biometrics authentication technology submitted by: navin kumar 09eaxec075
TRANSCRIPT
![Page 1: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/1.jpg)
Biometrics Authentication Technology
![Page 2: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/2.jpg)
• Something you know, like a password, PIN, or code.
• Something you have, like a swipe card, smart card, token, or key.
• Something you are, which is biometrics.
Three main types of authentication available today are:
![Page 3: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/3.jpg)
What is a biometric?
Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioural characteristic.
Most definitive, real-time tool available today.
Can be combined with other tools to form more secure, easier to use verification solutions.
Recognizes individuals definitively.
![Page 4: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/4.jpg)
Characteristics
The common Physical characteristics are:
Fingerprint Face Retina Iris Vein pattern Hand and finger geometry
![Page 5: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/5.jpg)
Characteristics
Behavioral characteristics are:
Keystroke dynamics
Voice
Gait
Signature dynamics
![Page 6: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/6.jpg)
![Page 7: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/7.jpg)
Biometrics Process
No
Yes
BiometricData Collection
TransmissionQuality
Sufficient?
Yes
Template Match
Signal Processing, Feature Extraction,
Representation
Database
Generate Template
DecisionConfidence?
new biometric sample is requested. No
![Page 8: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/8.jpg)
Database
Fingerprint Recognition steps:
![Page 9: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/9.jpg)
Face recognition process:
Database
Input face image
Extraction of face image
Extraction of face features
Positive
Negative
![Page 10: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/10.jpg)
Iris Identification Steps:
Database
Input of face image
Detection of eye regions
Put iris in focusRecognition of
iris pattern
Accept
Reject
![Page 11: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/11.jpg)
Vein Recognition System:
Database
Input of palm picture
The output picture
Generate veins structure
Match
Not match
![Page 12: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/12.jpg)
the angle at which the pen is held,
the number of times the pen is lifted,
the time it takes to write the entire signature,
the pressure exerted by the person while signing,
the variations in the speed with which different parts of the signature are written.
Signature Verification Process
Biometric trait
![Page 13: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/13.jpg)
13
Aadhaar
One-time standardized Aadhaar enrollment establishes uniqueness of resident via ‘biometric de-duplication’
• Only one Aadhaar number per eligible individual
Online Authentication is provided by UIDAI• Demographic Data (Name, Address, DOB, Gender)• Biometric Data (Fingerprint, Iris, Face)
Aadhaar :subject to online authentication is proof of ID
Aadhaar enrollment / Update = KYC
Aadhaar No. Issued, stored in Auth. Server
“Verification” of KYC (Authentication)
![Page 14: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/14.jpg)
Applications Area of Biometric
![Page 15: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/15.jpg)
Advantages of biometrics
![Page 16: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/16.jpg)
Disadvantages of Biometrics
![Page 17: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/17.jpg)
Conclusion
![Page 18: Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075](https://reader035.vdocuments.net/reader035/viewer/2022062517/56649f265503460f94c3cee3/html5/thumbnails/18.jpg)