today's information age it is not difficult to collect data about an individual
and use that information to exercise control over the individual. Individuals
generally do not want others to have personal information about them unless they
decide to reveal it. With the rapid development of technology, it is more difficult
to maintain the levels of privacy citizens knew in the past. In this context,
data security has become an inevitable feature. Conventional methods of identification
based on possession of ID cards or exclusive knowledge like social security number
or a password are not altogether reliable. ID cards can be almost lost, forged
or misplaced: passwords can be forgotten.
Such that an unauthorized user may be able to break into an account with little
effort. So it is need to ensure denial of access to classified data by unauthorized
persons. Biometric technology has now become a viable alternative to traditional
identification systems because of its tremendous accuracy and speed. Biometric
system automatically verifies or recognizes the identity of a living person based
on physiological or behavioral characteristics.
the persons to be identified should be physically present at the point of identification,
biometric techniques gives high security for the sensitive information stored
in mainframes or to avoid fraudulent use of ATMs. This paper explores the concept
of Iris recognition which is one of the most popular biometric techniques. This
technology finds applications in diverse fields.
- Future Of Identity
Biometric dates back to ancient Egyptians who measured
people to identify them. Biometric devices have three primary components.
Automated mechanism that scans and captures a digital or analog image of a living
2. Compression, processing, storage and comparison
of image with a stored data.
3. Interfaces with application systems.
biometric system can be divided into two stages: the enrolment module and the
identification module. The enrolment module is responsible for training the system
to identity a given person. During an enrolment stage, a biometric sensor scans
the person's physiognomy to create a digital representation. A feature extractor
processes the representation to generate a more compact and expressive representation
called a template. For an iris image these include the various visible characteristics
of the iris such as contraction, Furrows, pits, rings etc. The template for each
user is stored in a biometric system database.
identification module is responsible for recognizing the person. During the identification
stage, the biometric sensor captures the characteristics of the person to be identified
and converts it into the same digital format as the template. The resulting template
is fed to the feature matcher, which compares it against the stored template to
determine whether the two templates match.
The identification can be in the form of verification, authenticating a claimed
identity or recognition, determining the identity of a person from a database
of known persons.
In a verification system, when the captured characteristic and
the stored template of the claimed identity are the same, the system concludes
that the claimed identity is correct. In a recognition system, when the captured
characteristic and one of the stored templates are the same, the system identifies
the person with matching template.
You may also like this : Quantum Dot Lasers, Plasma Antennas, Organic Light Emitting Diode, Narrow Band & Broad Band ISDN, Nanotechnology, Led Wireless, Laser Communication Systems, Josephson Junction, Introduction to the Internet Protocols, Imagine , Cellular Communications , Heliodisplay, Optical Mouse , Time Division Multiple Access , Element Management System, Extended Markup Language , Synchronous Optical Network, Dig Water , CRT Display , Satellite Radio TV System, Robotics , Wireless Application Protocol , Synchronous Optical Networking , Cellular Radio , Optic Fibre Cable, Infinite Dimensional Vector Space , Low Voltage Differential Signal, Plasma Display , GPRS,Landmine Detection Using Impulse Ground Penetrating Radar, NRAM, GSM , Wireless Intelligent Network , Integrated Voice and Data , MEMS, Smart Quill, Automatic Number Plate Recognition, Optical Camouflage, Smart Fabrics, Java Ring, Internet Protocol Television, FireWire, Night Vision Technology, RD RAM , Implementation Of Zoom FFT in Ultrasonic Blood Flow Analysis, Military Radars , Modern Irrigation System Towards Fuzzy, Smart Cameras in Embedded Systems, Spin Valve Transistor , Moletronics- an invisible technology,Electronics Seminar Reports, PPT and PDF.
Labels : Advanced Technical Seminar Topics for ECE, IEEE Seminar Topics for ECE 2012|2011|2009, Electronics Seminar Topics for Diploma Students, Seminar PPT Electronics Communication, Electronics Seminar PPT Abstract, Electronics Seminar Topic Full Paper Download, Latest PPT for Electronics, Latest Electronics Seminars PPT, Electronics Seminars for You, Electronics Seminars Topics Latest, Electronics Seminars PPT,Electronics Seminars 2012|2011|2010