Seminar on Biometric Security Systems

Introduction to Biometric Security Systems Seminar Topic:

These are the technique of the user authentication which is very difficult to forge, they cannot theft or something to forget, they are always with us, like eyes, hand, fingerprint.  It used the technique of pattern matching like fingerprint matching which is very unique and they vary from user to user or hand matching pattern like the shape of a hand. If in case of someone fingerprint might not work then his face recognition or his voice can be used.

First, the user image is taken and converted into a template which is then stored in the database. When the next time user comes his new image is compared with previous image and the numeric value is created that determines the correctness of image.  Then three possibilities occur:

–         When the user is not authenticated or rejected

–         When the data are not correct means some data are correct and some right

–         When the decision is adjusted such that result obtained is true.

Fingerprint authentication: this is widely used technique as a fingerprint is very unique. The user has a unique pattern on their hands which is used for identification.

Iris authentication: human eyes have dark spot knows as iris which is divided into lakhs of colored circles.

Voice authentication: human voice is generated from a vocal tract that vibrates and create sound. Human has different speaking characteristics which are used for authentication. There is two of voice authentication used:  Text-dependent and Text independent.

Face authentication: they used a video camera for identifying human faces. It takes 10-20 seconds and the camera takes more than 1 picture at different angles for more accurate identification.

Applications:  they are used in most of the banks for card fraud, telephone transactions, workstations, travel and tourism, internet transactions and now it is also public identity cards like ‘”AADHAR “.

Biometric System Seminar Report

Introduction to Biometric System:

This is a security system that used pattern matching technique for identification. There are several techniques in biometric systems like a fingerprint, face identification, hand geometry. They are a very useful device in terms of security.

Fingerprint: every user has its unique pattern on her hands. These patterns are successfully used in many applications. This is a very old method but very used. These techniques are based on two categories, minutiae-based and correlation based.

Face retrieval systems: this technique is based on the face identification. The computer records the still image of the face and keep in the database and next time it identifies the face. They are used in surveillance computers or human interface computers.

Hand geometry: this technique uses the shape of the body part like a hand. This is not unique. They are generally used for frequent identification.

Retina and iris recognition:  this is very rare in fact of that truth that retina is unique but also it is less used. It requires proper light at the black spot. They are generally used by the military.

These all methods discussed above are a single method, but single method systems are not able to meet the requirement, so we used the multi-model technique. In this model, several recognition is required like they are used for recognition, fingerprint matching, with speaker verification.

Biometric systems are used for a commercial purpose such as ATM, medical records. They are used by government systems such as national ID card, border control, passport control. They are used forensic labs for finding missing children, parenthood determination.  They are used in Identix Touch clock verification system like attendance applications.

Limitations: they are very noisy or create too much distortion. It might not work if someone fingers print are not properly visible and it also possible to create duplicate fingerprints.

Blue Gene Technology Seminar Report

Introduction to Blue Gene Project:

These are special microcomputers that are used in the medical application. They are made up of RNA, DNA, and proteins. They can also perform mathematical calculations. They help the doctors to cure the damaged cells, disease or cancers cells. 

The first possibility of biocomputers is proposed by Dr. Leonard Adleman in 1994.

Bio cell has the capability to build its own. It has a very nice mechanism that if researchers want to could build such a biomolecule that could figure out each and every cell of the body leaving healthy cells. They also work in human kidney. In this case, computers have just transformed to a molecule, such that now it can be put millions of such computers into one drop of solution.

Now, the conventional computers are very difficult to solve the problems like the shortest path on the maps between many cities. But this problem was solved by DNA computer. They easily track the number of short operations. One simple problem can be solved by the 765 different software programs. 

Health experts generally use biological computers to determine the cellular activity and check which cellular activity is harmful or not. They construct molecule which is generally realization of mathematical components, it has the software, it has hardware and after computing result produces is another molecule.

For such device, Shapiro used four components of DNA named as A, C, G and T for encoding of zeroes and ones that create an input molecule. Then hardware starts working and the process will continue till the problem is solved.

Now a day’s competition over DNA computing has increased very much. It has very useful advantages. Now the treatment of selected cells are possible and doctor need not check the whole body they can focus on a single cell and carry out treatment.

Biometric Identification System Project Report

Some of the main problems faced by the network environments authentication, accurate and automatic identification, some of the secret pins in the smart cards may not be enough in certain cases, we need to verify that physically the person to be claimed is said to be biometrics. Biometrics identification is a most costly top secure application, but latest researchers have developed cost-effective, reliable and highly accurate Biometrics identification technology for access.

Biometric Identification System Definition:

Biometric systems are those which identify a user by storing their biological info’s or behaviors and comparing them during that person’s accessor in other words biometric is a non-repeatable trait of us human beings that can automatically reveal one’s identity and details.

The main three levels of security, when implemented in the real life, are

  • The lowest level is used when you have your possession, such as ID.
  • The second level is used as a password for computer login or a PIN code  in your bank ATM cards
  • Third level or the highest level of security is something that you are and something that you do. This is the basic things of biometric technology.

Biometrics systems have different storage options provided such as a database on a central computer, plastic cards (such as strip, barcode, smart cards). The basic architecture of biometric identification consists of 5 main parts namely Data collection, Signal processing, Decision, Data storage, and Transmission.

All the biometrics devices have the same principles of capture, comparison, extraction and matching in common. Some of the biometrics techniques used in human organs for security purposes is basically Eye, in which it uses Iris and retina scanning face recognition, fingerprint scanning, hand geometry, finger geometry, palm, signature, voice recognition.

These techniques are been briefly discussed in this paper. Some of the future techniques in biometrics are DNA scanning, ear Shape, keystroke dynamic scanning, and vein check.

Biotechnology Projects Work

List of  biotechnology projects work:

This category consists of a list of biotechnology projects work which can help biotechnology students as reference documents for implementing related projects.

students can submit biotechnology projects work to us at info.1000projects{at}gmail.com

Links to download  biotechnology projects work: 

  1.  Renewable Energy Technology Management Promoting Village Project Report
  2. biotechnology project work on Production of ethanol using molasses and its effluent treatment
  3.  VARIOUS METHODS OF EVAPOTRANSPIRATION Bio Tech Project
  4. biotechnology project work on Scattering Parameters Of Circulator Btech Bio Technology Project
  5.   Bio Technology Project Report on ICU VENTILATOR
  6. biotechnology project work onRenewable Energy Technology Management Promoting Village Project Report
  7.  Production of ethanol using molasses and its effluent treatment