You are on page 1of 13

m 

      
  
u 
2 What is Biometric
2 Types of Biometric System
2 Example
2 Elements Of Biometric System
2 Process of Biometric
2 How does palm vein biometric work
2 Why are biometric secure?
2 The issues with biometric systems
2 References
 
 
Biometric" come from the Greek words "bio" (life) and "metric" (to
measure). Biometrics are technologies used for measuring and
analyzing a person's unique characteristics.
or
   comprises methods for uniquely recognizing humans based
upon one or more intrinsic physical or behavioral traits. Incomputer science,
in particular, biometrics is used as a form of identity access
management and access control. It is also used to identify individuals in
groups that are under surveillance.
V  
   

Vhere are two types of biometrics¦ À  and M Behavioral


biometrics are generally used for verification while physical biometrics can
be used for either identification or verification.


  is determining who a person is. It involves trying to find
a match for a person's biometric data in a database containing records of
people and that characteristic. Vhis method requires time and a large
amount of processing power, especially if the database is very large.

ë  is determining if a person is who they say they are. It


involves comparing a user's biometric data to the previously recorded data
for that person to ensure that this is the same person. Vhis method requires
less processing power and time, and is used for access control (to buildings
or data)
| 

The main physical biometric technologies
include:
fingerprint
iris
retina
hand
palm vein
face
|
 
   

`.A scanner / reader that captures the user's biometrics


characteristics
2.A piece of software that converts this data into digital form and
compares it with data previously recorded
3.A database, which stores the biometric data
  
   

Vhe process comprises 4 main steps: sample capture, feature


extraction, template comparison, and matching. At enrolment, a
person's biometrics is captured by the scanner. Vhe software
converts the biometric input into a template and identifies specific
points of data as "match points". Vhe match points are processed
using an algorithm into a value that can be compared with biometric
data in the database.
’  

   

An individual's vein pattern image is captured by radiating his/her hand with


near-infrared rays. Vhe reflection method illuminates the palm using an
infrared ray and captures the light given off by the region after diffusion
through the palm. Vhe deoxidized hemoglobin in the in the vein vessels
absorbs the infrared ray, thereby reducing the reflection rate and causing
the veins to appear as a black pattern. Vhis vein pattern is then verified
against a preregistered pattern to authenticate the individual.
As veins are internal in the body and have a wealth of differentiating
features, attempts to forge an identity are extremely difficult, thereby
enabling a high level of security. In addition, the sensor of the palm vein
device can only recognize the pattern if the deoxidized hemoglobin is
actively flowing within the individual's veins.
  
   

2 Œnique: Vhe various biometrics systems have been


developed around unique characteristics of individuals. Vhe
probability of 2 people sharing the same biometric data is
virtually nil.
2 ºannot be shared: Because a biometric property is
an intrinsic property of an individual, it is extremely difficult to
duplicate or share (you cannot give a copy of your face or
your hand to someone!).
2 ºannot be copied: Biometric characteristics are
nearly impossible to forge or spoof, especially with new
technologies ensuring that the biometric being identified is
from a live person.
2 ºannot be lost: A biometric property of an individual
can be lost only in case of serious accident.
|       
    
2 domething you know, e.g. password or PIN. Vhe
issue is that many password are easy to guess, and
can also be easily forgotten.
2 domething you have, e.g. key or car. Vhey can be
lost, stolen or duplicated.
2 domething you know and have, e.g. card + PIN.
2 domething you are, e.g. fingerprint, hand, iris, retina,
voice. You cannot lose them, are unique for each
individual and are difficult to forge.
V   
   


2 Ô   

2   
   

           
  

Identix Inc
Saflink ºorporation
Viisage Technology, Inc.
VeriFinger
FingerTec
   Solution
ΠBiometric Working Group
Ô   
2 http://biometricsystem.ning.com
2 http://www.biometricnewsportal.com
2 http://www.scribd.com
`

You might also like