Biometrics Security System Full Download Seminar Report and Paper Presentation
#18
Submitted By:
Purushottam kumar

[attachment=14057]
Introduction
Biometrics is a means of using parts of the human body as a kind of perma¬nent password. Just like our fingerprints are unlike those of any other person, your eyes, ears, hands, voice, and face are also unique. Technology has advanced to the point where computer systems can record and recognize the patterns, hand shapes, ear lobe contours, and a host of other physical characteristics. Using bio¬metrics, devices can be enabled with the ability to in¬stantly verify identity and deny ac¬cess to everybody else.
Using biometrics for identifying and au¬thenticating human beings offers unique advantages over traditional methods. To¬kens, such as smart cards, magnetic stripe cards, and physical keys can be lost, sto¬len, or duplicated. Passwords can be for¬gotten, shared, or unintentionally observed by someone. Forgotten passwords and lost smart cards are a problem for users. In biometrics the concerned person himself is the password, as bio¬metrics authentication is based on the identification of an intrinsic part of a hu¬man being.
The biometrics technique can be inte¬grated into applications that require secu¬rity, access control, and identification or verification of users. Biometrically secured resources effectively eliminate risks, while at the same time offering a high level of security and convenience to both the us¬ers and the administrators.
Biometric systems automatically verify or recognize the identity of a living per¬son based on physiological or behavioral characteristics. Physiological characteristics pertain to visible parts of the human body. These include fingerprint, retina, palm geometry, iris, facial structure, etc. Behavioral characteristics are based on what a person does. These include voice prints, signatures, typing patterns, key-stroke pattern, gait, and so on. A variety of factors, such as mood, stress, fatigue, and how long ago you woke up, can affect behavioral characteristics.
History
Fingerprints were first used to identify individuals in ancient China. The first commercial use of biometrics was in the 1960's and 1970's. In the late 1960's FBI developed a system for automatically checking /comparing and verifying fingerprints. In early 1970's FBI installed automatic fingerprinting scanning systems .During the late 1970's Idnetiymat installed the first biometrics physical access control systems in top secret US Government sites. The system was based on Hand Geometry. During late 1970s development of voice recognition systems began and in the . 1980's Biometrics systems using Iris scan and that with face recognition system developed.
System:
A generic biometric model consists of five subsystems, namely, data collection,transmission, signal processing, decision making and data storage. Data collection involves user of sensors to detect and measure an individual’s physiological or behavioral characteristics.
Biometric model
Finger print recognition
Among all the Biometric techniques, fingerprint based identification is the oldest method which has been successfully used in numerous applications. Every person’s fingerprint is unique and is a feature that stays with the person throughout his/her life. This makes the fingerprint the most reliable kind of personal identification because it cannot be forgotten, misplaced, or stolen. Fingerprint authorization is potentially the most affordable and convenient method of verifying a person's identity. This fact has been utilized for restricting the access to individuals in high security areas.
The Basics of Fingerprint identification
The skin on the inside surfaces of our hands, fingers, feet, and toes is “ridged” or covered with concentric raised patterns. These ridges are called friction ridges and they serve the useful function of making it easier to grasp and hold onto objects and surfaces without slippage. It is the many differences in the way friction ridges are patterned, broken, and forked which make ridged skin areas, including fingerprints, unique.
Global Versus Local Features
We make use of two types of fingerprint characteristics for use in identification of individuals: Global Features and Local Features. Global Features are those characteristics that you can see with the naked eye. Global Features include:
• Basic Ridge Patterns
• Pattern Area
• Core Area
• Delta
• Type Lines
• Ridge Count
The Local Features are also known as Minutia Points. They are the tiny, unique characteristics of fingerprint ridges that are used for positive identification. It is possible for two or more individuals to have identical global features but still have different and unique fingerprints because they have local features - minutia points - that are different from those of others.
Fingerprint Scanning
Fingerprint scanning is the acquisition and recognition of a person’s fingerprint characteristics for identification purposes. This allows the recognition of a person through quantifiable physiological characteristics that verify the identity of an individual.
There are basically two different types of finger-scanning technology that make this possible. One is an optical method, which starts with a visual image of a finger. The other was a semiconductor-generated electric field to image a finger.
There are different ways to identify fingerprints. They include traditional police methods of matching minutiae, straight pattern matching, moiré fringe patterns and ultra sonic
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: who is liberal ease, biometrics devices, seminar report on androide security, security system brinks, biometrics from reel to real an essay paper, online voting system employing biometrics, seminar on radialdistribution system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Biometrics Security System Full Download Seminar Report and Paper Presentation - by smart paper boy - 18-06-2011, 10:52 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,061 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 43,967 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,835 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,992 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,708 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,092 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,241 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,512 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,649 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,426 16-09-2015, 02:51 PM
Last Post: seminar report asees

Forum Jump: