a study on biometric authentication techniques

32
Preparedd By Subhash Basishtha Saptarshi Boruah M.Tech Scholar. BIOMETRIC AUTHENTICATION TECHNIQUES

Upload: subhash-basistha

Post on 06-May-2015

6.980 views

Category:

Technology


1 download

DESCRIPTION

This Slide will describe briefly 5 different Biometric Techniques and compare them.

TRANSCRIPT

Page 1: A study on biometric authentication techniques

Preparedd BySubhash BasishthaSaptarshi BoruahM.Tech Scholar.

BIOMETRIC AUTHENTICATION TECHNIQUES

Page 2: A study on biometric authentication techniques

Presentation outlines What is Authentication ? Types of Authentication What is Biometric? Why Biometric? Characteristics of Biometric Mode of Biometric system Working of Biometrics System Different Biometric techniques Comparison Between Different Techniques Performance Metrics Applications of Biometric Authentication Limitations of Biometric System Conclusion References

Page 3: A study on biometric authentication techniques

What is Authentication

Authentication is the act of confirming something what it claims to be.

It is the process of giving someone identity so that he or she can access that particular application or data.

For e.g.: giving identity-card to a student of an institute.

Page 4: A study on biometric authentication techniques

Main types of authentication

By using passwords, PIN

By using smart card or swipe card

By using Biometric

Page 5: A study on biometric authentication techniques

What Is Biometric ?

Biometric is a combination of two Greek words Bio(Life) and Metric(To Measure).

It actually measures and analyzes the biological traits of a human being.

Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical characteristics.

Page 6: A study on biometric authentication techniques

Contd..

Biometric based authentication systems are able to provide high security against confidential financial transactions and personal data privacy.

“something that you are”

Page 7: A study on biometric authentication techniques

Why Biometric?

Identity theft is not possible password remembrance problem does

not exist Cannot be predicted or hacked Cannot be shared Perceived as more secure

Page 8: A study on biometric authentication techniques

Characteristics of BiometricAutomated method of recognizing an individual is

based on two main characteristics :

Physical characteristics are related to physical shape of the body. For e.g.: fingerprint ,face recognition, hand geometry, iris recognition etc.

Behavioral characteristics are related to the behavior of a person. For e.g.: voice pitch, speaking style, typing rhythm, signature etc.

Page 9: A study on biometric authentication techniques

Biometric Technique Classification

[3]

Page 10: A study on biometric authentication techniques

Mode of Biometric SystemIdentification One-to-many comparison It search for a sample against a database of templates It identifies an unknown individual. For e.g.: who is “x”?

Verification One-to-one comparison It compares a sample against a single stored template It verifies that the individual is who he claims to be For e.g.: is this “x”?

Page 11: A study on biometric authentication techniques

Working of biometric system

Steps: Capturing Pre-processing Feature extraction Template matching Matcher/Comparison Application Device

[3]

Page 12: A study on biometric authentication techniques

Working process

Enrollment: In this stage, the information captured from the subject by the sensing device is stored in a database for later comparison. When someone uses biometric for the first time then the stage is called enrollment.

Page 13: A study on biometric authentication techniques

Contd…

Authentication: In this stage, the registered biometric sample during the enrollment process are matched against newly capturing biometric sample.

Page 14: A study on biometric authentication techniques

Biometric devices consist of

A scanning device A software which converts scanned

information into digital forms and compares on some matching points

A database that stores biometric features for further comparison

Page 15: A study on biometric authentication techniques

Different biometric technique

Fingerprint technology: It is the oldest and most widely used

method. It needs a fingerprint reader. Registered points are located and compared. Optical sensors are used for scanning

purpose. It can be used for many applications like pc

login security, voting system, attendance system etc.

[12]

Page 16: A study on biometric authentication techniques

Contd.. Uses the ridge endings and bifurcation's on a

persons finger to plot points known as Minutiae The number and locations of the minutiae vary

from finger to finger in any particular person, and from person to person for any particular finger

Finger Image + MinutiaeFinger Image Minutiae

Page 17: A study on biometric authentication techniques

Face recognition technology: Face Recognition is a biometric technique for

automatic identification or verification of a person from a digital image.

These include the position/size/shape of the eyes, nose, cheekbones and jaw line.

Contd..

Page 18: A study on biometric authentication techniques

Iris Recognition Technology: It measures the iris pattern of the eye i.e.

the colored part of the eye that surrounds the pupil.

The iris canner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.

Iris pattern is not changed over years or by glasses, contact lens

Contd..

Page 19: A study on biometric authentication techniques

Hand Geometry Technology This method uses hand images for person

identification or verification. Person identification using hand geometry

utilizes hand images to extract a number of features such as finger length, width, thickness, finger area etc.

Measures the digits of the hand and compares to those collected at the time of enrollment.

Contd..

Page 20: A study on biometric authentication techniques

Places hand on the system, which takes the three dimensional image of the hand.

Contd..

[6]

Page 21: A study on biometric authentication techniques

Speaker recognition technology: Voice Recognition or Speaker Recognition is a

biometric process of validating a user's claimed identity using characteristics extracted from their voices.

It uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes.

A telephone or microphone can act as a sensor.

Contd..

Page 22: A study on biometric authentication techniques

During the enrollment phase, the spoken words are converted from analog to digital format, and the distinctive vocal characteristics such as pitch, frequency, and tone, are extracted, and a speaker model is established.

A template is then generated and stored for future comparisons.

Speaker recognition is often used where voice is the only available biometric identifier, such as telephone.

Contd..

Page 23: A study on biometric authentication techniques

Comparison Between Different Technique

[3]

Page 24: A study on biometric authentication techniques

Performance Metrics

FAR(False Acceptance Rate) : It is a measure of the percent of invalid inputs that are incorrectly accepted.

FRR(False Reject Rate) : It is a measure of the percent of valid inputs that are incorrectly rejected.

CER(Crossover Error Rate) : The rate at which both the accept and reject errors are equal.

- a lower value of the CER is more accurate for Biometric System.

Page 25: A study on biometric authentication techniques

Performance Metrics Curve

[4]

Page 26: A study on biometric authentication techniques

Applications of Biometric System

Criminal identification Internet banking Attendance system Airport, Bank security PC login security Prevents unauthorized access to private

data Financial transaction management

Page 27: A study on biometric authentication techniques

Limitations of Biometric System

Presence of noise in the sensed data Variations in the enrolled data Non-universality It is an expensive security solution

Page 28: A study on biometric authentication techniques

Conclusion

The development of e-commerce or e-government sites can be achieved through the utilization of this strong authentication process.

The greatest strength of the biometric system is that they does not change over time so it is much more efficient than other traditional security mechanism.

Page 29: A study on biometric authentication techniques

REFERENCES1. Emanuele Maiorana, Chiara Ercole, Secure

Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography.

2. Fernando L. Podio and Jeffrey S. Dunn.Biometric Authentication Technology: From the Movies to Your Desktop.

3. Fahad Al-harby, Rami Qahwaji, and Mumtaz Kamala. Secure Biometrics Authentication: A brief review of the Literature.

4. Dr. NatarajanMeghanathan. Biometrics for Information Security.

Page 30: A study on biometric authentication techniques

REFERENCES5. Anil K. Jain, AjayKumar,

Biometrics of Next Generation: An Overview. SPRINGER, 2010.

6. Debnath Bhattacharyya, Rahul Ranjan, Farkhod Alisherov A.,and Minkyu Choi. Biometric Authentication: A Review, International Journal of u- and e- Service, Science and Technology ,Vol. 2, No. 3, September, 2009.

7. Dr. JK Schneider. BIOMETRICS, SMARTPHONES AND THE E-WALLET.2011.

8. Zdenek Ríha, Václav Matyáš. Biometric Authentication Systems. FIMU Report Series.

Page 31: A study on biometric authentication techniques

REFERENCES9. Phalguni Gupta, Ajita Rattani, Hunny Mehrotra,

Anil Kumar Kaushik. Multimodal Biometrics System for Efficient Human Recognition.

10. Debnath Bhattacharyya,Rahul Ranjan,Poulami Das,Tai Hoon Kim, Samir Kumar Bandyopadhyay, Biometric Authentication Technique and Its Future probabilities. IEEE Trans Int. conf. On Computer and Electrical Engineering,pp. 652-655, 2009.

11. A. K. Jain, A. Ross and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125 –143, June 2006.

12. http://en.wikipedia.org/wiki/Biometric_authentication

Page 32: A study on biometric authentication techniques