Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 17
Information technology project
TOPIC: BIOMETRIC AUTHENTICATION
Presented by ankit kumar prajapati of
Class X “B” Roll no. 38 Presented to : Rahul Mittra Sir Contents: What is biometrics Need of biometrics Types of biometrics Fingerprint recognition Face recognition Hand geometry Iris scanning Voice recognition Signature recognition Advantages Disadvantages Application of biometrics Conclusion What is biometrics? Biometrics are physical or behavioural human characteristics that can be used to digitally identify a person to grant access to systems, devices or data. The word Biometrics comes from the Greek words "bios" (life) and "metron" (measure). Need of biometrics Main purpose is security. Can not be stolen, forgotten or lost. High secure than passcode and pin. Easy and requires less time.. Fake person can be identified. Types of biometrics Fingerprint recognition Fingerprint recognition is a type of physical biometrics. For this authentication method, a fingerprint scanner is used to authenticate data. Fingerprint scanners are security systems of biometrics. They are used in police stations, security industries, smartphones, and other mobile devices. Face recognition Facial recognition is the automatic localization of a human face in an image or video. If necessary, facial recognition technology can be used to confirm a person's identity based on the available data - an image of someone’s face stored in a database as mathematical code. Interest in this technology is high because this method can be applied in videoconferencing. Hand geometry Hand geometry is a biometric that identifies users from the shape of their hands. Hand geometry readers measure a user's palm and fingers along many dimensions including length, width, deviation, and angle and compare those measurements to measurements stored in a file. Iris scanning Iris scanning technology was first proposed in 1936 by ophthalmologist Frank Bursch. In the early 1990s, John Dufman of Iridian Technologies patented an algorithm for detecting differences in the iris. At the moment, this biometric authentication method is one of the most accurate and is performed with the help of dedicated iris scanners. Voice recognition Voice is a feature as inherent to each person as their fingerprints or face. The fact that so many companies worldwide use phones for communication offers an excellent opportunity for the use of this biometric authentication method. Moreover, voice recognition is very convenient for users and requires minimum effort on their side. Signature recognition Dynamic signature verification can be applied in areas requiring workflow automation, such as banking or judicial systems. Signature recognition is based on pattern recognition algorithms or mathematical methods of curve analysis, since a set of points can represent a signature. Therefore, these systems often use time series decomposition or curve approximation. Advantages Uniqueness Universality Permanence Measurability User friendliness Accuracy Comfort Convenient disadvantages Costly. Missing body part problem. False acceptances and rejections. The scanning of eye is fearful. The nervousness that people feel about the scanners identification. If a person's biometric data is stolen, it is not possible to replace it. Application of biometrics Immigration Control Transactional Authentication Computer Security Mobile device Smart Doors Time and Attendance Prisons conclusion Biometrics, if used correctly, can and should be a valuable tool for information security. However, like the other methods for identifying and authenticating a person it has drawbacks of its own. No system is ever foolproof, and because of that biometrics needs to be used in conjunction with at least one other method. This method is often referred to as two-factor authentication. Requiring the user to either know something else or having something else decreases the chances of type II errors. Also if there is an issue with the biometric scanner it would then be easy to fall back onto a password or a security card. The reason biometrics will never be used by itself, is that is will never be secure enough without other forms. While we may be able to reduce type I and type II errors, it is not a fool prood method. The requirement of another form of authentication gives us another level of security that is a requirement.