Biometric Technology
#9
PRESENTED BY:
N.Prema chowdary
M.A.Deepthi

[attachment=14844]
Definition:
The statistical use of the characteristic variations in unique elements of living organisms is known as biometrics.
Why we need biometrics?
In order to avoid the problems of forgetting passwords and ID codes, Biometrics based authentication helps us in verifying your finger prints, iris pattern and voice for your identity at A.T.M’s, Airports etc.., you can unlock your houses, withdrawing money from a bank with just a blink of an eye, a tap of your finger or by just showing your face.
Biometrics-what is it?
Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of identification is preferred over traditional methods involving password’s and PIN numbers for various reasons:
(i) The person to be identified is required to be physically present at the point of identification.
(ii) Identification based on biometric techniques obviates the need to remember a password or carry a token. By replacing PIN’s, biometric techniques can potentially prevent unauthorized access to or fraudulent use of A.T.M‘s, Smart cards, computer networks.
(iii) PIN‘s passwords may be forgotten, and token based methods of identification like passwords and driver’s licenses may be forged, stolen or lost. A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user.
Design issues of biometric systems:
An important issue in designing a practical system is to determine how an individual is identified and are designed by keeping two characteristics in mind, they are:
Physical characteristics Personal traits
- Fingerprint, Handprint - Voice pattern
- Face - Handwriting
- Scent, Thermal image - Acoustic Signature
- Iris Pattern
• Depending on the context a biometric system can be either a verification(authentication) system or an identification system
Verification Vs Identification:
There are two different ways to resolve a person’s identity: verification and identification. Verification (Am I whom I claim I am?) involves confirming are denying a person’s claimed identity. In identification, one has to establish a person’s identity (Who am I?). Each one of these approaches has its own complexities and could probably be solved best by a certain biometric system.
Types of biometric devices and their services:
Now let’s see some of the biometric devices being widely used in many areas like computer/network security, government organizations, prisons…. They are:
 Fingerprint identification.
 Face recognition.
 Iris recognition.
 Hand geometry.
 Signature recognition.
 Retinal scanning
 Voice verification….
And now let’s see some of these biometric devices, their services, advantages and disadvantages in detail.
Fingerprint recognition:
Finger prints are unique to each individual and no two fingerprints are alike. Fingerprint recognition is most widely accepted biometric among the technology being used today. Fingerprints contain patterns of ridges and valleys as well as minutiae points. Minutiae points are local ridge characteristics that occur at either the ridge bifurcation or a ridge ending.
There are three methods for scanning finger prints: (1) Optical scanners,
(2) Thermal scanners and
(3) Capacitance (solid state) scanners
Currently, there are two accepted methods for extracting the fingerprint data
(I) Minutia-based and
(II) Correlation-based
“Minutia-based is the more microscopic of the two. This method locates the ridge characteristics (branches and endings) and assigns them a XY-coordinate that is then stored in a file.
The correlation-based method looks at the entire pattern of ridges and valleys in the fingerprint. The location of the whorls, loops and arches and the direction that they flow in are extracted and stored. Neither method actually keeps the captured image; only the data is kept, therefore making it impossible to recreate the fingerprints.”
Once the scanning is complete, the analysis is done by a comparison of several features of the fingerprint know as minutia. Investigators are systems look at where the ridge lines end or where one ridge splits into two (bifurcation). The scanning system uses complicated algorithms to recognize and analyze the minutia. If two prints have three ridge endings, two bifurcations, and form the same shape with the same dimensions, then it is likely the same person’s fingerprints.
Advantages:
• High accuracy rate.
• Can perform 1-to-many comparisons.
• Inexpensive equipment.
• Easy to use (samples are easy to capture and maintain).
• Most established and oldest of the biometric technology.
Disadvantages:
• Actual finger scan images cannot be recreated from a template image
• Users relate fingerprint recognition to criminal activity.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: yhs acer 001, seminar topics on biometric technology, biometric technology pros and cons, s p jain, yhse gt, acer k130, inspiration am 1390,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Biometric Technology - by electronics seminars - 28-12-2009, 04:10 PM
RE: Biometric Technology - by seminar topics - 16-03-2010, 07:27 PM
RE: Biometric Technology - by seminar class - 09-05-2011, 04:43 PM
RE: Biometric Technology - by smart paper boy - 28-07-2011, 09:51 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  biometric voting system ajukrishnan 10 16,787 25-04-2016, 11:45 AM
Last Post: dhanabhagya
  5G technology dhanya1987 8 12,975 11-04-2016, 11:21 AM
Last Post: dhanabhagya
  FinFET Technology computer science crazy 13 11,747 10-03-2015, 04:38 PM
Last Post: seminar report asees
  Cellonics Technology computer science crazy 3 3,591 05-09-2014, 09:45 PM
Last Post: seminar report asees
  Latest Invention: Acoustic Ear-scanning Technology to Help Avoid Theft project report helper 10 8,796 20-08-2014, 09:02 PM
Last Post: preethikrishna
  RFID Technology computer science crazy 4 4,683 09-08-2014, 07:10 PM
Last Post: Guest
  Seminar Report On Optical Computing Technology mechanical wiki 3 6,205 27-07-2013, 12:41 PM
Last Post: computer topic
Question Sixth Sense Technology nitins60 43 76,648 22-06-2013, 10:46 AM
Last Post: Guest
  Blue Eyes Technology sprity 21 31,537 30-01-2013, 12:54 PM
Last Post: seminar details
  3G MOBILE COMMUNICATION TECHNOLOGY full report seminar presentation 22 31,540 29-01-2013, 11:06 AM
Last Post: seminar details

Forum Jump: