Académique Documents
Professionnel Documents
Culture Documents
Problem
Information Security &
Privacy
ROLL NO –
25
7010070008
DESIGN PROBLEM
2
3
Acknowledgement
This work was not only a mandatory exercise for my curriculum but
also a very rare opportunity to learn and be able to work in an
extremely healthy environment at “LOVELY PROFESSIONAL
UNIVERSITY”. I express my heartiest gratitude towards all those
people who have, in various ways helped me to complete this design.
3
4
(Ankur Bhutani)
Table of contents
1. Biometrics Introduction......................5
2. Biometrics In army..........................11
3. Access Control..............................14
4. Security Technique..........................19
5. Authentication..............................23
6. Innovative..................................27
7. Use of Biometric techniques.................33
8. Importance..................................35
9. Conclusion….................................36
10. Country using biometrics...................38
11. Certificate of agreement...................40
4
5
Introduction
Biometrics
History
The term “biometrics” is derived from the Greek
words “bio” (life) and “metrics” (to measure).
Automated biometric systems have only become
available over the last few decades, due to
significant advances in the field of computer
processing. Many of these new automated
techniques.
5
6
Definition
Biometrics is the science and technology of
measuring and analyzing biological data. In simple
words “Application of electronics in
measurement of biological characteristics or
features”. According to Hackers”Biometrics refers to
the measurement of “physiological and behavioral
characteristics” used to identify computer users”.
Examples are face, iris and retinal patterns, hand
geometry and voice.
6
7
Biometrics technologies:
Fingerprint Recognition
Face Recognition
Iris Recognition
Voice Recognition
Smart Cards
Encryption Systems
Security Tokens
7
8
8
9
9
10
10
11
11
12
Introduction
12
13
Identification Problem
Listed below are a few: -
Importance
13
14
14
15
Example
Troops and intelligence analysts are using biometrics
to hire and maintain an Iraqi workforce, protect
military bases and monitor inmates at detention
centers.
Access control
15
16
16
17
-Information Privacy
-Physical Privacy
-Religious Objections
17
18
Information Privacy
18
19
Physical Privacy
Religious Objections
19
20
20
21
Security Techniques
21
22
• Face recognition
22
23
• Fingerprint identification
23
24
• Retina scan
24
25
• Iris scan
• Signature
25
26
• Voice analysis
Steps
The key steps involved in biometric Authentication
are: -
26
27
27
28
28
29
Authorization
Authorization applies to subjects rather than to users
(the association between a user and the subjects
initially controlled by that user having been
determined by I&A). Authorization determines what a
subject can do on the system.
29
30
Innovation in Biometrics
In Biometrics also there are lot of innovations and
different new biometrics Products are being released
after specific time.
For example:-
30
31
Imaging Applications
Vein pattern IR. grey-scale images are binarized,
compressed and stored within a relational database
31
32
Vein Images
32
33
33
34
34
35
35
36
Iraq
36
37
Japan
Australia
37
38
Canada
Israel
The Israeli government has proposed a bill calling for
the creation of a database of all Israeli citizens. The
citizens will be obliged to submit fingerprints; facial
features will also be kept. The bill is expected to be
voted over in September 2009. Opponents of the
proposed law, including prominent Israeli scientists
and security experts, warn that the existence of such
a database could damage both civil liberties and
state security, because any leaks could be used by
criminals or hostile individuals against citizens.
38
39
39
40
Uses
40
41
Importance OF BIOMETRIC
TECHNOLOGIES:
Biometric technologies can be applied to areas
requiring logical access solutions, and it can be used
to access applications, personal computers,
networks, financial accounts, human resource
records, the telephone system, and invoke
customized profiles to enhance the mobility of the
disabled. In a business-to-business scenario, the
biometric authentication system can be linked to the
business processes of a company to increase
accountability of financial systems, vendors, and
41
42
42
43
CONCLUSION:
Currently, there exist a gap between the number of
feasible biometric projects and knowledgeable
experts in the field of biometric technologies. The
post September 11 the, 2002 attack (a.k.a. 9-11) on
the World Trade Centre has given rise to the
knowledge gap. Post 9-11 many nations have
recognized the need for increased security and
identification protocols of both domestic and
international fronts. This is however, changing as
studies and curriculum associated to biometric
technologies are starting to be offered at more
colleges and universities. A method of closing the
biometric knowledge gap is for knowledge seekers of
biometric technologies to participate in biometric
discussion groups and biometric standards
committees.
43
44
44
45
Certificate of Agreement
Signature……………………...
Date………………
Signature……………………...
Date………………
Signature……………………...
Date………………
Signature……………………...
Date………………
45
46
46