Biometrics (Download Full Report And Abstract)
#33
[attachment=12570]
Biometrics
Introduction

Biometrics is automated methods of recognizing a person based on a physiological or behavioural characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent.
Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies.
Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy. Utilized alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily lives. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs). This is because biometrics links the event to a particular individual (a password or token may be used by someone other than the authorized user), is convenient (nothing to carry or remember), accurate (it provides for positive authentication), can provide an audit trail and is becoming socially acceptable and cost effective.
There are two kinds of Biometric System
 Recognition Systems
 Identifying a person among the whole group of users enrolled in the system.
 It must be an online system.
 Typical applications : Forensics
 Authentication Systems
 Verifying the identity that user claims to have.
 It can be offline.
 Typical applications: Access Control, all kinds of applications where cards are used.
Benefits of Biometrics
 It links an event to a particular individual - not just to a password or Token.
 Convenient – nothing to remember.
 Can’t be guessed, stolen, shared, lost or forgotten.
 Protects against unauthorized access to personal information.
 Protects against identity thefts.
Biometric Technologies
I. Speech Verification
 Compares live speech with previously created speech model of person’s voice.
 Measures pitch, cadence & tone to create voice point.
 Uniqueness based on local track differences.
 Length, shape of mouth, nasal cavities, etc.
 Can be text dependent or independent.
 Behavioral & physiological biometric.
Features
 Can use standard microphone or telephone set or existing audio channels
 Can be combined with challenge/response techniques
Limitations
 Can be affected by illness & stress
 Background noise can interfere
II. Fingerprints
 A fingerprint is made of a series of pattern on the surface of the finger.
 Applications
• Access Control systems- door locks, time & attendance systems, office buildings.
• Mobile phones, Laptops, personal computers, law enforcements.
Features
 Long time use
 High Accuracy
 General ease & speed of use
Limitations
 Small % of population have poor print due to injury, disease or occupation.
III. Facial Recognition
 Analyzes characteristics of a person's face image input through a camera.
 Measures geometry of face & relative distances between features (e.g. Nose & mouth).
 Used in averting terrorist crimes, law enforcements, banks.
Features
 Can be used with previously compiled photo database
 Can be fused with skin Biometrics to enhance accuracy
Limitations
• Can be affected by lighting
• Age progression
• Sometimes affected by eye glasses, facial hair or expression.
IV. Iris Recognition
 Measures features associated with random texture of the colored part of the eye.
 Measures 266 unique features.
 Popular for facility access & transportation/ border security.
Features
 Highly accurate
 Very stable over lifetime
 Works through Glasses & Contacts
Limitations
• Can be affected by eye diseases
• Difficult to perform at large distances (more than few meters)
• Obscured by eyelashes
V. Hand Geometry
 Measures dimensions Of hand, including shape & length of the fingers.
 Used extensively for physical access control, nuclear power plants, Airports, employee time keeping.
Features
 Easy to use & fast
 High public acceptence
 Proven over many years of use
Limitations
• Expensive device
• Hand Injuries
• Not properly accurate
VI. DNA
 Deoxyribonucleic acid is hereditary matrial in humans & almost all other organisms
 Used in criminal forensic invstigation
Features
 High accuracy (1 person in 6 billion accuracy)
 Never changes
Limitations
• Requires collection of DNA samples
• Not intantaneous – takes nearly 12 hours to give result
• Affected by changes in typing patterns
• Indentical twins share same DNA
The Future of Biometrics in India
 Smaller, cheaper, faster & more accurate.
 Government is sponsoring widespread plans.
 Biometric ATMs to expand in India.
 Introduction of Biometric voting machines.
 Combination of Biometrics with other authentication mechanisms.
 Public’s awareness & acceptance is growing.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: biometric atm seminar reportreport downlod report, report of bogus voter identification use biometric, absract for report on biometric,
Popular Searches: biometrics abstract, biometrics paperpresentation abstract files download**nciple of a hydraulic jcb pdf, incorporating, missouri dept, extractions, vsat cheetah, mn dept of,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Biometrics (Download Full Report And Abstract) - by seminar class - 21-04-2011, 03:22 PM
RE: Biometrics (Download Full Report And Abstract) - by Guest - 29-01-2013, 10:07 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,974 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,840 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 26,000 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,713 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,100 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,275 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,518 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,655 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,433 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 26,387 08-06-2015, 03:26 PM
Last Post: seminar report asees

Forum Jump: