BIOMETRICS
(Professional Elective-III)
Subject Code: UGIT7T0120 L T
P C
IV Year / I Semester 3 0 0
3
Prerequisites:
1. Knowledge on Biometric authentication process
2. Awareness on different biometric devices
Course Objectives:
1. Understand the Biometric technology including the definition,
terminologies used, parameters and basic features.
2. Learn the principle, process, hardware used and issues for the
different biometric methods like finger, facial, iris, voice, hand,
signature, keystroke, AFIS and retina.
3. Know the different biometric applications.
4. Know the difference between physiological and behavioral biometrics.
SYLLABUS:
UNIT I: (6 Hrs)
Introduction – Why Biometrics? - Benefits of biometrics versus
Traditional Authentication methods, Benefits of biometrics in identification
Systems
Key Biometric Terms and Processes - Definitions, Verification and
identification, Logical versus Physical Access, how biometric matching
works, Accuracy in biometric systems– False match rate, False non-
match rate, Failure to enroll rate, Derived metrics. [T1]
UNIT II: (8 Hrs)
Finger scan – Components, how finger scan technology works,
competing finger Scan technologies, Finger scan Deployments, Finger
scan Strengths, Finger scan weaknesses. [T1]
Facial Scan – Components, how facial scan technology works, competing
facial Scan technologies, Facial scan Deployments, Facial scan Strengths,
Facial scan weaknesses. [T1]
UNIT III: (8 Hrs)
Iris Scan - Components, how it works, Deployments, Iris scan Strengths,
Iris scan weaknesses. [T1]
Voice Scan - Components, how it works, Deployments, Voice scan
Strengths, Voice scan weaknesses. [T1]
UNIT IV: (8 Hrs)
Other physiological biometrics – Hand Scan, Retina Scan, Automatic
Fingerprint Identification Systems (AFIS)
Other Leading Behavioral Biometrics – Signature scan, keystroke
scan. [T1]
UNIT V: (8 Hrs)
Categorizing Biometrics Applications – Defining the Seven Biometric
Applications, Introduction to IBG’s Biometric Solution Matrix
Assessing the Privacy Risks of Biometrics – Bio Privacy Technology
Risk Ratings
Biometric standards – Why Standards? Application Programming
Interfaces. [T1]
UNIT VI: (8 Hrs)
Recommended Biometric for Network Security – Finger Biometrics,
Face Biometrics, Voice Biometrics, Iris Biometrics, the Choice of a
Biometric for Network Access
An Introduction to Statistical Measures of Biometrics – FAR, FRR,
FTE, EER, and What Measure is Most Important?
The Biometric Transaction – Securing and Trusting a Biometric
Transaction, Trusted Biometric Devices, and non-trusted biometric
devices, Matching Location. [T2]
Course Outcomes:
Upon the completion of the course, the students will be able to:
CO 1: Identify various biometric techniques and standards. [L3]
CO 2: categorizes biometric applications and technologies to real time
Problems. [L4]
CO3: Describe various biometric mechanisms. [L2]
CO4: Determine security mechanisms in Biometrics. [L5]
Mapping of COs to POs:
COs PS PS
PO PO PO PO PO PO PO PO PO PO PO PO
/ O O
1 2 3 4 5 6 7 8 9 10 11 12
POs 1 2
CO1 3 - - - - - - - - - - - - -
CO2 - 3 - - - - - - - - - - - -
CO3 - - - - - - - - - - - - - -
CO4 - - 3 - - - - - - - - - - -
TEXT BOOKS:
1. “Biometrics–Identity Verification in a Networked World”, Samir
Nanavati, Michael Thieme, Raj Nanavati, A Wiley Tech Brief.
2. “Biometrics for Network Security” Paul Reid, Pearson Education.
REFERENCE BOOKS:
1. “Biometrics- The Ultimate Reference”, John D. Woodward, Jr. Wiley
Dreamtech
2. Woodward, J.D. and Orlans, Nicholos M., Biometrics, McGraw Hill
3. ” Implementing Biometric Security”, John Chirillo, Scott Blaul, Wiley
ONLINE COURSES / REFERENCES:
1. “Biometrics-An introductory course about understanding the different
types and uses of biometrics” Created by Art of Service – Udemy course
2. “Biometrics”- offered by IIT Kanpur – NPTEL Course
3. “Usable Security” offered by University of MaryLand – Coursera course
4. https://blog.mantratec.com/category/biometric-technology
5. https://www.bayometric.com/biometric-blog/
6. https://www.aware.com/blog/