bm - Applebuz.com

brasscoffeeΤεχνίτη Νοημοσύνη και Ρομποτική

17 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

84 εμφανίσεις

BIOMETRICS

11/17/2013

1

www.applebuz.com

CONTENTS


Introduction.


Security And Authentication.


Methods Of Verification.


Identification.


Verification.


Advantages.


Limitations.


Conclusion.


11/17/2013

2

www.applebuz.com

Introduction




“Biometrics” is an advances technology for
superb security and authentication.

The term “Bio” means biological study and

“metrics” means measurement.


11/17/2013

3

www.applebuz.com

There are Two security
methodologies In Biometrics.



Token Based Security .



Secret Based Security.

11/17/2013

4

www.applebuz.com

Security And Authentication


Permissions.


Permission Hierarchy.


11/17/2013

5

www.applebuz.com

Permission Hierarchy

System administrator

Database Owners

Database Object Owners

Database Users

11/17/2013

6

www.applebuz.com

Methods Of Verification




PSYCHOLOGICAL VERIFICATION .


BEHAVOURAL VERIFICATION.

11/17/2013

7

www.applebuz.com

Psychological Verification




Psychological Verification involves in the
verification of the organs of the human
being, which will have unique identification
and does not match with others.

11/17/2013

8

www.applebuz.com

Types Of Psychological Verification



Finger print.


Hand Print.


Face Measurement.


Retinal Scan.


DNA analysis.



11/17/2013

9

www.applebuz.com

Finger Print

It involves the user placing his
finger over a glass
-
plate,which
resides over a high resolution
camera ,which uses optical or
electromagnetic means to take its
snapshot.

11/17/2013

10

www.applebuz.com

11/17/2013

11

www.applebuz.com

Hand Print

It compares a 3D image of the
users hand to that present in the
system database.It is similar to
the finger print verification.

11/17/2013

12

www.applebuz.com

Face Measurement

This technique enables the
computer to use your face as your
password and matching these to
an existing database.

11/17/2013

13

www.applebuz.com

11/17/2013

14

www.applebuz.com

Retinal Scan

The retina is an internal part of the
eye located at the back of the eye
and is get of thin nerve which
sense the light coming through a
camera ,pupil eye lenses.

11/17/2013

15

www.applebuz.com

11/17/2013

16

www.applebuz.com

DNA analysis

It is used to identify people who
are died, to find out the
relationship like identifying child's
natural parents

11/17/2013

17

www.applebuz.com

Behavioral Verification


This involves in oral thing done by the
individual .


There are three types of behavioral
verification.


Typing


Signature


Voice

11/17/2013

18

www.applebuz.com

Typing

Some systems measure things
you do in addition to the things

you are, you will notice that your
typing has a certain pattern. Some
letters follow others in quick
succession, while others take
longer.




11/17/2013

19

www.applebuz.com


Signature

Some qualities looked into include
acceleration rates, direction, and
pressure and stroke length. Here
mainly concentrate on pressures.
This pressure stored in back end
for future signification.


11/17/2013

20

www.applebuz.com


Voice

It involves in the recognition of the
voice of the individual.


11/17/2013

21

www.applebuz.com

Mixed form Biometrics

Some times use more than one

form biometrics. This mixed form
provide more security. Here
combine more than one type. Even
80% equals with database then
access provide to user.


11/17/2013

22

www.applebuz.com

11/17/2013

23

www.applebuz.com


Identification


It is a process of recognition and
involves taking the biometrics data
and searching for the match in the
database asking it a slow process
that it is more prone to errors.


-
>Authentication

-
>FAR

-
>FRR


11/17/2013

24

www.applebuz.com

Advantages


It provides good security mechanism than
other security methods.


It never fails in security constraints.


In public locations such as banks and
airports a large number of people transit
every day including known criminals. Face
recognition system attached to video
surveillance systems are supposed to help
catch them.

11/17/2013

25

www.applebuz.com


Limitations


It needs high memory space in the back
end.


Collect data for security is difficult.


Some times fails the security with right
users.


Any time data loose in database high
effect for security mechanisms.


So many requirements are needed for
provide this technology


it highly expensive.

11/17/2013

26

www.applebuz.com


Conclusion

Security is not just about putting
big locks on the front door; it also
involves making sure all the
windows are shut. Each one can
be individually fooled , but the
comparison makes the system
more secure as a whole.
Biometrics are have its own
advantages and disadvantages.it
high expensive but it provides
high security.

11/17/2013

27

www.applebuz.com