ensuring secure authentication. Each of the different methods of biometric identification have something to recommend them. Some are less invasive, some can be done without the knowledge of the subject, some are very difficult to fake.
Face recognition
Of the various biometric identification methods, face recognition is one of the most flexible, working even when the subject is unaware of being scanned. It also shows promise as a way to search through masses of people who spent only seconds in front of a "scanner" - that is, an ordinary digital camera.
Face recognition systems work by systematically analyzing specific features that are common to everyone's face - the distance between the eyes, width of the nose, position of cheekbones, jaw line, chin and so forth. These numerical quantities are then combined in a single code that uniquely identifies each person.
Fingerprint identification
Fingerprints remain constant throughout life. In over 140 years of fingerprint comparison worldwide, no two fingerprints have ever been found to be alike, not even those of identical twins. Good fingerprint scanners have been installed in PDAs like the iPaq Pocket PC; so scanner technology is also easy. Might not work in industrial applications since it requires clean hands.
Fingerprint identification involves comparing the pattern of ridges and furrows on the fingertips, as well as the minutiae points (ridge characteristics that occur when a ridge splits into two, or ends) of a specimen print with a database of prints on file.
Hand geometry biometrics
Hand geometry readers work in harsh environments, do not require clean conditions, and forms a very small dataset. It is not regarded as an intrusive kind of test. It is often the authentication method of choice in industrial environments.
Retina scan
There is no known way to replicate a retina. As far as anyone knows, the pattern of the blood vessels at the back of the eye is unique and stays the same for a lifetime. However, it requires about 15 seconds of careful concentration to take a good scan. Retina scan remains a standard in military and government installations.
Iris scan
Like a retina scan, an iris scan also provides unique biometric data that is very difficult to duplicate and remains the same for a lifetime. The scan is similarly difficult to make (may be difficult for children or the infirm). However, there are ways of encoding the iris scan biometric data in a way that it can be carried around securely in a "barcode" format. (See the SF in the News article Biometric Identification Finally Gets Started for some detailed information about how to perform an iris scan.)
Signature
A signature is another example of biometric data that is easy to gather and is not physically intrusive. Digitized signatures are sometimes used, but usually have insufficient resolution to ensure authentication.
Voice analysis
Like face recognition, voice biometrics provide a way to authenticate identity without the subject's knowledge. It is easier to fake (using a tape recording); it is not possible to fool an analyst by imitating another person's voice.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: eforce chandigarh, paper presentation on introduction of biomechatronics system, seminar ppt on iris biometrics, biometrics voting system, biometrics seminar topic in ppt format, biometrics glossary, security system grants,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Biometrics Security System Full Download Seminar Report and Paper Presentation - by seminar class - 16-03-2011, 02:46 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,061 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 43,967 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,835 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,992 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,708 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,092 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,241 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,512 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,648 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,426 16-09-2015, 02:51 PM
Last Post: seminar report asees

Forum Jump: