Your SlideShare is downloading. ×
Slide-show on Biometrics
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Slide-show on Biometrics


Published on

Published in: Technology

  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. The technology of future. Submitted by, Guided by,Joshi Pathik V. Miss A. D. Bhople
  • 2. Contents Introduction History Present Future Procedure of Working Features of different parameters Application Conclusion References
  • 3. Introduction Information security is concerned with the assurance of confidentially, integrity and availability of information in all forms. This is the ancient Greek word: bios = “life” and metron = “measure.” Biometric systems based on single source of information are called unicode system.
  • 4. History European Explorer Joao de Barros recorded the first known example of fingerprinting in China during the 14th century. 1980:- Alphonse Bertillon studied body mechanics and measurements to help in identifying criminals. Karl Pearson, an applied mathematician studied biometric research early in 20th century at University college of London. In the 1960 and 1970, signature biometric, authentication procedures were
  • 5. Present Today, biometric lows and regulations are in process and biometric industry standard are being tested. It divided in two parts, Behavioural Parameters Behavioural Parameters•Fingerprint •Gait•Palmprint •Voice•Hand Veins •Signature•Face •Keystroke•Iris•Retina•DNA
  • 6. Future A biometric system can provide two functions. One of which is verification and the other is Authentication. In the near future, these biometric techniques can be the solution for the current threats in the world of information security. Due to dynamic modification of the proposed metric, the rejection ration for a some person reduces by a lot.
  • 7. Procedure of Working
  • 8. Features of Different Parameters Fingerprint Iris Technology Retina Geometry Technology Face Recognition Technology Hand Geometry Technology Voice Recognition Techniques Signature Verification Technique
  • 9. Fingerprint The size of fingerprint is around 10*10*15. Arch Loop Whorl Ridge ending Bifurcation Short Ridge
  • 10.  In this way the total features and template of Fingerprint is as following. The matcher matches any two templates as following image.
  • 11. Iris Recognition This can be a combination of specific characteristics known as corona, crypts, filaments, freckles, pits, furr ows, striations and rings.
  • 12. Retina Geometry Technology A retinal scan involves the use of a low-intensity coherent light source, which is projected onto the retina to illuminate the blood vessels which are then photographed and analyzed. A retinal scan has an error rate of 1 in 10,000,000, compared to fingerprint identification error being sometimes as high as 1 in 500.
  • 13. Face Recognition Technology Facial metric technology on the manufacture of the specific facial features. Eigen Face
  • 14. Hand Geometry Technology There techniques include the estimation of length, width, thickness and surface area of the hand.
  • 15. Voice Recognition Techniques Voice verification focuses on the vocal characteristics that produce speeches and not on the sound or the pronunciation of speech itself. The vocal characteristics depend on the dimensions of the vocal tract, mouth, nasal cavities and the other speech processing mechanism of the human body.
  • 16. Signature Verification Technique The dynamics is measured as a means of the pressure, direction, acceleration and the length of the strokes, dynamics number of strokes and their duration. These are either traditional tablets or special purpose devices. Tablets capture 2D coordinates and the pressure.
  • 17. Application of Biometrics Security Authentication E-commerce and E-governments Secure Banking and Financial Transaction Digital Rights Management Healthcare Application Crime Investigation Social Services
  • 18. Conclusion While Biometric authentication can offer a high degree of security, they are far from perfect solution. The influences of biometric technology on society and the risks to privacy and threat to identify will require meditation through legislation.
  • 19. References[1] Smart Cart Alliance Identity Council (2007): Identity and Smart Card Technology and Application Glossary,[2] Langenburg, Glenn (January 24, 2005). "Are ones fingerprints similar to those of his or her parents in any discernable way?". Scientific American. Retrieved 28 August 2010.[3] Thornton, John (May 9, 2000). "Latent Fingerprints, Setting Standards In The Comparison and Identification". 84th Annual Training Conference of the California State Division of IAI. Retrieved 30 August 2010.[4] Wikipedia Image[5] Sanjay R. Ganorkar, Ashok A. Ghatol, “Iris Recognition: An Emerging Biometrics Technology”, In Proc. of The sixth WSEAS International Conference on Single Processing, Robotics and Automation, Greece, Feb. 2007, pp. 91 – 96[6] J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Eds, “Biometrics Systems: Technology, Design and Performance Evolution”, New York: Spinger Verlag, 2005[7] M. A. Dabbah, W. L. Woo, and S. S. Dlay, “Secure Authentication for Face Recognition”, In Proc. of IEEE Symposium on computational Intelligence in Image and Signal Processing, April 2007, USA, pp. 121 – 126[8] A. Kumar, D. C. Wong, H. C. Shen and A. K. Jain , “Personal Verification using Palmprinnt and Hand Geometry Biometrics”, In Proc. of fourth International Conference on Audio and Video based Biometric Person Authentication, Guildford, U.K. January 2003, pp 668-678[9] S. Furui, “Recent Advances in Speaker Recognition”, In Proc. of first International Conference on Audio and video based Biometric person Authentication, UK, March 1997, pp 859 – 872[10] A.K. Jain, A. Ross, and S. Prabhakar, “An Introduction to Biometrics Recognition,” IEEE Trans. Circuit Syst. Video Technology, Special Issue Image and Video based Biometrics, Volume 14, Issue 1st January 2004, pp. 4 – 20
  • 20. Thank You