Vous êtes sur la page 1sur 15

BIOMETRICS

TECHNOLOGY

PRESENTED BYPRIYAKSHI GOUTOM


BRANCHELECTRONICS & TELECOMMUNICATION
ROLL NO-POW/13/ET/27
SEMISTER-6th

CONTENTS
Introduction
Biometrics History
Types
Principle of biometrics
Functions
Working
Applications
Advantages
Conclusion

INTRODUCTION
Biometrics are automated methods of recognizing
a person based on behavioral or physiological characteristics.Among
the features measured are face,finger prints,hand
geometry,handwriting,iris,retinal,vein and voice.Biometrics
technologies are becoming the foundation of an extensive array of
highly secure identification and personal verification solutions.As the
level of securtity breaches and transaction fraud increases,the need
for highly secure identification and personal verification technologies
is becoming apparent.Biometric based solutions are able to provide for
confidential financial transactions and personal data privacy.The need
for biometrics can be found in federal,state and local governments,in
the military and in commercial applications.Enterpise-wide network
security infrastructures,government IDs ,secure electronics banking
,investing and other financial transactions,retail sales,law
enforcement,and health and social services are already benefiting
from these technologies.

BIOMETRICS HISTORY
Biometrics are being used by human as early as prehistoric

age estimated to be around 31000 year old caves adorned


with prehistoricl pictures apparently signed by fingerprints
and stamps.
First real biometrics was used in the year 1870 by french

anthropologist Alphonse Betillion and turned biometrics a


distinguished field of study.He developed an identification
system based on detailed records of body
measurment,physical description and photographs.

TYPES
Behavioral Biometrics -used for verification.
1. Speaker recognition.
2. Signature varification.
3. Keystroke dynamics.
.Physical Biometrics -used for identification
1. Fingerprints.
2. Face recognition.
3. Hand geometry.
4. Retinal scan.

PRINCIPLE OF
BIOMETRICS
Although the various biometric technologies
vary in what and how they scan,the principle of operation is
very similar.A biometric system is a real time identification
system which identifies a person by measuring a particular
physical or behavioral characterstics belonging to many
people.Biometrics devices consist of a reader or scanning
device,software that converts the scanned information into
digital form,and wherever the data is to be analyzed,a
database that stores the biometrics data for comparison with
previous records.When converting the biometric input,the
software identifies specific point of data as match points.The
match point are processed using an algorithm into a value
that can be compared with biometrics data scanned when a
user tries to gain access.

FUNCTIONS
A biometrics system can provide the following two functions:
Verification:-Authenticates its users in conjuction with a

smart card,username or ID number.The biometric template


captured is compared with that stored against the registered
user either on a smart card or database for verification.
Identification:-Authenticates its users from the biometrics

characteristic alone without the use of smart


cards,usernames or ID numbers.The biometric template is
compared to all records within the database and a closest
match score is returned.

Basic block diagram of a


biometric system

WORKING ON BIOMETRICS SYSTEM


The diagram shoes a simple block diagram of a
biometrics system.When such a system is networked together with
telecommunication technology,biometric systems becomes
telebiometricsystems.The main operations a system can perform are
enrollment and test.During the enrollment,biometrics information is
detected and compared with the stored information.
The second block performs all the necessary preprocessing;it has to removed artifacts from the sensor,to enhance the
input to use some kind of normalization,etc.In the third blocks features
needed are extracted.This step is an important step as the correct
features need to be extracted and the optimal way.A vector of numbers
or an image with particular properties is used to create a template.A
template is a synthesis of all the characteristics extracted from the
source,in the optimal size to allow for adequate identifiably.

APPLICATIONS
Biometric Time clocks or Biometric time and attendance

system,which are being increasingly used in various


organisations to control employee timekeeping.
Biometrics safes and biometric locks,provides security to the

homeowners.
Biometric access control systems,providing strong security at

entrances.
Biometric systems are also developed for securing access to

PCs and providing single logon facilities.

APPLICATIONS
Wireless biometrics for high end security and

providing safer transactions from wireless devices


like PDAs,etc.
Applications of biometrics technology in identifying

DNA patterns for identifying criminals,etc.


Biometrics airport security devices are also

deployed at some of the worlds famous airports to


enhance the security standards.

ADVANTAGES
Replace hard-to-remember passwords which

may be shared or observed.


Integrate a wide range of biometric solutions
and technology,customer applications and
databases into a roubust and scalable control
solution for facility and network access.

ADVANTAGES
Increase security-provide a convenient and low

cost additional tier of security.


Reduce fraud by employing hard-to-forge
technology and materials.For e.g minimise the
opportunity for ID fraud,buddy punching.
Eliminate problems caused by lost IDs or
forgotten passwords by using physiological
attributes.For e.g Prevent unauthorised use of
lost,stolen or borrowed ID cards.
Reduce passward administration cost.

CONCLUSION
The Bluetooth technology that
propels us into a new dimension in wireless
connectivity. It is important to surround
yourself with the right kind of people .
Bluetooth is a new standard developed by
group of electronic manufacturers , that will
allow any sort of electronic equipment to
make its own connection without wires ,
cables or any direct action from users.

CONCLUSION
Biometrics can only be
limited to ones immagination.Biometrics
technology is now being used in almost every
area.Various biometrics system are also used
to boost security and safty
functionalities.Although this list or seminar is
no way complete against biometrics.It is a
single way or an effort to list a few popular
biometric application.

Vous aimerez peut-être aussi