You are on page 1of 17

A SEMINAR ON

BIOMETRICS FOR RECOGNITION

Presented by v.chaithanyakrishna B.Tech (CSE) 08125757821

Presentation Outlines
Traditional methods of security Need for biometrics Biometrics recognition techniques How biometrics work Applications

Why Biometrics ?
ATMs

Cellular phones Smart cards Desktop PCs Workstations Computer networks PINs and passwords may be forgotten, Token-based identification methods such as passports and drivers licenses may be forged, stolen, or lost.

WHAT IS BIOMETRICS ?
BIO-Physical or Behavioral METRICS-To measure characteristics Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics .

Physical biometrics:
Fingerprint Facial recognition/face location Hand geometry Iris scan Retinal scan Vascular patterns

Behavioral biometrics:
Speaker/voicerecognition: Analyzing vocal behavior Signature/handwriting: Analyzing signature dynamics Keystroke/patterning: Measuring the time spacing of typed words

FINGERPRINT RECOGNITION
A live

acquisition of a persons fingerprint. Dots (very small ridges), Space between two temporarily divergent ridges), Spurs (a notch protruding from a ridge), Bridges (small ridges joining two longer adjacent ridges), crossovers (two ridges that cross each other).

Biometric sensor:-acquire images . Preprocessing:-reference points extraction,contour spacing,binarization. Feature extraction:-removal of noise,convert data into numeric feature template. Matcher:- Compare extraced template with previously enrolled templates. - Determine degree of similarity & output matching score. Decision:-matching score compare with threshold.

Hand Geometry
Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers.

Iris recognition
Iris scanning measures the iris pattern in the colored part of the eye,

Steps to Facial Recognition


1. Capture image 2. Find face in image 3. Extract features (store template) 4. Compare templates 5. Declare matches

Signature Verification :
an automated method of measuring an individuals signature. This technology examines speed,direction, and pressure of writing; the time that the stylus is in and out of contact with the paper. Speaker / Voice Recognition: Voice or speaker recognition uses vocal characteristics to identify individuals using a passphrase. A telephone or microphone can serve as a sensor,

Keystroke Dynamics:
Keystroke dynamics is an automated method of examining an individuals keystrokes on a keyboard. This technology examines such dynamics as speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys.

APPLICATIONS
Prevent unauthorized access to ATMs, Cellular phones, Smart cards, Desktop PCs, Workstations, Computer network. Criminal identification,prison security. Electronic commerce,Electronic banking. In automobiles biometrics can replace keys with keyless entry devices. Airport security,voter cards,civilian applications.

Conclusion:
Biometric is an emerging area with many opportunities for growth. Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past.

REFERENCES
Michael J. Potel,IEEE paper on Graphics and

Security: Exploring visual Biometrics.

Bryan Lipinski, Iris Recognition: Detecting the Iris


J Daugman, How Iris Recognition Works, IEEE Conf. on ICIP, 2002. International Biometric Group website, http://www.biometricgroup.com

You might also like