Vous êtes sur la page 1sur 40

Biometrics Technology

something you know, like a password, PIN,


or code.

something you have, like a swipe card, smart
card, token, or key.

something you are, which is biometrics.
three main types of authentication
available today are:
What is a biometric?
Biometrics
Is the term given to the use of

biological traits
OR
behavioral characteristics

to identify an individual.
Characteristics

The common Physical characteristics are:
Fingerprint
Face
Retina
Iris
Vein pattern, and
Hand and finger geometry
Characteristics

Behavioral characteristics are:

Keystroke dynamics
Voice
Gait, and
Signature dynamics

The Biometric importance
The security is needed in every place.



Alleviate the existing problems, Like
those which can be taken, stolen,
borrowed or even forgotten.


The Biometric importance (Cont.)
Improves convenience, security, and privacy.



The first and most critical link in the security
chain.

presented to counteract security threats.
Biometrics History
The term "biometrics" is derived from the Greek words

(life)

and metric means
(to measure).





bio which means
Biometrics History (Cont.)
the first known example of biometrics in practice was a
form of finger printing being used in China in the 14th
century.

Biometrics History (Cont.)
In the 1890s, 'Bertillonage', created a method of bodily
measurement with the criminals who repeated the
crimes with different names and looks.



Biometrics History (Cont.)
After this, finger printing, which was developed
by Richard Edward Henry of Scotland Yard.





Biometrics Process
No
Yes
Biometric
Data Collection
Transmission
Quality
Sufficient?
Yes
Template Match
Signal Processing,
Feature Extraction,
Representation
Database
Generate Template
Decision
Confidence?
new biometric sample is requested.
No
Physical Characteristics
Fingerprint Recognition:
Fingerprint Recognition is the identification by
using patterns of friction ridges and valleys on
an individual's fingertips which are unique to
that individual.
Database
Fingerprint Recognition steps:
Face Recognition:
Face recognition uses the visible physical
structure of the face and analyses the spatial
geometry of distinguishing features in it to
identify an individual.
Face recognition process:
Database
Input face
image
Extraction of
face image
Extraction of
face features
Positive
negative
I ris I dentification:
The iris is the colored ring of textured tissue
that surrounds the pupil of the eye.
I ris I dentification Steps:








Veins Recognition:
Venial Recognition: A system for Identification using
a persons unique vein patterns.
Veins as a biometrics tool involve the measurement
of the blood vessels on the back of your hand.
Vein Recognition System:
Database
Input of palm
picture
The output
picture
Generate veins
structure
match
Not match
Behavioral Characteristics

Voice Recognition:
Voice Recognition: is the Identification using
the acoustic features of speech that have been
found to differ between individuals.
Voice I dentification System
Database
Construct voice
reference template
Signature I dentification:
Signature identification: is the analyses of the
way a user signs his or her name.
The process used by a biometric system to
verify a signature is called dynamic signature
verification (DSV).

the angle at which the pen is held,
the number of times the pen is lifted,
the time it takes to write the entire signature,
the pressure exerted by the person while signing,
the variations in the speed with which different
parts of the signature are written.
Signature Verification Process (Cont.)
Biometric
trait
Signature Verification Process
Database
Profile

Movies to Real World

Applications of Biometric
Applications of Biometric
Access control :
Disney World (fingerprint scanner).




Child day care centers ( hand geometry
systems )
Applications of Biometric (Cont.)
Time and attendance management:
Hospitals (hand geometry systems)






Other Applications
Airports:
Heathrow airport (iris recognition)




ATMs:
(face recognition)





Other Applications (Cont.)
Pc access:
GM and Hertz (voice identification technology)
to protect their computer facilities.


Fujitsu has developed a mouse that can verify a
person's identity by recognizing his pattern of
blood veins.

Other Applications (Cont.)
Prisons:
Fujitsu has developed a mouse that can verify a
person's identity by recognizing his pattern of
blood veins.
Advantages of biometrics
1. Uniqueness
2. Universality
3. Permanence
4. Measurability
5. User friendliness
6. Accuracy
7. Comfort

Disadvantages of Biometrics
1. costly.



2. Facial imaging can also hinder accurate
identifications.




3. Missing body part problem.
Disadvantages of Biometrics
(Cont.)
4. False acceptances and rejections.


5. The amount of comfort.
6. The scanning of eye is fearful.




7. The nervousness that people feel about the
scanners identification.

Future Prospects
Biometry is one of the most promising and life-altering
technologies in existence today. I t is all set to
change the way we live in the future. Some of the
emerging biometrics technologies in the near
future are:

1. Ear shape identification.

2. Body odor identification.

3. Body salinity identification.

4. EEG Fingerprint

5. DNA matching

Conclusion
Not perfect yet.
Successful applications.
Decreasing costs and increasing convenience.
Increasing both privacy and identity security.
The field of biometrics is evolving.
Benefit from this technology .
References:

The Biometric Consortium - http://www.biometrics.org/
National Institute of Standards and Technology - http://www.nist.gov/
The Biometric Catalog - http://www.biometricscatalog.org/
ITPro - http://www.computer.org/
Georgia Institute of Technology - http://www.gatech.edu/
http://www.biometricgroup.com/abio1/technology/researchtechnology.htm
http://www.conspiracyarchive.com/images/biometrics.jpg
http://www.information-security-topics.org/information_security_index/V
http://www.bromba.com/faq/fpfaqe.htm

Vous aimerez peut-être aussi