· web viewin 2000, expenditures for biometric authentication system reached $66 million...

39
Page 1 www.engineeringminiprojects.com ELECTRONICS ENGINEERING www.electronicsengineerigprojects.com www.electronicsengineerigprojects.com www.engineeringminiprojects.com www.seminartopicsforcomputerscience.com www.seminartopicsforcomputerscience.com [email protected] www.seminartopicsforcomputerscience.com www.seminartopicsforcomputerscience.com SEMINAR TOPICS-PROJECTS-PAPER PRESENTATIONS BIOTRONICS

Upload: others

Post on 10-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 1

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

BIOTRONICS

Page 2:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 2

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

ABSTRACT

This paper deals with the basics of iris, its properties and how it adds some

advantageous features to recognize the correct person. In this paper we

discuss the details regarding the information about how the scanner scans

the whole pattern of the iris while enrolling and matching and how the

scanned patterns are converted into 256 bytes of data, so that it can be

stored in the database. We compare the iris codes of the current person

who want access the database and give the matched results to the user

accordingly.

As the iris recognition technology produces very low false rate

when compared to the other biometrics results, it is very preferable in

many systems such as airports, banks, defence, etc., where the security

plays one of the major role. But there may be chance of loss in the data-

level security because of the possibility of hacking the data from the

database.

The implementation of en-decry-matching algorithm gives the

security to the data so that no one can hack the data. As we have used

hand geometry for verifying the identified person, it adds the security to

the whole system. Comparison of iris recognition with other existing

Page 3:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 3

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

biometric technologies is also made. Finally this paper contains the

applications of the combined features of the recognition of iris.

Keywords: Iris, Scanner, en-decry matching algorithm, database,

data-hacking.

Biometrics – An Introduction:Biometrics refers to the automated methods of recognizing a

person based on a physiological or behavioral characteristic. Physical

biometrics includes fingerprints, hand or palm geometry, and retina, iris,

or facial characteristics. Behavioral characteristics are traits that are

learned or acquired which includes signatures, voice of a particular person.

Keeping these characteristics as constraints, many biometric technologies

have been developed and are used to verify or identify users to allow

access to a variety of environments. From ATMs to logging into a network

or your personal Computer, biometrics is being used throughout the world.

Cost Analysis: In 2000, expenditures for biometric authentication system

reached $66 million Worldwide. The forecast through 2006 is for an

overall annual growth of 54%, attaining market levels near $900 million.

Page 4:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 4

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

Total Biometric Revenues in million dollars

Page 5:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 5

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

An Overview of Existing Biometrics

Technologies: All biometrics consists of three basic elements: enrollment,

templates, and Matching. Each technology uses these elements but in their

own unique way.

Page 6:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 6

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

Enrollment – the process where a user enrolls in the

biometric system by giving a sample of their biometric(s) which

can be processed and stored for later use.

Template – a file derived from the features of a user’s

biometric sample which can be used to perform biometric

matches.

Matching – Process of comparing current user’s image with

a stored one in the data base.

BIOMETRIC SYSTEMSThe determination, measuring, and codification of the unique

characteristic traits that each of us is born with is known as the science of

biometrics. Various forms of computer-based biometrics for personal

authentication have been around for the past twenty years, but not until

recently have some reached maturity and a quality/reliability that has

enabled their widespread application. Retinal, iris and fingerprint

recognition are mature technologies with the most reliable performance.

Of the three methods, iris recognition is the least intrusive with greater

accuracy.

In addition to reliable performance some of the other advantages

of using biometrics are:

Page 7:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 7

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

1. High Security: It is based on physical characteristics,

which cannot be lost or stolen.

2. Universality: Every person has this specific iris

property, so users need not worry about someone using their

identity

3. Ease of administration: The problems of handling

forgotten PIN/password and lost/stolen keys or access cards are

eliminated; the benefit is a lot of time and resources saved.

IDENTIFICATION USING IRIS

RECOGNITION

Iris recognition is one of the biometric systems, which utilize iris

patterns as a method of gathering unique information about an individual.

It is considered to be one of the most reliable biometrics with some of the

lowest false rejection and false acceptance rates and so it is less intrusive.

IRIS:Iris is the colored portion of the eye that lies behind cornea and is

protected by eye lid. It is approximately 11mm (.433 inches) in diameter

and consists of several layers and distinct features such as furrows, ridges,

coronas, crypts, rings which controls the amount of light that enters into

the eye. Various shades of iris are brown, blue and green, but these colors

Page 8:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 8

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

are not used in identification technology. No two irises are alike even for

identical twins.

SHOWING AN IRIS PATTERN IMAGED

PROPERTIES:Glasses and contact lenses do not interfere with the identification

process. The iris is the only internal organ visible externally. In addition,

recent medical advances such as refractive surgery; cataract surgery and

cornea transplants do not change the iris’s characteristics. In fact, it is

impossible to modify the iris without risking for blindness. And even a

blind person can go for a scan. As long as a sightless eye has as iris, that

eye can be identified by iris recognition.

Page 9:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 9

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

BLUE SHADED IRIS

By the time a human is about eight months old, the iris structures are

complete, and they do not change in later life. Its physiological

characteristics combined with the fact that those characteristics are

exhibited with so much variation over the population, make the iris a

prime candidate for use in identity.

IMPLEMENTING IRIS RECOGNITION:The implementation of iris recognition involves three processes

such as

Scanning an image

Page 10:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 10

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

Iris code creation and Enrollment

Verification and Identification

SCANNING AN IRIS IMAGE: Iris image must be captured by CCD camera. The camera such as

CCD having a high resolution can be set at a distance of five inches (10

centimeters) to 40 inches (one meter) from user’s eye, depending on the

scanning environment. The user should look at LED guide to ensure that

the camera focuses on the iris.

INTERIOR VIEW OF IRIS

Page 11:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 11

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

IRIS CODE CREATION AND ENROLLMENT:

An Iris Code is created by encoding the variable structures of the

iris. Using Cameras to record the image, the inner and outer boundaries of

the iris are first determined, taking into account the contours of the eyelid

and discounting eyelashes, reflections and contact lens boundaries. Then

the patterns are encoded using 2D Gabor wavelet. 2048 bits of data plus

2048 masking bits are used to produce a 512-byte iris code. About 250

degrees of freedom or independent dimensions of variability are

represented in the Iris Code. In order to enroll a person for future

identification, the Iris Code is stored in a database.

VERIFICATION AND IDENTIFICATION:Iris recognition technology can be used for both positive and

negative

identification. Iris recognition process for verification and

identification involves

comparing of Iris Codes by performing Boolean XOR

operations and computing a

function called the Hamming Distance, which is a measure

of dissimilarity between any two irises.

The Hamming Distance can be computed with

extreme speed because of the way computers handle Boolean

Page 12:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 12

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

operations and the fact that the operations can be performed in

parallel. It would only take 1.7 seconds to compare one

million Iris Codes on a 2.2GHz computer. This level of

performance makes iris recognition technology feasible for

very large-scale applications where millions of Iris Codes can

be compared using multiprocessing techniques.

IRIS SCANNING:

Page 13:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 13

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

SHOWING EYE TO IRIS SCANNER

In order to verify that a person is who he or she

claims to be, a camera image is taken again , a new Iris Code

is generated, and a comparison is made between the Iris Code

just created and Iris Code in a database. The recognition

phase includes the Hamming Distance calculation and the

XOR comparison.

COMPARISON OF IRIS RECOGNITION

OVER OTHER BIOMETRIC TECHNOLOGY:

Page 14:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 14

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

The iris recognition is compared to other existing

technology and suitability of iris recognition as a current trend

is proved.

Fingerprint identification:

External factors can cause errors in fingerprinting.

Fingerprints can be affected by dirt, dryness and scarring.

There are some health related advantages of iris recognition

over fingerprinting. Fingerprinting requires physically

touching a device each time the finger is presented for

verification. In contrast, the iris template is created without

any physical contact with the person whose iris is encoded.

The iris recognition process is, therefore, more

appealing to those concerned with hygiene than is

fingerprinting. Forgery is not as much of a risk with iris

recognition as with fingerprinting. Although sophisticated

fingerprinting technology is designed to detect false fingers, a

person’s finger can be cut off or used for a mold much easier

Page 15:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 15

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

than an eyeball could be extracted and used for

impersonation. In fact, the iris from a person’s

extracted eye would not be usable for more than a few

seconds. Iris recognition devices can also detect the dilating

pupil to ensure that the eye is alive.

Fingerprint matching technique can be placed

into two categories: Minutiae based and correlation based. Minutiae

based technique first find minutiae point and then map their

relative placement on the finger.

Page 16:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 16

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

Page 17:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 17

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

Correlation based technique require the precise location of a

registration point and are affected by image translation and

rotation.

HAND GEOMENTRY: It is not as accurate as either iris recognition

scanning. The error rate for hand geometry is 1 in 500

compared to 1 in 131,000 for iris recognition. Another

drawback of hand geometry technology is that it is relatively

easy to produce a false negative, since hand features are not

Page 18:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 18

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

distinctive. Therefore, the technology is not well suited for

identification. It should work well enough for verification as

long as the device can recognize a fake hand. Unlike the iris,

hand characteristics could change over time due to scars and

growth patterns. Hand geometry has the same hygiene issue

as fingerprinting.

To register in a hand-scan system a hand is placed on

a reader’s covered flat surface. Five guides or pins that

correctly situate the hand for the camera position this

placement. A succession of cameras captures 3-D pictures of

the sides and back of the hand. The hand-scan device can

process the 3-D images in 5 seconds or less and the hand

verification usually takes less than 1 second. The image

capturing and verification software and hardware can easily

be integrated within standalone units.

Page 19:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 19

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

SHOWING THE HAND SCANNER

VOICE RECOGNITION:

With an error rate of 1 in 50, speaker recognition is

much less accurate than iris recognition. False negatives are

easy to produce, and the errors can occur due to noise and

colds. Speaker recognition could be used to verify a person’s

Page 20:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 20

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

identity, comparing to a previously stored template for a

person, but is not recommended for identification. Iris

recognition is recommended for both verification and

identification.

ADVANTAGE OF IRIS RECOGNITION:As the morph genesis of the iris that occurred during the

month of seven remain stable throughout life it never changes

with the time.

1. Uniqueness will be maintained between even the

multi-birth children and so it is very difficult to

forge.

2. There will be no effect on our eyes since there is

no direct contact.

3. The accurateness of the scanning technology is

great with error rates being very low.

4. Scalability and speed is high when compared to

other systems.

Page 21:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 21

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

OUR IMPLEMENTATION TO HAVE ADDED

SECURITY: In ordinary database system, there is a chance of hacking

the database from the stored system by some hackers. So in

order to prevent this hacking, we have given some added

security to the database by encrypting the stored bits in to a

new bit feature. Hence the data level security is increased

further. Now we are working to develop an algorithm for it.

This helps the data to be hided from others.

EMERGING BIOMETRIC TECHNOLOGIES: Biometrics is not limited to the four technologies. There

continues to be expansion of the current technology and

exploration and innovation into additional biometric security

solutions. Nail bed identification and finger geometry is

building on existing fingerprint technology. Advancements

insecurity technologies have also made such identifiers as ear

shape, odor, veinscan, and gait recognition possible means of

authentication. Although it has been at the forefront in

personal identification, DNA matching has continued to

improve and become more readily accepted.

Page 22:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 22

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

The following is a list of newer biometric

technologies and how they are obtained.

DNA – Similar to a genetic fingerprint

Ear Shape - Geometry of one's ear (shape, size,

curves)

Odor – Human scent of one’s hand

Finger geometry – Shape and structure of finger or

fingers

Today’s Uses of Biometrics:

Biometric technologies are being used in a variety of

different ways all over the world. The following are a few

examples:

Airports use facial scanning to recognize employees

and also to try to

identify known terrorists and/or criminals.

Border crossing checkpoints use facial scanning to

recognize know

Page 23:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 23

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

Criminals before they enter a different country.

Airports use iris scanning to allow employees to

enter and exit secured areas.

Banks with Automatic Teller Machines (ATMs) use

secured Personal

Identification Numbers (PIN) and are using iris

scanning to identify and

verify their customers.

Government military sites use iris scanning for

highly sensitive

restrictive areas.

Financial institutions, corporations, and government

agencies use

Telephony applications for voice recognition to

account information, service

calls, and house arrests.

Page 24:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 24

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

Individuals may use cashless vending to prevent

unauthorized uses of

their credit cards. Individuals swipe their credit card

then touch a

fingerprint reader, which then verifies the identity.

CONCLUSION:

Password, tokens cards and PIN are all risks to the security of originations due to human nature. Our inability to remember complex passwords and tendency to write these down along with losing token cards or forgetting PIN all contribute to the possible breakdown in security for an organization.

The uniqueness of the iris and low probability of a false acceptance or false rejection all contribute to the benefits of using iris recognition technology.

It provides an accurate and secure method of authenticating users onto company systems, is a non-intrusive method and has the speed required to minimize user frustration when accessing company systems.

Page 25:  · Web viewIn 2000, expenditures for biometric authentication system reached $66 million Worldwide. The forecast through 2006 is for an overall annual growth of 54%, attaining market

Page 25

www.engineeringminiprojects.com

ELECTRONICS ENGINEERINGwww.electronicsengineerigprojects.comwww.electronicsengineerigprojects.comwww.engineeringminiprojects.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comEmail-.engineeringprojectsonline@gmail.com

www.seminartopicsforcomputerscience.comwww.seminartopicsforcomputerscience.comSEMINAR TOPICS-PROJECTS-PAPER

PRESENTATIONS

Users no longer have to worry about remembering passwords and system administrators no longer need to worry about the never-ending problem of users disclosing passwords or having weak passwords that are easily cracked.

As according to our implementation there is also a data-level security so that than the designer no one can use it illegally.

REFERENCES:

“An Introduction to Biometrics.” Biometric Consortium.

www.biometrics.org/html/introduction.html

www.biometricsinfo.org/biometrics/html www.findbiometrics.com/Pages /feature%20articles/anatomy/html.