Biometric System
Biometric System
My Presentation
Introduction
History
Working Process
Technologies
Advantages And Disadvantages
Conclusion
INTRODUCTION
Biometric system is defined as an
automated methods of identifying or
authenticating the identity of a living
person based on a physiological or
behavioral characteristics.
Biometrics is the science and
technology of measuring and
analyzing biological data. In
information technology,
biometrics refers to technologies
that measure and analyze human body
characteristics, such as DNA,
fingerprints, eye retinas and
irises, voice patterns, facial
patterns and hand measurements,
for authentication purposes.
H
I
ST
O
R
Y
The first known example of biometrics in practice was a
form of finger printing being used in China in the 14th
century by Joao de Barros.
Bertillonage a method of bodily measurement was used
by police authorities.
The police then used finger printing, which was developed
by Richard Edward Henry of Scotland Yard.
BIOMETRICS
is derived from the Greek words bio(life) and
metric(to measure).
WORKING PROCESS
The selection of a particular biometric for use in a
specific application involves a weighing of
several factors :
Universality describes how commonly a biometric is found in each individual
Uniqueness how well the biometric separates one individual from another
Permanence measures how well a biometric resists aging
Collectability ease of acquisition or measurement of the trait
Performance accuracy , speed and robustness of technology used
Acceptability how well relevant population accept the technology
Circumvention ease with which a trait might be imitated using an artifact
BIOMETRIC SYSTEM
Identification System
Verification System
Verification System- OnetoOne:Biometricscanalso
beusedtoverifyaperson'sidentity.Forexample,onecan
grantphysicalaccesstoasecureareainabuildingby
usingfingerscansorcangrantaccesstoabankaccount
atanATMbyusingretinalscan.
Identification System- OnetoMany:Biometricscan
beusedtodetermineaperson'sidentityevenwithouthis
knowledgeorconsent.Forexample,scanningacrowdwith
acameraandusingfacerecognitiontechnology,onecan
determinematchesagainstaknowndatabase.
Biometric systems can seem complicated, but
they all use the same three steps:
Enrollment: The first time you use a biometric system, it
records basic information about you, like your name or an
identification number. It then captures an image or recording of
your specific trait.
Storage: Contrary to what you may see in movies, most systems
don't store the complete image or recording. They instead
analyze your trait and translate it into a code or graph. Some
systems also record this data onto a smart card that you carry
with you.
Comparison: The next time you use the system, it compares
the trait you present to the information on file. Then, it either
accepts or rejects that you are who you claim to be.
Systems also use the same three components:
A sensor that detects the characteristic being used for
identification.
A computer that reads and stores the information.
Software that analyzes the characteristic, translates it
into a graph or code and performs the actual
comparisons.
Multi-modal biometric system
Multimodal biometric systems are those that
utilize more than one physiological or
behavioral characteristic for enrollment,
verification, or identification.Multi-modal
biometric systems are looked to as a means of:
Reducing false non-match and false match
rates
Providing a secondary means of enrollment,
verification, and identification if
sufficient data cannot be acquired from a
given biometric sample
Combating attempts to fool biometric systems
through fraudulent data sources such as fake
fingers
TECHNOLOGIES
Various Biometrics Technologies
Biometric Machines
Advantages and
Dis-advantages
Current, Emerging And Future
Applications Of Biometrics
Indias national ID Program [ Aadhar ]
Biometrics based on brain and heart signals
have emerged
Proposal calls for biometric authentication to
certain public networks
Issues and Concern
Privacy and discrimination- data obtained during biometric
enrollment may be used in ways for which the enrolled individual has not
consented
Dangers to owner of secured items- When thieves cannot get
access to secure properties, there is a chance that the thieves will stalk and
assault the property owner to gain access
Cancelable biometrics- If someone's face is compromised from a
database, they cannot cancel or reissue it
Soft biometrics- traits such as height,odour,colour etc. are low in
identification performance capability
International sharing of biometric data- Many countries,
including the United States, are planning to share biometric data with other
nations.
Governments are unlikely to disclose full
capabilities of biometric deployment- Certain members of
the civilian community are worried about how biometric data is used but full
disclosure may not be forthcoming
CONCLUSI ON
Conclusion on Biometric & Workforce Management
->Despite widespread use, confusion and misconceptions about the
technology and its capabilities persist. These concerns are easily dispelled
when the facts about biometrics are established.
-> Biometrics offers unparalleled ability to quickly and accurately capture real-
time, labour data and provide a non-repudiated audit trail.
-> Biometrics has undergone intense scrutiny and the results are in - when
properly deployed, biometrics work well and are safe, secure, and accurate.
-> Biometrics offers organizations a broader range of direct and indirect time,
cost, and operational benefits than alternative time and attendance methods
->Today over one hundred thousand thriving organizations rely on Easy
Clockings time & attendance systems to automate their employee
attendance and as a result they are seeing a significant reduction in direct
and indirect labour costs.
A project by
Mercy and Priyanshi