Biometrics CSE Seminar Topic

Description: The research paper Biometrics CSE Seminar Topic speaks about biometrics an emerging domain in the field of Computer Science Engineering. Biometrics is the procedure- in fact procedures- that heavily depend upon the human personality characteristics in providing a unique identity for providing security and access control.

It has come as a breakthrough discovery that the physical characteristics of a human being are unique and cannot  be replicated whatsoever. Owing to this specific feature biometrics can do wonders to e-transactions and other colossal businesses which work from a second to second basis and wherein there is a serious requirement of password, PINs, smart cards and other such e-accessories.

Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of identification is preferred over traditional methods involving password’s and PIN numbers for various reasons: The reasons suggested in the research paper are:

  • The person to be identified is required to be physically present at the point of identification.
  • Identification based on biometric techniques obviates the need to remember a password or carry a token. By replacing PIN’s, biometric techniques can potentially prevent unauthorized access to or fraudulent use of A.T.M‘s, Smart cards, computer networks.
  • PIN‘s passwords may be forgotten, and token-based methods of identification like passwords and driver’s licenses may be forged, stolen or lost. A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user.

Conclusion: The research paper suggests on an observation that Biometric procedures are very effective and there’s no second opinion about that, it’s a fledgling domain in the sense lots of awareness has to be generated.

Companies should endorse that biometric procedures are unparalleled and they alone will regulate smoother transactions for the company

Biometrics Some Interesting Facts Iris Technology

Description: The research paper Biometrics Some Interesting Facts Iris Technology speaks about biometrics and the wonders it could do in enhancing the security systems and control access of any individual e-transaction.

The research paper identifies the fact that there is a colossal increase and expansion of e-commerce and e-transaction, PINs, passwords, smart cards have become the buzz worlds and at least in the metropolitan cities they have become the buzz words. With the increased facilities of the transaction, the element that is seriously jeopardized is ‘security’.

With hackers and other cybercriminals that are escaping scot-free, the security measures fall thin. Biometric offers just the right kind of security that a person requires while in the process of an e-transaction.  Biometrics identifies a very appealing and universal fact that the personality traits are peculiar and unique and cannot be copied whatsoever.

This makes certain body features quite interesting to the computer scientists and they depend heavily on these to provide a cent percent security to the transacting clients.

The scope of biometrics as of now: The inimitable physical features and other personality traits will make you alone eligible to transact your own procedures. Iris recognition, retinal scan, fingerprinting and other viable techniques of biometrics are currently the order of the day.

Although a bare minimum of companies i.e. pathetically just 1% use the biometric procedures and 15% have rejected them straightaway still there is every possibility that with growing demand of security concerns these techniques will certainly in the future catch up like wildfire.

Conclusion: The research paper concludes on a note that biometrics is a domain that needs greater exposure. Awareness has to be created in the society.

Although latent as of now Biometrics is a domain that has an indisputable growth prospect. All the routine security measures will be transformed into biometric procedures sooner than later.

All We Need to Know About Biometrics Technologies

Description: The research paper All We Need to Know About Biometrics Technologies talks about the flourishing field of Computer Science Engineering, Biometrics. With the colossal increase of information flow, something that happens every nano-second, there has been a great demand for proper identification techniques for greater security and enhanced access control. Biometrics a field of Computer Science Engineering domain gives exactly solutions for problems pertaining to identification and other security measures. Biometrics identifies that the individual personality traits are unique and cannot be replicated whatsoever. This fact can help computer scientists to come up with enhanced security measures and mind-blowing identifying techniques. Retinal scan, iris recognition, facial scan and fingerprint techniques are the current biometric procedures in vogue.

The Drawbacks: The research paper identifies the fact that although the biometric procedures are the most effective ones identified to date to secure e-transactions or the transactions involving passwords, Pin or Smart Cards or any other means of locking personal information, it still doesn’t get the footage it reserves owing to sky high prices of certain procedures. It is very depressing to know that only 1% of the companies are actually using the biometric methods. 15% are still testing the viability of these procedures and 58% do not want to implement these new procedures considering the amount of time and money spent. They are even considering the not-so-favorable employee feedback against this.

Conclusion: The research paper concludes on the note saying that the fingerprinting technology has been considered the best implementation of biometric so far. The fingerprinting technique is considered efficient over others owing to its effective results and also cost effectiveness. Despite the wonders biometrics could do to an organization, it’s efficiency has been restricted to sci-fi movies where in we get to see a glimpse of these very sophisticated security enhancing procedures. Biometrics is still developing, the awareness should grow, it has a very long way to go.

Download All We Need to Know About Biometrics Technologies

CSE Paper Presentation On Biometrics

Description: The research paper CSE PAPER PRASENTATION ON BIOMETRICS speaks about Biometrics. Biometrics is the science of relating computers with the peculiar and unique characteristic traits of individuals for security and access control measures. Thanks to the film industry, Hollywood specifically that shows the face recognition or voice recognitions systems identifying a person instead of passwords. Biometrics enhances the security levels of a system. Voice recognition, facial recognition, iris and retina recognition and fingerprinting are the various biometric processes. The domain that is sver expanding and evolving vouches for the fingerprinting technique as the best of all given biometric procedures.

The technique is cost effective too besides providing the user with very accurate results. Fingerprint scanners are the most widely used biometric technology. Some companies use iris scanners and handprint readers to control physical access to restricted areas. Airports have tested facial-recognition software with mixed results. Although very effective when implemented, biometrics still has no commendable footage. Companies are still apprehensive about implementing biometric techniques. They feel that it is not easy integrating biometric components into an already full-fledged work environment. They even feel that the biometric apparatus are costly and the employees will find it difficult adapting to a new system. The statistics showing the interest of companies to launch biometrics is very pathetic. It is observed that 58% of companies do not require biometrics, 1% actually use, and 15% are still in the testing phase.

Conclusion: The research paper concludes on a note stating the many benefits of biometrics. The field is however popular in the e-world where e-transactions take place. Biometrics might replace smart cards and passwords totally in future. Fingerprinting technique of biometrics is however gaining faster recognition and implementation among its contemporaries owing to its effective and accurate results. This technique is friendly with the pocket too.

Download CSE Engineering Student Paper Presentation On Biometrics

All about Fingerprint Biometrics

Description: The research paper All about Fingerprint Biometrics speaks of fingerprint biometrics which is going to have a great market value in the future. With the advent of technology and things such as e-transactions and smart cards becoming almost ubiquitous, the role has security has attained a greater significance like never before. Scientists specializing in the area of biometrics have discovered that the individual physical traits of a human being are unique and never hold comparison with any other human being. The identification of this fact led to a breakthrough in biometrics’ research.

What are the various biometric procedures:

Various biometric procedures like the retina scan, voice recognition, facial recognition and fingerprint recognition techniques are now in vogue and provide serious kind of security and access control. Among all the aforementioned biometric procedures, the fingerprint technique is considered the most effective, cheaper and reliable one. The research paper discusses a specific method adopted in biometric procedures. It is called Fingerprint identification by using artificial neural network with optical wavelet preprocessing. When choosing a specific biometric procedure for identification, the following things have to be contemplated.

  1. What is the basis of the characteristic’s uniqueness?
  2. Can the process perform effective search on a huge data base?
  3. How the users would respond to this?
  4. Cost per user
  5. Implementation costs
  6. Maintenance costs and
  7. Usability for other processes.

Conclusion: From the given biometric procedures the fingerprint technique is the most effective one that comes up with almost accurate results. Although biometric technology offers some effective answers to many security solutions, it might be very costly to implement certain aspects of biometrics. The use of biometrics in the expanding world of e-transactions and smart cards is becoming indispensable. The awareness of the field should be created and the scope of the field should be pronounced often.

Download All about Fingerprint Biometrics BE/B Tech Seminar Topic

Seminar Projects on Finger Print Authentication

Description: The research paper Seminar Projects on Finger Print Authentication speaks about Finger Print Authentication. Biometrics is the domain of Computer Science Engineering that believes that the individual characteristic attributes of a person are unique. Observing these traits and analyzing them will give newer solutions to security systems. The security systems and the symbiotic relation with biological traits forms the cult of biometrics. Biometrics provide both data security and access control. The following procedures like voice recognition, face scan, retinal scan and many more are prevalent biometric procedures, but the best of all and most cost effective with superior results over other procedures is Finger Print Authentication.

A fingerprint is composed of ridges, the elevated lines of flesh that make up the various patterns of the print, separated by valleys. Ridges form a variety of patterns that include loops, whorls and arches, Minutiae are discontinuities in ridges, and can take the form of ridge endings, bifurcations (forks), crossovers (intersections) and many others. Fingerprint authentication is done considering the overall data obtained. The data print thus obtained is converted to a substet using an algorithm. Modern forensic fingerprinting, with files on the order of 250kB per finger, is used in large scale, one-to-many searches with huge databases, and can require hours for

verification. Fingerprint authentication, using files of less than 1000 bytes, is used for one-to-one verification and give results in just a few seconds.

In use, fingerprint authentication is very simple. First, a user enrolls in the system by providing a fingerprint sample. The sensor captures the fingerprint image. The sensor image is interpreted and the representative features extracted to a data file by algorithms either on a host computer or a local processor (in applications such as cellular handsets).This data file then serves as the users individual identification template.

Conclusion: The research paper concludes on a note that the fingerprinting authentication is one of the most reliable biometric procedures.

Download Seminar Projects on Finger Print Authentication.

Human Computer Interaction Finger Tracking

Description: The research paper Human Computer Interaction Finger Tracking speaks on more recent researches made in the arena of Human Computer Interaction (HCI). Earlier the human computer interaction interface was restricted to monitor, keyboard and mouse but now with increase in technological knowledge the concept slowly enhanced into voice, speech recognition, position recognition models have enriched the domain and have roped in some very sophisticated means of human computer interaction.

Finger tracking is using bare hand to put various aspects of a computer into application. This makes the procedure much faster and easier. Fingertip finding is the use of hands and their various positions to kick-start a computer application. Fingertip findings aim at minimizing the use of keyboard and mouse. The natural hand movements are perceived by the computers and the necessary command is undertaken. Different types of finger tracking methods are recognized and explained in the research paper, they are:

  1. Color Tracking Systems
  2. Correlation Tracking Systems
  3. Contour based Tracking Systems

The research paper talks about the FingerMouse. The FingerMouse system makes it possible to control a standard11 mouse pointer with bare hand. If the user moves an outstretched forefinger in front of the camera, the mouse pointer follows the finger in real-time. Keeping the finger in the same position for one second generates a single mouse click. An outstretched thumb invokes the double-click command; the mouse-wheel is activated by stretching out all five fingers.

Conclusion: The research paper concludes on a note that the finger-tracking system works on lighter backgrounds with little clutter. Although the maximum size of search area is 1.5*1m it can be easily increased. Finger tracking easily adapts to different situations and conditions. It is user friendly enabling him to use the system anytime. There is no restriction of speed of the finger. No additional accessories like gloves or any other such thing is required.

Download Human Computer Interaction Finger Tracking.

File Compression Format The Algorithm and Technique

Description: The research paper File Compression Format The Algorithm and Technique speaks about the File Compression Format, the algorithm and technique. The research paper introduces VoiceXML, the Voice eXtensible Markup Language. VoiceXML is designed for creating audio dialogs that feature synthesized speech, digitized audio, recognition of spoken and DTMF key input, recording of spoken input, telephony, and mixed initiative conversations. The major goal of VoiceXML is to bring the advantages of web-based development and content delivery to interactive voice response applications. The most important goal of VoiceXML is to analyze the computer language, understand speech grammar and determine the applications of the same.

Data compression is not an easy task. It could sometimes to be difficult to master, hard to implement and tough to maintain. LZW compression replaces strings of characters with single codes. It does not do any analysis of the incoming text. Instead, it just adds every new string of characters it sees to a table of strings. Compression occurs when a single code is output instead of a string of characters. The companion algorithm for compression is the decompression algorithm. It needs to be able to take the stream of codes output from the compression algorithm, and use them to exactly recreate the input stream. One reason for the efficiency of the LZW algorithm is that it does not need to pass the string table to the decompression code.

Conclusion: The research paper concludes on a note that the VoiceXML has become very popular in the recent times. With the evolution of technology and tools available like Artificial Intelligence this technology is gaining and is fortifying its footage. Speech interaction based servers provide a very natural medium for communication. Such a thing helps people having literally no idea of what VoiceXML is. Gaming industry that has voice and grammatical script could be greatly benefited by VoiceXML.

Download File Compression Format The Algorithm and Technique.

Farwell Brain Fingerprinting A Breakthrough in Criminal Investigations

Description: The research paper Farwell Brain Fingerprinting A Breakthrough in Criminal Investigations speaks about Farwell Brain Fingerprinting. It is considered a major breakthrough in criminal investigations. There is no dearth of criminals and crimes in this world. Thanks to technology that now there are certain advanced methods that will not save the criminal hiding in some remotest corner of the world. Such a wonderful technique is the brain fingerprinting technique. The method uses brain waves to connect with the evidence of crime stored in his/her brain. Such a method could be a boon to help the innocent that are unnecessarily roped into the crime. The technique will also help identify the actual perpetrators of the crime and put them to rigorous legal proceedings.

The research paper posits that both fingerprinting and DNA finger printing are very effective. But both these techniques expect the investigator to put in more effort. Collecting fingerprints and biological samples, preserving them, all these require lot of time and patience that goes unsaid. All these upheavals made scientists ask a fundamental question: What does the criminal take with him from the scene of crime? The answer happens to be his brain. Hence brain fingerprinting is one very effective, non-pervasive, non-stressful means of reaching the truth.

How it is done: Brain Fingerprinting is formulated on the principle that the brain is the epicenter to all human acts. In a criminal act, there may or may not be many kinds of peripheral evidence, but the brain is always there, functioning, planning, executing, and recording the crime. The major difference between a perpetrator and a falsely accused, innocent person is that the perpetrator, having committed the crime, has the details of the crime stored in his brain, and the innocent suspect does not. This is what Brain Fingerprinting detects scientifically.

Conclusion: The Brain fingerprinting technology is the revolutionary way of detecting crimes. With 100% accuracy rates the technology will weed out the notorious criminals and expose them to the world like never before.

Download Farwell Brain Fingerprinting A Breakthrough in Criminal Investigations.

Eye Movement Based Human Computer Interaction Techniques

Description: The research paper Eye Movement Based Human Computer Interaction Techniques speaks about eye movement based human computer interaction. The research paper speaks about the breakthrough researches that are in vogue in the arena of non-command interfaces. The research paper identifies a problem saying that the typical human and computer interactions are one sided. It is suggested that the bandwidth from computer to user is far wider than the bandwidth from user to computer. This is considered a potential upheaval considering the speed of operations performed. Eye Movement based computer human interaction can offer greater speed of processing and interaction and greater efficiency by increasing the scope of human –computer interaction bandwidth.

All about the non-touch interaction:

The research paper talks about the possibilities and inherent limitations that crop when the input to the computers is through eyes. The concept is so different and complicated. While trying to input information through eyes, scientists suggest natural eye movement and certainly not the trained one.  The technique commences by studying the characteristics of natural eye movements and then attempts to recognize corresponding patterns in the raw data obtainable from the eye tracker, convert them into tokens with higher-level meaning, and then build dialogues based on the known characteristics of eye movements. These eye movement based interactions set a new example of non-touch commands to the computer. It represents a change in input from objects for the user to actuate by specific commands to passive equipment that simply senses parameters of the user’s body.

Conclusion: Non-touch based interaction or giving the input to computers with eyes is one major breakthrough in the domain. It can certainly be adjudged as the ray of hope for disabled people or people busy with multitasking. The focus right now is over the natural eye movement to facilitate working but I future conscious eye movements will take over for getting onto specific tasks.

Download Eye Movement Based Human Computer Interaction Techniques.