0% found this document useful (0 votes)
16 views

Biometrics

Uploaded by

Thomachan Antony
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Biometrics

Uploaded by

Thomachan Antony
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

SEMINAR REPORT

BIOMETRICS

SUBMITTED BY,
Vyshnavu Muraleedharan
VI BCA B
Roll No:3364
1.BIOMETRICS
1.1 INTRODUCTION
Biometrics is the technology used to automatically identify or verify an individual based
on unique physical or behavioural attributes. These characteristics are specific to each
person and difficult to replicate, making biometrics a reliable and secure form of
identification.
A physiological characteristic is a relatively stable physical trait, such as an individual’s
fingerprint, hand geometry, iris pattern, or blood vessel pattern on the back of the eye.
These biometric measurements are generally permanent and unalterable without
significant duress to the individual.
On the other hand, a behavioural characteristic reflects an individual’s psychological
makeup. A signature is the most common behavioural biometric used for identification.
Since behavioural characteristics can vary over time, systems that use them often allow
for periodic updates to ensure accuracy.
Biometrics plays a crucial role in enhancing security across various industries, including
banking, healthcare, and law enforcement, by providing a seamless and accurate way to
authenticate individuals.

1.2 BIOMETRICS TERMS


Biometrics involves various specialized terms that describe the processes, components,
and performance metrics used in identification and verification systems. These terms
help define how biometric data is collected, stored, and compared to ensure accurate
and secure authentication.
RECOGNITION
Recognition is the general process of determining if a person’s biometric data matches
any stored data. It can involve either identification (one-to-many) or verification (one-
to-one). Recognition systems analyse and compare biometric traits to establish identity
or confirm a claimed identity. An example is Unlocking your phone using facial
recognition is a common example. The system scans your face and checks if it matches
the stored template to grant access.
IDENTIFICATION
Identification refers to a one-to-many comparison, where an individual’s biometric
data is compared against multiple records in a database to find a match. This process
determines "Who is this person?" without requiring the individual to claim an identity.
An example is facial recognition used in surveillance or fingerprint matching in criminal
investigations.
VERIFICATION
Verification is a one-to-one process where the system checks whether the presented
biometric data matches the stored data for a specific individual. This answers the
question, "Is this person who they claim to be?" Common examples include unlocking
a phone with a fingerprint or accessing a bank account through facial recognition.
ENROLMENT
Enrolment is the foundational process in biometric systems where an individual’s
biometric data is captured and stored for future reference. This step involves collecting
biometric samples (such as fingerprints or facial scans), processing them, and creating
a unique digital representation called a template. This template is securely stored in a
database and used later for identification or verification.
Example:
When setting up Face ID on a smartphone, the device scans your face multiple times
from different angles to create a facial template. This template is used each time you
unlock your phone.
LIVENESS DETECTION
Liveness detection is a security feature designed to ensure that the biometric data being
presented comes from a real, live person rather than a photograph, mask, or other
spoofing attempts. This prevents fraudulent access by detecting physical cues like skin
texture, eye movement, or slight facial expressions.
Example:
In facial recognition systems, liveness detection may require the user to blink or move
their head slightly during the scan to prove they are not presenting a static image. This
is commonly used in banking apps and airport security systems.
MULTIMODAL BIOMETRICS
Multimodal biometrics uses two or more types of biometric identifiers to improve
accuracy and security. By combining different traits (like fingerprint and facial
recognition), the system reduces the chances of false matches and enhances overall
reliability.
Example:
High-security facilities often use both fingerprint and iris scans for access control. Even
if one identifier fails, the second ensures accurate identification, minimizing errors and
unauthorized entry.
1.3 BIOMETRICS CHARACTERISTICS
Biometric characteristics are distinct traits that can be used to identify and authenticate
an individual. These characteristics are divided into two main categories: physiological
and behavioural, each offering unique ways to capture, analyse, and verify an
individual’s identity. The key feature of biometric traits is that they are unique to each
individual, making them highly reliable for security and identification purposes.
PHYSICAL BIOMETRICS
Physical biometrics refers to the use of unique physical characteristics of an individual
to verify their identity. These traits are generally stable over time, making them ideal
for secure identification and authentication systems. Physical biometrics rely on
physiological features of the body that are distinctive and difficult to replicate, ensuring
a high level of security and accuracy.
TYPES OF PHYSICAL BIOMETRICS
I.FINGERPRINT RECOGNITION
Fingerprint recognition is one of the oldest and most widely used forms of biometric
authentication. It relies on the unique patterns of ridges and valleys found on a person’s
fingertips. Since no two people have identical fingerprints, it offers a highly reliable
method for personal identification.
Applications:
• Used in smartphones for unlocking devices.
• Employed in criminal investigations for forensic analysis.
• Used in access control systems in government or corporate environments.

II.FACIAL RECOGNITION/FACE LOCATION


Facial recognition technology analyses an individual’s facial features, such as the
distance between the eyes, the shape of the nose, and the contours of the jawline. These
features are unique to each person and can be captured from a photograph or video feed.
Applications:
• Commonly used in smartphones for facial unlocking.
• Integrated into security systems at airports and banks.
• Used for identity verification in surveillance and law enforcement.
III.HAND GEOMETRY
Hand geometry involves measuring the size and shape of a person’s hand, including the
length and width of fingers, and the distance between various points on the hand.
Although not as unique as fingerprints or irises, hand geometry offers a reliable form of
authentication in specific contexts.
Applications:
• Used in access control systems in workplaces and secure facilities.
• Employed in time and attendance tracking in corporate settings.
• Used in some biometric payment systems.

IV.IRIS SCAN
Iris recognition involves capturing the unique patterns found in the coloured part of the
eye (the iris). These patterns are highly distinctive and stable throughout an individual's
life, making them one of the most accurate biometric identifiers.
Applications:
• Widely used in border control and airport security for high-security access.
• Employed in military and government sectors where high security is required.
• Used in biometric access control systems for confidential areas.

V.RETINA SCAN
A retina scan is a biometric method that uses the unique pattern of blood vessels in the
retina (the back part of the eye) to identify a person. This pattern is unique to every
individual and stays the same throughout life.
Applications:
• High-security areas: Used in places like government buildings and military.
• Banking: For secure access to accounts or transactions.
• Medical field: To identify patients accurately.
ADVANTAGES OF PHYSICAL BIOMETRICS

• High Accuracy: Physical traits are highly distinctive and hard to duplicate.
• Convenience: Physical biometrics, such as fingerprints or facial recognition, are
easy to collect and use in everyday applications.
• Security: Since these characteristics are unique to each person, they are difficult
to steal or replicate, offering higher levels of security.
DISADVANTAGES OF PHYSICAL BIOMETRICS

• Environmental Factors: Conditions like dirt, oil, or moisture can affect the
accuracy of some physical biometric systems, such as fingerprint recognition.
• Privacy Concerns: Collecting and storing sensitive physical data raises privacy
concerns, especially if not adequately protected.
BEHAVIORAL BIOMETRICS
Behavioural biometrics refers to the analysis of unique patterns of behaviour or actions
exhibited by individuals. Unlike physical biometrics (like fingerprints or facial
features), which are based on anatomical characteristics, behavioural biometrics focuses
on how individuals perform certain tasks. These traits can change over time, but they
are still distinctive enough to identify or authenticate a person.
TYPES OF BEHAVIORAL BIOMETRICS
I.VOICE RECOGNITION
Voice recognition analyses the unique features of a person’s voice, such as pitch, tone,
and cadence. It can even distinguish between words, accents, and other vocal traits.
Applications:
• Used in call centers for customer authentication.
• Virtual assistants like Google Assistant, Siri, or Alexa.
• Phone-based authentication for secure access to banking and private accounts.

II.SIGNATURE RECOGNITION
Signature recognition analyses the way an individual signs their name. The speed,
pressure, and stroke order are unique to each person, even though signatures can vary
slightly with each use.
Applications:
• Used in document signing and financial transactions.

• E-signatures for legal agreements and contract signing.


III.KEYSTROKE/PATTERNING
Keystroke dynamics involves analysing how a person types on a keyboard. Factors like
typing speed, rhythm, and the timing between keystrokes are unique to each individual.
Applications:
• Used for online banking and secure login systems to verify a user’s identity based
on their typing style.
• Authentication systems for websites and apps.

IV.GAIT RECOGNITION
Gait recognition analyses the unique way an individual walks. It includes stride length,
foot placement, and body posture. Even when someone changes their clothes or is in a
different environment, their walking style remains unique.
Applications:
• Used in surveillance and security systems.
• Healthcare monitoring for elderly individuals to detect falls or mobility issues.
ADVANTAGES OF BEHAVIORAL BIOMETRICS
• Non-Intrusive: Unlike physical biometrics, users don’t need to physically
interact with the system (e.g., touching a scanner).
• Continuous Authentication: Behavioural biometrics can continuously verify the
user’s identity during an entire session, reducing the risk of unauthorized access.
• Adaptability: As these traits are based on actions, the system can adapt to minor
changes over time (e.g., changes in typing speed or voice tone).

DISADVANTAGES OF BEHAVIORAL BIOMETRICS

• Variability: Behavioural traits can change due to health conditions, emotions, or


environmental factors, potentially reducing the accuracy.
• Privacy Concerns: Since behavioural data can capture sensitive patterns, it may
raise privacy and data protection issues.
• Environmental Factors: For instance, changes in a person’s typing rhythm could
occur because of a different keyboard or device, affecting authentication
accuracy.
1.4 APPLICATIONS OF BIOMETRICS
Biometric technology has found applications across various sectors, offering secure,
accurate, and efficient methods of identification and authentication. These applications
span from everyday consumer devices to high-security environments, improving
convenience and security for users and organizations alike.
I. Prevent Unauthorized Access to ATMs, Cellular Phones, Desktop PCs
Biometric systems are increasingly being used to prevent unauthorized access to ATMs,
cellular phones, and desktop PCs by ensuring that only authorized individuals can
access these devices. Instead of relying on traditional methods such as PINs or
passwords, which can be easily forgotten or stolen, biometric features like fingerprints,
face recognition, or iris scans provide a more secure and reliable authentication method.
Examples:
• ATMs: Many modern ATMs now allow customers to withdraw money using
fingerprint recognition or facial recognition, making it harder for criminals to
impersonate account holders.
• Cellular Phones: Smartphones use fingerprint scanners, facial recognition, or iris
scanning as an authentication method, allowing users to quickly and securely
unlock their phones. This enhances security by ensuring that only the authorized
user can access sensitive data or make transactions.
• Desktop PCs: Biometric authentication methods like fingerprint sensors or face
recognition software are used to unlock computers, ensuring that unauthorized
individuals cannot access personal files, emails, or sensitive information.
II. Criminal Identification
Biometric systems are widely used in law enforcement and criminal justice to identify
and track criminals more efficiently and accurately. This technology helps police and
investigators match biometric data collected from crime scenes (such as fingerprints,
facial images, or DNA) with databases to identify suspects and criminals quickly.
Examples:
• Fingerprint Recognition: Automated Fingerprint Identification Systems (AFIS)
are used to compare fingerprints collected from crime scenes with a large
database of known criminals.
• Facial Recognition: Facial recognition technology is used by law enforcement
agencies to identify suspects in surveillance footage or public spaces. It
compares the facial features of individuals in real time with databases of known
criminals.
• Iris Scanning and DNA: In more complex investigations, iris scans or DNA
samples can be used to make highly accurate identifications of criminals.
III. In Automobiles, Biometrics Can Replace Keys with Keyless Entry Devices
Biometric technology is increasingly integrated into automobiles for keyless entry and
vehicle authentication. Rather than using traditional keys, biometric systems can allow
a driver to unlock and start their car using their fingerprint, facial recognition, or voice
recognition. This enhances security, as it ensures that only the authorized driver can
access and operate the vehicle.
Examples:
• Fingerprint Scanning: Some high-end vehicles use fingerprint recognition to
allow drivers to unlock the car doors and start the engine.
• Facial Recognition: Facial recognition systems can identify the driver’s face,
unlock the car, and even adjust settings like seat position and mirrors based on
the driver’s profile.
• Voice Recognition: Some vehicles use voice recognition to allow the driver to
start the car and make hands-free commands while driving.

IV. Airport Security


Biometric systems play a critical role in enhancing airport security by improving the
efficiency of passenger identification, boarding procedures, and customs checks. These
systems help airports streamline passenger flow while ensuring secure and accurate
identification, reducing the risk of identity fraud and security breaches.
Examples:
• Facial Recognition: Facial recognition technology is increasingly being used at
airports for check-in, boarding, and passport control. It allows passengers to
quickly pass through security without needing to present travel documents,
improving efficiency and reducing wait times.
• Fingerprint and Iris Scanning: At immigration control, fingerprint or iris
scanning can be used to verify a passenger’s identity before allowing them to
enter or exit a country, ensuring secure and accurate travel records.
• Biometric Boarding: Biometric boarding systems at some airports allow
passengers to board flights by simply scanning their face at the gate, reducing
the need for paper tickets or boarding passes.
1.5 CONCLUSION
In conclusion, biometrics is an emerging field with vast potential for growth and
innovation. As technology continues to advance, biometric systems will play a
significant role in transforming the way we authenticate and secure our identities.
The future may soon bring a world where remembering PINs, passwords, or
carrying physical keys will become obsolete. Instead, biometric features like
fingerprints, facial recognition, and iris scans will become the norm for accessing
everything from personal devices to secure facilities. With its ability to provide
both security and convenience, biometrics is poised to revolutionize the way we
interact with technology and safeguard our personal information in the years to
come.
The integration of biometrics into everyday applications, such as mobile phones,
ATMs, airports, and even automobiles, will make our daily lives more
streamlined and secure. As biometric systems become more sophisticated, they
will offer seamless user experiences, eliminating the need for multiple
authentication methods and reducing the risk of identity theft. Moreover, as the
technology becomes more widespread, it will enhance security at a global scale,
making both private and public sectors safer for individuals. The convenience,
reliability, and enhanced security offered by biometrics are driving us toward a
future where access to services, security systems, and personal devices will be
effortless and highly secure, ushering in a new era of digital authentication.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy