際際滷

際際滷Share a Scribd company logo
Topic: BIOMETRICS 
Presented By:- 
Ch Ravikumar T.E.ENTC 
Priya N T.E.ENTC
Contents 
1.Defination 
2.Generic Biometric 
System 
3.Types of biometrics 
4.Biometric System 
Vulnerabilities 
5.Security Approaches
Biometrics 
 It is a physiological or behavioral 
characteristic of a human being that can 
distinguish one person from another and 
that theoretically can be used for 
identification or verification of identity. 
Who are you? Prove it.
Generic Biometric System 
Enrollment 
Biometrics 
Sensor 
Identification 
Biometrics 
Sensor 
Template 
Database 
Feature Extractor 
Feature Extractor 
Feature Matcher
Types of biometrics
Face Recognition 
 A face image can be 
acquired using a 
normal, off-the-shelf 
camera 
 Easy to accept by 
the public 
 Cost is rather low
Finger Printing 
 Used in forensics 
more than 
100 years 
 Optical, capacitive 
readers 
 Liveness detection
Finger Printing
Hand Geometry 
Captured using a 
CCD camera, or LED 
Orthographic 
Scanning 
The system is often 
bulky
Eyes:Iris,Retina 
 Extracts features 
from the colored 
tissue surrounding 
the pupil. 
 Monochrome 
camera with visible 
and near infra red 
light 
 Liveness detection
DNA 
 Deoxyribonucliec 
Acid 
 Contains Genetic 
information 
 Differentiated 
using base pairs
Keystrokes 
 No special 
hardware 
Required 
 Transparent 
capture
Voice 
 Speaker recognition uses 
a microphone to record 
the voice 
 Your voice can vary with 
age, illness and 
emotions 
 Interesting with the 
increasing use of mobile 
phones
Biometric System Vulnerabilities 
Biometric 
System 
Vulnerabilities 
Adversary 
Attacks 
Spoofing 
Template 
database 
leakage 
Intrinsic 
Limitations
Intrinsic Limitations 
 False Non- 
Match 
 False match 
 Zero effort 
attack
Adversary Attacks 
 Caused due to 
negligence of 
authorized persons 
 An adversary 
exploiting the 
system security 
using insiders 
 Direct attack on the 
sensors
Spoof Attacks
Template Database leakage 
 Biometric template information becomes 
available to an adversary 
 Easier to recover by using reverse 
engineering
Security Approaches 
 Biometric Feature Transformations 
 Cryptosystems
FUTURE METHODS 
Face recognition through blood vessels
FUTURE METHODS 
Brainwave recognition
Any Questions
Overview on Biometrics by Ch.Ravikumar & Priya N

More Related Content

Overview on Biometrics by Ch.Ravikumar & Priya N