X hits on this document

279 views

0 shares

0 downloads

0 comments

90 / 93

Page 90 of 93

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY

HYDERABAD

IV Year B.Tech. IT II-SemT P C

4+1*04

BIOMETRICS

(ELECTIVE - III)

UNIT I

Introduction – Benefits of biometric security – Verification and identification – Basic working of biometric matching – Accuracy – False match rate – False non-match rate – Failure to enroll rate – Derived metrics – Layered biometric solutions.

UNIT II

Finger scan – Features – Components – Operation (Steps) – Competing finger Scan technologies – Strength and weakness. Types of algorithms used for interpretation.

UNIT III

Facial Scan - Features – Components – Operation (Steps) – Competing facial Scan technologies – Strength and weakness.

UNIT IV

Iris Scan - Features – Components – Operation (Steps) – Competing iris Scan technologies – Strength and weakness.

UNIT V

Voice Scan - Features – Components – Operation (Steps) – Competing voice Scan (facial) technologies – Strength and weakness.

UNIT VI

Other physiological biometrics – Hand scan – Retina scan – AFIS (Automatic Finger Print Identification Systems) – Behavioral Biometrics – Signature scan- keystroke scan.

UNIT VII

Biometrics Application – Biometric Solution Matrix – Bio privacy – Comparison of privacy factor in different biometrics technologies – Designing privacy sympathetic biometric systems. Biometric standards – (BioAPI , BAPI) – Biometric middleware

UNIT VIII

Biometrics for Network Security. Statistical measures of Biometrics. Biometric Transactions.

TEXT BOOKS :

1. Biometrics – Identity Verification in a Networked World – Samir Nanavati,

   Michael Thieme, Raj Nanavati, WILEY- Dream Tech

2. Biometrics for Network Security- Paul Reid, Pearson Education.

REFERENCE:

1. Biometrics- The Ultimate Reference- John D. Woodward, Jr. Wiley Dreamtech.

Document info
Document views279
Page views279
Page last viewedWed Jan 18 02:34:26 UTC 2017
Pages93
Paragraphs3102
Words29541

Comments