You are on page 1of 5

Scribd

• Explore
• Community
Upload a Document
Top of Form

Search Books, Presentations, Business, Academics...


Bottom of Form
• Login
• Sign Up

• |

• Log In

/ 30
Search coming so

Download this Document for Free

Lingaya’s Institute of Management and Technology


SEMINAR REPORT
ON
“BIOMETRICS”
SUBMITTED IN THE PARTIAL FULFILMENT OF REQUIREMENT
OF DEGREE OF BACHELOR OF ENGINEERING IN INFORMATION
TECHNOLOGY
SUBMITTED TO:
SUBMITTED BY:
Mr. Tapas Kumar
Vartika Paul
Mr. Kiran Kumar
4-IT-55
DEPARTMENT OF INFORMATION TECHNOLOGY
LINGAYA’S INSTITUTE OF MANAGEMENT AND TECHNOLOGY,
NACHAULI, FARIDABAD, HARYANA-121002
April 2008

ACKNOWLEDGEMENT
I am greatly thankful to my Teachers and co-students of Information Technology
Department, who inspired me to present my seminar on “BIOMETRICS”.

They helped and encouraged me in every possible way. The knowledge acquiredduring the preparation of the

seminar report would definitely help me in my futureventures.


I would like to express my sincere gratitude thank all the teachers of our
Department for their help in various aspects during the seminar.
BIOMETRICS
What is Biometrics?
Definition
"Biometrics is the automated identification, or verification of human
identity through the measurement of repeatable physiological, or
behavioral characteristics”
Identification:
The search of a biometric sample against a database of other samples inorder to ascertain whether the donor is
already contained in, or new to thedatabase.
Verification:
It refers to the 'one to one' comparison between a sample and another to ask
the question, 'are you who you say you are.'
The term "biometrics" is derived from the Greek words bio (life) andmetric (to measure). For our use, biometrics
refers to technologies formeasuring and analyzing a person's physiological or behavioralcharacteristics, such as
fingerprints, irises, voice patterns, facial patterns,and hand measurements, for identification and verification
purposes.
Figure 1 Explains the meaning of definition
Identification and verification have long been accomplished by showing
something you have, such as a license or a passport. Sometimes it also
required something you know, such as a password or a PIN. As we moveinto a time when we need more secure
and accurate measures, we begin tolook at using something you are: biometrics.
Biometrics are automated methods of recognizing a person based on a
physiological or behavioral characteristic.
History of BIOMETRICS:
Chinese Precursor:
Possibly the first known example of biometrics in practice was a form offinger printing being used in China in the
14th century, as reported byexplorer Joao de Barros. He wrote that the Chinese merchants werestamping children's
palm prints and footprints on paper with ink todistinguish the young children from one another. This is one of the
earliestknown cases of biometrics in use and is still being used today.
European Origins:
Until the late 1800s, identification largely relied upon "photographicmemory." In the 1890s, an anthropologist and
police desk clerk in Parisnamed Alphonse Bertillon sought to fix the problem of identifyingconvicted criminals and
turned biometrics into a distinct field of study. Hedeveloped a method of multiple body measurements which got
named afterhim (Bertillonage). His system was used by police authorities throughoutthe world, until it quickly faded
when it was discovered that some peopleshared the same measurements and based on the measurements alone,
twopeople could get treated as one. After the failure of Bertillonage, the policestarted using finger printing, which
was developed by Richard EdwardHenry of Scotland Yard, essentially reverting to the same methods used bythe
Chinese for years.
Modern Times:
In the past three decades biometrics has moved from a single method(fingerprinting) to more than ten discreet
methods. Companies involvedwith new methods number in the hundreds and continue to improve theirmethods as
the technology available to them advances. Prices for theharware required continue to fall making systems more
feasible for low andmid-level budgets. As the industry grows however, so does the publicconcern over privacy
issues. Laws and regulations continue to be draftedand standards are beginning to be developed. While no other
biometric hasyet reached the breadth of use of fingerprinting, some are beginning to beused in both legal and
business areas.
WORKING PRINCIPLE OF BIOMETRICS
Biometric devices consist of a reader or scanning device, software thatconverts the gathered information into
digital form, and a database thatstores the biometric data for comparison with previous records. Whenconverting
the biometric input, the software identifies specific points ofdata as match points. The match points are processed
using an algorithminto a value that can be compared with biometric data in the database.
All Biometric authentications require comparing a registered or enrolledbiometric sample (biometric template or
identifier) against a newlycaptured biometric sample (for example, a fingerprint captured during alogin).
Figure 2 Enrollment and Verification Technique
Enrollment Mode :
A sample of the biometric trait is captured, processed by a computer, andstored for later comparison. Biometric
recognition can be used inIdentification mode, where the biometric system identifies a person fromthe entire
enrolled population by searching a database for a match basedsolely on the biometric. For example, an entire
database can be searched toverify a person has not applied for entitlement benefits under two differentnames. This
is sometimes called “one-to-many” matching.
Verification Mode:
In this mode biometric system authenticates a person’s claimed identity
from their previously enrolled pattern. This is also called “one-to-one”
matching. In most computer access or network access environments,
verification mode would be used. A user enters an account, user name, or

You might also like