Biometrics (Download Full Report And Abstract)
#35
[attachment=12804]
BIOMETRICS
Definition:
“ Biometrics is the identificationor verificationof human identity through the measurement of repeatable physiological and behavioral characteristics”
Biometrics as Authentication
Authentication depends on

What you have
What you know
What you ARE !
Why Biometrics ?
Identity thefts
Something you know can be stolen
Predicted or hacked
Reliability on manual verification
Categories of BIOMETRICS:
Biometrics can be sorted into two classes:
Physiological
Behavioral
1.Examples-face,fingerprints,hand geometry and iris Recognition,dna.
2.Examples-signature and voice.
3.Biometrics can be sorted into two classes:
Basic characteristics of BIOMETRIC Technologies
Universality:
Every person should have the characteristic. People who are mute or without a fingerprint will need to be accommodated in some way.
Uniqueness:
Generally, no two people have identical characteristics. However, identical twins are hard to distinguish.
Permanence:
The characteristics should not vary with time. A person's face, for example, may change with age.
Collectibility:
The characteristics must be easily collectible and measurable.
Performance:
The method must deliver accurate results under varied environmental circumstances.
Acceptability:
The general public must accept the sample collection routines. Nonintrusive methods are more acceptable.
Circumvention:
The technology should be difficult to deceive
The metrics of Biometrics
FTE – Failure To Enroll
FTA – Failure To Accept
FAR – False Acceptance Rates
FRR – False Reject Rates
BIOMETRICS
Working principle:

Biometric devices consist of a reader or scanning device software that converts the gathered information into digital form, and a database that stores the biometric data with comparison with existing records.
Enrollment Mode.
Verification Mode.
Modes:
Enrollment Mode:
A sample of the biometric trait is captured, processed by a computer, and stored for later comparison.
Verification Mode:
In this mode biometric system authenticates a person’s claimed identity from their previously enrolled pattern.
Biometric Modalities:
Fingerprint Recognition:
For fingerprint Recognition look at:
Friction ridges.
Core
Crossover.
Delta.
Island
Ridge Ending.
Pore.
LOOP, ARCH AND WHORL
Minutiae
Uses ridge endings ,bifurcations on a person’s finger to plot points know as Minutiae.
The number and locations of the minutiae vary from finger to finger in any particular person, and from person to person for any particular finger.
Fingerprint Verification
Face Recognition:
It involves recognizing
people by there:
Facial features.
Face geometry.
Principle:
Analysis of unique shape, pattern and positioning of facial features.
Issues
Identification across expression
FRR or FAR fluctuate
Easily spoofed
Tougher usability
High Environmental impact
Facial RecognitionTongueCA–Training Set
Facial Recognition: PCATraining
Find average of training images.
Subtract average face from each
image.
Create covariance matrix
Generate eigenfaces
Each original image can be expressed
as a linear combination of the
eigenfaces – face space.
Voice Recognition:
Voice recognition is not the same as speech recognition, it is speaker recognition.
Considered both physiological and behavioral.
Popular and low-cost, but less accurate and sometimes lengthy enrollment.
Styles of spoken input:
These system have three styles of spoken inputs :
Text Dependent.
Text prompted.
Text Independent.
Framework for Authentication/Interaction
Speaker Recognition
Definition:

It is the method of recognizing a person based on his voice
It is one of the forms of biometric identification
Depends of speaker specific characteristics.
Speaker Recognition
Iris Recognition:

Iris:
It is the coloured area of the eye that surrounds the pupil.
It is a protected internal organ whose random texture is stable throughout life.
The iris patterns are obtained through a video-based image acquisition system .
Iris Images:
Retinal Scanning
Scans retina into database
User looks straight into retinal reader
Scan using low intensity light
Very efficient – cant be spoofed!
Disadvantages Retinal Scanning
User has to look “directly”
FTE ratio high in this biometric
Acceptability concerns
Light exposure
Hygiene
Iris Scanner
Scans unique pattern of iris
Iris is colored and visible from far
No touch required
Overcomes retinal scanner issues
Contact lenses an issue?
Signature Verification:
Static/Off-line:the conventional way.
Dynamic/On-line:using electronically instrumented device.
Principle:
The movement of the pen during the signing process rather than the static image of the signature.Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes.
Biometric devices:
Personal fingerprint safes:
These safes are revolutionary locking systems storage cases that open with just the touch of your finger.
Advantages of Biometrics:
Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly.
Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords) .
Automated biometric identification can be done very rapidly and uniformly, with a minimum of training .
Your identity can be verified without resort to documents that may be stolen, lost or altered.
Disadvantages of BIOMETRICS:
The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.
It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time
For people affected with diabetes, the eyes get affected resulting in differences.
Biometrics is an expensive security solution.
BIOMETRICS SECURITY:
Security personnel look for biometric data that does not change over the course of your life; that is, they look for physical characteristics that stay constant and that are difficult to fake or change on purpose.
Current applications
Banks
Immigration facilities across USA
ID widget – interesting research
Eyegaze at Stanford
Conclusion
Smart spaces and pervasive computing are moving from concepts to implementations
Security has to be incorporated in the design stage
Traditional authentication and access control paradigms cannot scale to numerous and ubiquitous devices
Biometrics serves as a reliable alternative for minimally intrusive authentication
Biometrics solves key management and repudiation problem
Securing biometrics is a major challenge in an open environment
Biometric hashing can be used to create revocable biometric templates
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: report of bogus voter identification use biometric, biometric atm seminar reportreport downlod report, absract for report on biometric,
Popular Searches: paulding county, karma sangsthan download, download reportbuilder3 msi, download vorbis, download babylon 5, biometrics devices, vcl download,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Biometrics (Download Full Report And Abstract) - by seminar class - 26-04-2011, 11:31 AM
RE: Biometrics (Download Full Report And Abstract) - by Guest - 29-01-2013, 10:07 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,974 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,840 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 26,000 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,713 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,100 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,279 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,518 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,655 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,433 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 26,387 08-06-2015, 03:26 PM
Last Post: seminar report asees

Forum Jump: