0% found this document useful (0 votes)
57 views

"Biometrics": Department of Computer Science & Engineering

This document is a report on biometrics submitted by Pratyaksha Srivastava to their professor Dr. A. K. Daniel. It includes an acknowledgement thanking those who helped with the report, an abstract providing an overview of biometrics and issues with biometric security, and likely contained details about iris recognition systems. The report was submitted in partial fulfillment of course requirements for the year 2018-2019.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

"Biometrics": Department of Computer Science & Engineering

This document is a report on biometrics submitted by Pratyaksha Srivastava to their professor Dr. A. K. Daniel. It includes an acknowledgement thanking those who helped with the report, an abstract providing an overview of biometrics and issues with biometric security, and likely contained details about iris recognition systems. The report was submitted in partial fulfillment of course requirements for the year 2018-2019.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

A Report for Seminar

On

“BIOMETRICS”

Submitted by:

Pratyaksha Srivastava
(2016021032)

Under Kind Guidance of:

Dr. A. K. Daniel
Professor
Computer Science & Engineering Department

Department of Computer Science & Engineering


Madan Mohan Malaviya University of Technology
Gorakhpur-273010, India
CERTIFICATE
Certified that Pratyaksha Srivastava (Roll No-2016021061) has presented seminar entitled
“Biometrics” under my supervision during the year 2018-19, in partial fulfilment of
the requirements of semester exam and that the seminar has not formed the basis for the
award previously of any degree, diploma, fellowship or any other similar title.

Signature of the Guide:


Place:
Date:
ACKNOWLEDGEMENT
I express my sincere gratitude to my seminar guide, Mr. A. K. Daniel, Professor
Department of Computer Science & Engineering, for his kind and able guidance for the
completion of the seminar work.
I am grateful to Ms. P. K. Singh, Head of Department of Computer Science &
Engineering for his excellent support during my work.
Thanks to all my classmates for their love and support.
Last, but not least I would like to thank all faculty members of the department of
Computer Science & Engineering for their generous help in various ways for the
completion of this seminar.

Dated: (Pratyaksha Srivastava)


Roll No: 2016021061
Session: 2018-2019
ABSTRACT

Humans recognize each other according to their various characteristics for ages. We
recognize others by their face when we meet them and by their voice as we speak to them.
Identity verification (authentication) in computer systems has been traditionally based on
something that one has (key, magnetic or chip card) or one knows (PIN, password). Things
like keys or cards, however, tend to get stolen or lost and passwords are often forgotten or
disclosed. To achieve more reliable verification or identification we should use something
that really characterizes the given person. Biometrics offer automated methods of identity
verification or identification on the principle of measurable physiological or behavioural
characteristics such as a fingerprint or a voice sample. The characteristics are measurable and
unique. These characteristics should not be duplicable, but it is unfortunately often possible
to create a copy that is accepted by the biometric system as a true sample. In biometric-based
authentication, a legitimate user does not need to remember or carry anything and it is known
to be more reliable than traditional authentication schemes. However, the security of
biometric systems can be undermined in a number of ways. For instance, a biometric
template can be replaced by an impostor's template in a system database or it might be stolen
and replayed. Consequently, the impostor could gain unauthorized access to a place or a
system. Moreover, it has been shown that it is possible to create a physical spoof starting
from standard biometric templates. Hence, securing the biometric templates is vital to
maintain security and integrity of biometric systems. This report actually gives an overview
of what is biometric system and a detail overview of a particular system i.e. iris recognition
system.

You might also like