You are on page 1of 18

WELCOME

A SEMINAR ON

BIOMETRICS FOR RECOGNITION

Presentation Outlines
Traditional methods of security
Need for biometrics Biometrics recognition techniques How biometrics work Applications

Needs of Biometrics
ATMs

Cellular phones Smart cards Desktop PCs Workstations Computer networks PINs and passwords may be forgotten, Token-based identification methods such as passports and drivers licenses may be forged, stolen, or lost.

WHAT IS BIOMETRICS ?
BIO- Physical or Behavioral METRICS- To measure characteristics Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics .

Physical biometrics:
Fingerprint Facial recognition Hand geometry Iris scan Voice recognition

Behavioral biometrics:
Speaker/voice recognition: Analyzing vocal behavior Signature/handwriting: Analyzing signature dynamics Keystroke/patterning: Measuring the time spacing of typed words

Biometric sensor:-acquire images .

Preprocessing:- reference points extraction, contour spacing.


Feature extraction:-removal of noise, convert data into numeric feature template. Matcher:- Compare extracted template with previously enrolled templates. - Determine degree of similarity & output matching score. Decision:-matching score compare with threshold.

Iris recognition
Iris scanning measures the iris pattern in the colored part of the eye,

Steps to Facial Recognition


1. Capture image
2. Find face in image

3. Extract features (store template) 4. Compare templates


5. Declare matches

MEMBER I.D. Theft Prevention for Employees and Members

ACCESS Interior and/or Exterior Door Access

EMPLOYEES

TIME Employee Time and Attendance

CENTRAL SERVER AND MANAGER

MEMBERS

TELLER File Cabinet and Drawer Access NON-MEMBERS PASSWORD Password management & Control for Computers,Websites, Application & Corporate Networks

BIOMETRIC DEVICE FINGERPRINT


Finger

Print is not easily borrowed, lost stolen forgotten guessed.

BIOMETRIC FINGER SCANNERS


It consists of o A reader or scanning device o Software that converts the scanned information into Digital form and compares match points o A Database that stores the Biometric data for comparison

APPLICATIONS
Prevent unauthorized access to ATMs, Cellular phones, Smart cards, Desktop PCs, Workstations, Computer network. Criminal identification, prison security. In automobiles biometrics can replace keys with keyless entry devices. Airport security, voter cards, civilian applications.

CONCLUSION
Technology is growing rapidly, but at the same time security breaches and transaction frauds are also in the increase world over. All agencies including Libraries who are in need of security, surveillance and safety have to adopt biometrics.

Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past.

Let us hope for a safe and secure future!

REFERENCES
International Biometric Group website, http://www.biometricgroup.com www.google.com www.wikipedia.com

You might also like