Biometrics Security System Full Download Seminar Report and Paper Presentation
#16
[b]SECURITY SYSTEM USING BIOMETRICS

BY
SIDDHARTH SAHU
B. E. 4TH YR., I. T.

[attachment=13975]

What is Biometrics?[/b]
The term is derived from the Greek words bio (= life) and metric (= to measure).
Measure individual's unique physical or behavioral characteristics to recognize or authenticate their identity.

Biometric Classification
Physiological - related to the shape of the body. Examples include face recognition, hand or palm geometry, iris scan, etc.
Behavioral - related to the behavior of the person. Examples include keystroke dynamics, mouse dynamics, signature recognition, etc.

Working Principle
Verification & Identification
Verification - Authenticates its users in conjunction with a smart card, username or ID number. It is referred to as 1:1 matching.
Identification - Authenticates its users from the biometric characteristic alone without the use of smart cards, usernames or ID numbers. It is referred to as 1:N matching.
Biometric Technologies
Facial Recognition
Fingerprint Recognition
Hand Geometry
Iris Recognition
Retina Recognition
Signature Recognition
Speaker Recognition
Facial Recognition
Analyses facial characteristics.
Requires camera like CCTV or surveillance to develop a facial image of the person for authentication.
Used for surveillance purposes to locate wanted criminals, suspected terrorists or other individuals.

Fingerprint Recognition
Analyses the patterns on fingertip called Fingerprint.
Used in forensic divisions worldwide for criminal investigations.
Fingerprint comprised of Ridges, Valley, delta, core, Bifurcation, etc.


Hand Geometry
Analyses and Measure the shape of hand.
Finger length, width, thickness, curvatures and their relative location are scanned.
Scanners consist of charge coupled camera & infrared LEDs with mirrors and reflectors.
Iris Recognition
Analyses the colored ring surrounding the pupil of the eye.
Iris have approx. 266 distinctive characteristics.
Recognition system describes iris pattern by IrisCodes.
To perform the recognition, two IrisCodes are compared.
Retina Recognition
Analyses the patterns of blood vessels in retina of the eye.
Retina can be affected by some diseases like Glaucoma, Diabetes, etc.
Image capturing of retina is much difficult than other technologies.
Signature Recognition
Analyses the way user signs his name.
Signing features such as speed, velocity, stroke count, pressure, etc are analyzed.
Verification classified forgery images as Random, Simple and Skilled.
Speaker Recognition
Analyses the voice of user & convert it into text.
Divided into Text-dependent & Text-independent.

Performance of Biometrics
False Match Rate (FMR) - measures the percent of invalid matches.
False Non-match Rate (FNMR) - measures the percent of valid inputs being rejected.
Failure To Enroll Rate (FTER) - measures the probability that a person will be unable to enroll.



Limitations
Biometric Data can be used in unauthorized ways without the individual's consent.
Danger to the owner of secured items which is secured with biometric device.
Genuine owner lose his/her identity if his /her biometric data is compromised from database by unauthorized user.


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: biometrics download full report and abstract, biometrics devices, biometrics applications, seminar report on nanoelectromechanical system, biometrics documentation for tecvhnical seminar, system security download, seminar topic biometrics,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Biometrics Security System Full Download Seminar Report and Paper Presentation - by seminar-database - 28-05-2011, 08:55 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,061 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 43,967 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,835 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,992 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,708 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,092 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,241 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,512 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,649 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,426 16-09-2015, 02:51 PM
Last Post: seminar report asees

Forum Jump: