Page 90 of 93
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY
IV Year B.Tech. IT II-SemT P C
(ELECTIVE - III)
Introduction – Benefits of biometric security – Verification and identification – Basic working of biometric matching – Accuracy – False match rate – False non-match rate – Failure to enroll rate – Derived metrics – Layered biometric solutions.
Finger scan – Features – Components – Operation (Steps) – Competing finger Scan technologies – Strength and weakness. Types of algorithms used for interpretation.
Facial Scan - Features – Components – Operation (Steps) – Competing facial Scan technologies – Strength and weakness.
Iris Scan - Features – Components – Operation (Steps) – Competing iris Scan technologies – Strength and weakness.
Voice Scan - Features – Components – Operation (Steps) – Competing voice Scan (facial) technologies – Strength and weakness.
Other physiological biometrics – Hand scan – Retina scan – AFIS (Automatic Finger Print Identification Systems) – Behavioral Biometrics – Signature scan- keystroke scan.
Biometrics Application – Biometric Solution Matrix – Bio privacy – Comparison of privacy factor in different biometrics technologies – Designing privacy sympathetic biometric systems. Biometric standards – (BioAPI , BAPI) – Biometric middleware
Biometrics for Network Security. Statistical measures of Biometrics. Biometric Transactions.
TEXT BOOKS :
1. Biometrics – Identity Verification in a Networked World – Samir Nanavati,
Michael Thieme, Raj Nanavati, WILEY- Dream Tech
2. Biometrics for Network Security- Paul Reid, Pearson Education.
1. Biometrics- The Ultimate Reference- John D. Woodward, Jr. Wiley Dreamtech.