0% found this document useful (0 votes)
12 views4 pages

Biometrics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views4 pages

Biometrics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

BIOMETRICS

(Professional Elective-III)

Subject Code: UGIT7T0120 L T


P C
IV Year / I Semester 3 0 0
3

Prerequisites:

1. Knowledge on Biometric authentication process


2. Awareness on different biometric devices

Course Objectives:

1. Understand the Biometric technology including the definition,


terminologies used, parameters and basic features.
2. Learn the principle, process, hardware used and issues for the
different biometric methods like finger, facial, iris, voice, hand,
signature, keystroke, AFIS and retina.
3. Know the different biometric applications.
4. Know the difference between physiological and behavioral biometrics.

SYLLABUS:

UNIT I: (6 Hrs)

Introduction – Why Biometrics? - Benefits of biometrics versus


Traditional Authentication methods, Benefits of biometrics in identification
Systems

Key Biometric Terms and Processes - Definitions, Verification and


identification, Logical versus Physical Access, how biometric matching
works, Accuracy in biometric systems– False match rate, False non-
match rate, Failure to enroll rate, Derived metrics. [T1]

UNIT II: (8 Hrs)

Finger scan – Components, how finger scan technology works,


competing finger Scan technologies, Finger scan Deployments, Finger
scan Strengths, Finger scan weaknesses. [T1]
Facial Scan – Components, how facial scan technology works, competing
facial Scan technologies, Facial scan Deployments, Facial scan Strengths,
Facial scan weaknesses. [T1]

UNIT III: (8 Hrs)

Iris Scan - Components, how it works, Deployments, Iris scan Strengths,


Iris scan weaknesses. [T1]

Voice Scan - Components, how it works, Deployments, Voice scan


Strengths, Voice scan weaknesses. [T1]

UNIT IV: (8 Hrs)

Other physiological biometrics – Hand Scan, Retina Scan, Automatic


Fingerprint Identification Systems (AFIS)

Other Leading Behavioral Biometrics – Signature scan, keystroke


scan. [T1]

UNIT V: (8 Hrs)

Categorizing Biometrics Applications – Defining the Seven Biometric


Applications, Introduction to IBG’s Biometric Solution Matrix

Assessing the Privacy Risks of Biometrics – Bio Privacy Technology


Risk Ratings

Biometric standards – Why Standards? Application Programming


Interfaces. [T1]
UNIT VI: (8 Hrs)

Recommended Biometric for Network Security – Finger Biometrics,


Face Biometrics, Voice Biometrics, Iris Biometrics, the Choice of a
Biometric for Network Access

An Introduction to Statistical Measures of Biometrics – FAR, FRR,


FTE, EER, and What Measure is Most Important?

The Biometric Transaction – Securing and Trusting a Biometric


Transaction, Trusted Biometric Devices, and non-trusted biometric
devices, Matching Location. [T2]

Course Outcomes:

Upon the completion of the course, the students will be able to:

CO 1: Identify various biometric techniques and standards. [L3]


CO 2: categorizes biometric applications and technologies to real time

Problems. [L4]

CO3: Describe various biometric mechanisms. [L2]

CO4: Determine security mechanisms in Biometrics. [L5]

Mapping of COs to POs:

COs PS PS
PO PO PO PO PO PO PO PO PO PO PO PO
/ O O
1 2 3 4 5 6 7 8 9 10 11 12
POs 1 2

CO1 3 - - - - - - - - - - - - -

CO2 - 3 - - - - - - - - - - - -

CO3 - - - - - - - - - - - - - -

CO4 - - 3 - - - - - - - - - - -

TEXT BOOKS:

1. “Biometrics–Identity Verification in a Networked World”, Samir

Nanavati, Michael Thieme, Raj Nanavati, A Wiley Tech Brief.

2. “Biometrics for Network Security” Paul Reid, Pearson Education.

REFERENCE BOOKS:

1. “Biometrics- The Ultimate Reference”, John D. Woodward, Jr. Wiley


Dreamtech
2. Woodward, J.D. and Orlans, Nicholos M., Biometrics, McGraw Hill
3. ” Implementing Biometric Security”, John Chirillo, Scott Blaul, Wiley

ONLINE COURSES / REFERENCES:

1. “Biometrics-An introductory course about understanding the different


types and uses of biometrics” Created by Art of Service – Udemy course

2. “Biometrics”- offered by IIT Kanpur – NPTEL Course

3. “Usable Security” offered by University of MaryLand – Coursera course


4. https://blog.mantratec.com/category/biometric-technology

5. https://www.bayometric.com/biometric-blog/

6. https://www.aware.com/blog/

You might also like