Biometric Technology
Biometric Technology
Computer Security
Bi
Table of Content – 8 Items
om
Computer Security
et
ri c
Te
ch
1 Definition and Key Terms
om
et
ri c
Defination of Biometrics
Te
ch
Biometric is an
03 Emerging area with
many Opportunities for
Growth
The Term Biometric Comes
From The Greek Words
Bios(Life) and
Metrikos(Measure)
01 02
Biometrics Refers To The
Automatic Identification of a
Person Based on His or her
Physiological or Behavioral
Characteristics.
3
Bi
Computer Security
om
et
ri c
Terms Of Biometric
Te
ch
Verification
03
Lorem ipsum dolor sit amet, consectetur
adipiscing elit, sed do eiusmod tempor. Donec
facilisis lacus eget mauris.
Recognition
.
01 02
Identification
Lorem ipsum dolor sit amet, consectetur
adipiscing elit, sed do eiusmod tempor. Donec
facilisis lacus eget mauris.
4
Bi
Uses Of Biometrics Computer Security
om
et
ri c
Te
ch
Co
m
m
er
cia
al
c
l
di
Me
Government
Banking
om
Comparing Biometric with Traditional Security
et
ri c
Te
ch
Tradition Security Biometric
6
Bi
Computer Security
om
Comparing Biometric with Traditional Security
et
ri c
Te
ch
Passwords Biometric
7
Bi
Computer Security
om
Comparing Biometric with Traditional Security
et
ri c
Te
ch
Passwords Biometric
8
Bi
Computer Security
om
et
ri c
Te
General Advantages Of Biometric
ch
⬢ Increase Security
⬢ Make it possible, automatically to know who did what, where and when.
⬢ Replace hard-to-remember passwords which may be shared or observed.
⬢ Increased accuracy
⬢ Increased ease-of-use
⬢ Increased accountability
⬢ Fraud detection
⬢ Flexible
⬢ Quicker Authentication
9
Bi
Computer Security
om
et
ri c
General Disadvantages Of Biometric
Te
ch
Technology
⬢ Physical Disabilities
⬢ Expensive on the pocket
⬢ Physical traits can’t be altered
⬢ Scanner issues
⬢ Software malfunction
⬢ No remote access
⬢ Fake positives
⬢ Costs
⬢ Limit privacy for users
10
Bi
Computer Security
om
et
ri c
Te
Basically two types of Biometric Tech
ch
Physiological Behavioral
⬢ A specific physical pattern ⬢ Specific patterns that are related
on a person’s body. to an individual’s actions .
⬢ Physiological biometric ⬢ Behavioural biometric indicators
data is analyzed with are increasingly being used in
things like fingerprint digital applications and online to
readers items that are follow and determine who a
fairly common placed on person is based on a set of
mobile devices like smart patterns created by how they
phone behave 11
Bi
How Biometric Works Computer Security
om
et
ri c
Te
ch
Bi
Biometric Working System Computer Security
om
et
ri c
Te
ch
13
Bi
mo
Computer Security
et
Physical Biometric
ric
Te
ch
Fingerprint recognition
Bi
mo
Computer Security
et
ric
Te
ch
Fingerprint recognition is the identification by using
patterns of an individual’s fingertips which are unique to
Bi
mo
Computer Security
et
How It works
ric
Te
ch
▪ Biometric recognition systems capture and digitize salient features from
the fingerprint such as the arrangement of minutiae and the flow and
orientation of the ridges to create a biometric template.
▪ These templates are then stored in a dataset that allows the system to
select fingerprints to perform either individual comparisons or searches
through the appropriate database(s) depending on the use case.
▪ Fingerprints can be recorded using paper and ink but most current
biometric applications use either a scanner, where the finger is placed on
or rolled across a platen, or a contactless method that captures the
required detail at a proximal distance. 16
Bi
Fingerprint
mo
Computer Security
et
ric
Te
ch
Equipment Application
• Securing mobile phone
• Identification
Advantages Disadvantages
• It offers high accuracy for fingerprint
recognition. • The system is associated with
• It offers long term stability. forensic applications.
• It is easy to use/non-intrusive technique.
• Can't misplace fingerprints like one can • The accuracy and working of
misplace physical access cards. system is affected by skin
• Difficult to guess fingerprint pattern
than guessing password. conditions of people.
SlideModel.com 17
Bi
Computer Security
om
et
ri c
Facial
Te
ch
Recognition
Bi
SWOT Analysis
om
Computer Security
et
ri c
Te
ch
Strengths Weaknesses
SWOT
• Edit text here
• Edit text here
W
Analysis
O T
Opportunities Threats
SlideModel.com 19
Bi
Computer Security
om
et
ri c
Hand Geometry
Te
ch
Add a main point Add a main point
Hand or finger geometry is
an automated
measurement of many
Dimensions of
The hand and fingers
Briefly elaborate on Briefly elaborate on
what you want to discuss. what you want to discuss.
How It works
Bi
mo
Computer Security
et
ric
▪ Images are taken while the hand is kept palm down on a support plate and
Te
ch
kept in position by the use of guide pegs.
▪ The length, width, thickness, and surface area of the individual’s hand is
measured and recorded.
▪ Multiple features and measurements are extracted during this process.
Several images of the same hand are often taken in order to produce a
single stored template that has sufficient detail for identification purposes.
▪ These images and the supporting data are then filed in a database and are
used to authenticate the identity of the enrollee in subsequent encounters
when the subject’s hands are imaged again and compared with the
21
reference images to confirm or reject the identity claim.
FR
SWOT Analysis
EE
BU
N
D
LE
Strengths Weaknesses
SWOT
• Edit text here
• Edit text here
W
Analysis
O T
Opportunities Threats
SlideModel.com 22
Bi
Computer Security
om
et
ri c
Te
ch
Iris Recognition
23
How It works
Bi
mo
Computer Security
et
ric
Te
ch
▪ Iris recognition technology uses the unique patterns of the colored tissue that form the
iris. These patterns are captured by a camera operating in near infra-red wavelengths
▪ The first iris cameras had to be close to the eyes (but not in contact with them) in
order to record sufficient detail but technological advances now allow cameras to be
placed several feet away and capture the irises of those on the move such as at an airport
boarding gate.
▪ The system uses pattern-recognition algorithms, in a similar way to automated
fingerprint recognition systems, to perform comparisons in both the biometric one-to-
one (1:1) verification to authenticate a suggested identity and one-to-many (1:N)
identification modes as a probe to search a database to establish if any of the other iris
records provide a potential match. 24
FR
SWOT Analysis
EE
BU
N
D
LE
Strengths Weaknesses
SWOT
• Edit text here
• Edit text here
W
Analysis
O T
Opportunities Threats
SlideModel.com 25
Bi
Computer Security
om
et
ri c
Te
ch
RETINA
RECOGNITION
26
FR
SWOT Analysis
EE
BU
N
D
LE
Strengths Weaknesses
SWOT
• Edit text here
• Edit text here
W
Analysis
O T
Opportunities Threats
SlideModel.com 27
Bi
Computer Security
om
et
ri c
Te
ch
28
Bi
mo
Computer Security
et
Behavioural biometrics
ric
Te
ch
Bi
o
m
Computer Security
Voice
et
ric
Te
ch
Recognition
Voice recognition uses vocal characteristics to identify
individuals using a pass-phrase.
A telephone or microphone can serve as a sensor
Bi
mo
Computer Security
et
ric
Te
How It works
ch
▪ The voice is collected and analyzed by software that employs
artificial intelligence and machine learning techniques to produce
a vast array of data derived from factors such as modulation of
speech, tones, accent, frequency etc.
▪ These elements enable the system to create a reference template of
the voice (known as a ‘voice print’ or ‘voice model) that can be
used to authenticate the speaker in subsequent transactions
31
FR
SWOT Analysis
EE
BU
N
D
LE
Strengths Weaknesses
SWOT
• Edit text here
• Edit text here
W
Analysis
O T
Opportunities Threats
SlideModel.com 32
Bi
om
Computer Security
Signature
et
ric
Te
ch
Verification
An automated method of measuring an
Individual’s signature.
FR
SWOT Analysis
EE
BU
N
D
LE
Strengths Weaknesses
SWOT
• Edit text here
• Edit text here
W
Analysis
O T
Opportunities Threats
SlideModel.com 34
Bi
om
Computer Security
Keystroke
et
ric
Te
ch
Dynamics
An automated method of examining an
Individual’s keystrokes on a keyboard
FR
SWOT Analysis
EE
BU
N
D
LE
Strengths Weaknesses
SWOT
• Edit text here
• Edit text here
W
Analysis
O T
Opportunities Threats
SlideModel.com 36
Bi
mo
Computer Security
et
ric
APPLICATIONS
Te
ch
ATMS Prevent unauthorized access to ATMS