Authentication and Authorization using Biometric Device
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar projects crazy
Active In SP

Posts: 604
Joined: Dec 2008
27-01-2009, 11:07 AM

Biometric recognition refers to the use of distinctive physiological (e.g., fingerprints, face, retina, iris) and behavioral (e.g., gait, signature) characteristics, called biometric identifiers (or simply biometrics) for automatically recognizing individuals. Perhaps all biometric identifiers are a combination of physiological and behavioral characteristics and they should not be exclusively classified into either physiological or behavioral characteristics. For example, fingerprints may be physiological in nature but the usage of the input device (e.g., how a user presents a finger to the fingerprint scanner) depends on the person?s behavior. Thus, the input to the recognition engine is a combination of physiological and behavioral characteristics. Similarly, speech is partly determined by the biological structure that produces speech in an individual and partly by the way a person speaks. Often, a similarity can be noticed among parent, children, and siblings in their voice, gait, and even signature. The same argument applies to the face: faces of identical twins may be extremely similar at birth but during development, the faces change based on the person?s behavior (e.g., lifestyle differences leading to a difference in bodyweight, etc.).

A biometric system is essentially a pattern recognition system that recognizes a person by determining the authenticity of a specific physiological and/or behavioral characteristic possessed by that person. An important issue in designing a practical biometric system is to determine how an individual is recognized. Depending on the application context, a biometric system may be called either a verification system or an identification system:

? A verification system authenticates a person?s identity by comparing the captured biometric characteristic with her own biometric template(s) pre-stored in the system. It conducts one-to-one comparison to determine whether the identity claimed by the individual is true. A verification system either rejects or accepts the submitted claim of identity (Am I whom I claim I am?);

? An identification system recognizes an individual by searching the entire template database for a match. It conducts one-to-many comparisons to establish the identity of the individual. In an identification system, the system establishes a subject?s identity (or fails if the subject is not enrolled in the system database) without the subject having to claim an identity (Who am I?).
The term authentication is also frequently used in the biometric field, sometimes as a synonym for verification; actually, in the information technology language, authenticating a user means to let the system know the user identity regardless of the mode (verification or identification).

Throughout this book we use the generic term recognition where we are not interested in distinguishing between verification and identification.

The block diagrams of a verification system and an identification system are depicted in Figure 1.1; user enrollment, which is common to both tasks is also graphically illustrated. The enrollment module is responsible for registering individuals in the biometric system database (system DB). During the enrollment phase, the biometric characteristic of an individual is first scanned by a biometric reader to produce a raw digital representation of the characteristic. A quality check is generally performed to ensure that the acquired sample can be reliably processed by successive stages. In order to facilitate matching, the raw digital representation is usually further processed by a feature extractor to generate a compact but expressive representation, called a template. Depending on the application, the template may be stored in the central database of the biometric system or be recorded on a magnetic card or smartcard issued to the individual. The verification task is responsible for verifying individuals at the point of access. During the operation phase, the user?s name or PIN (Personal Identification Number) is entered through a keyboard (or a keypad); the biometric reader captures the characteristic of the individual to be recognized and converts it to a digital format, which is further processed by the feature extractor to produce a compact digital representation. The resulting representation is fed to the feature matcher, which compares it against the template of a single user (retrieved from the system DB based on the user?s PIN). In the identification task, no PIN is provided and the system compares the representation of the input biometric against the tem- plates of all the users in the system database; the output is either the identity of an enrolled user or an alert message such as ?user not identified.? Because identification in large databases is computationally expensive, classification and indexing techniques are often deployed to limit the number of templates that have to be matched against the input. Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy. Utilized alone or integrated with other technologies such as smart cards, encryption keys and digital signatures, biometrics are set to pervade nearly all aspects of the economy and our daily lives. Utilizing biometrics for personal authentication is becoming convenient and considerably more accurate than current methods (such as the utilization of passwords or PINs). This is because biometrics links the event to a particular individual (a password or token may be used by someone other than the authorized user), is convenient (nothing to carry or remember), accurate (it provides for positive authentication), can provide an audit trail and is becoming socially acceptable and inexpensive
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 1,124
Joined: Jun 2010
07-10-2010, 12:35 PM

.pptx   BiomETRICS - An authentication.pptx (Size: 247.9 KB / Downloads: 75)
BIOMETRICS - An authentication

Movies to Real World

-Access to a security vault granted by a retinal scan
-A door unlocks as someone approaches, activated by facial recognition
-My car door unlocks as I touch the door handle
-Accessing a computer system by presenting a fingerprint

Biometrics Overview

The security field uses three different types of identification:
Something You Know — a password, PIN, or piece
of personal information (such as your mother's maiden name);
Something You Have — a card key, smart card, or token (like a Secur ID card); and/or
Something You Are —a biometric.
Of these, a biometric is the most secure and convenient authentication tool. It can't be borrowed, stolen, or forgotten, and forging one is practically impossible. (Replacement part surgery, by the way, is outside the scope of this presentation.)

What are Biometrics?

Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioral characteristic
Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent.
Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, and voice. Some researchers have coined the term behavior metrics for this class of biometrics.
Strictly speaking, voice is also a physiological trait because every person has a different vocal tract, but voice recognition is mainly based on the study of the way a person speaks, commonly classified as behavioral.

Biometric: Operation method

A biometric system can operate in the following two modes:
Verification – A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smart card, username or ID number.
Identification – A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold.


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  head movement based voice enabled wireless device switching for physically challenged jaseelati 0 211 05-02-2015, 02:23 PM
Last Post: jaseelati
  Simulation using all the modeling styles and Synthesis of all the logic gates seminar projects maker 0 389 14-09-2013, 03:13 PM
Last Post: seminar projects maker
  ADC DEVICE (0804) ppt seminar projects maker 0 339 14-09-2013, 02:09 PM
Last Post: seminar projects maker
  CMOS Inverter, NAND and NOR using PSPICE pdf seminar projects maker 0 375 13-09-2013, 02:38 PM
Last Post: seminar projects maker
  Image Authentication Techniques computer science crazy 4 4,320 23-08-2013, 09:29 AM
Last Post: study tips
  Quality Measures in Biometric Systems pdf study tips 0 420 15-06-2013, 04:52 PM
Last Post: study tips
  Transmission System Reactive Compensation and Stability Enhancement Using 48-pulse study tips 0 388 03-05-2013, 02:15 PM
Last Post: study tips
  A FACTS Device: Distributed Power-Flow Controller (DPFC) pdf study tips 0 676 02-03-2013, 01:52 PM
Last Post: study tips
  Solving economic load dispatch problems in power systems using chaotic and Gaussian study tips 0 355 23-02-2013, 02:44 PM
Last Post: study tips
  To design Band pass filter using OPAMP and to plot its frequency response. study tips 0 367 22-02-2013, 11:58 AM
Last Post: study tips