SlideShare a Scribd company logo
1 of 26
“BIOMETRICS”
Introduction
   Biometrics is the science and technology of measuring
    and analyzing biological data.

   It measure and analyze human body characteristics,
    such as DNA, fingerprints, eye retinas and irises, voice
    patterns, facial patterns and hand measurements,
    for authentication purposes.
Biometric devices consist of:
 A reader or scanning device
 Software that converts the scanned
  information into digital form and
  compares match points
 A database that stores the biometric
  data for comparison
Biometrics can be sorted into
two classes:
 Categories of BIOMETRICS
 Physiological
 Examples- face, fingerprints, hand
  geometry and iris Recognition, DNA.
 Behavioral
 Examples-signature and voice.
Basic characteristics of
BIOMETRIC Technologies:
   Universality: Every person should have the
    characteristic. People who are mute or without
    a fingerprint will need to be accommodated in
    some way.

   Uniqueness: Generally, no two people have
    identical characteristics. However, identical
    twins are hard to distinguish.

   Permanence: The characteristics should not
    vary with time. A person's face, for example,
    may change with age.
   Collectibility: The characteristics must be easily
    collectible and measurable.

   Performance: The method must deliver accurate
    results under varied environmental circumstances.

   Acceptability: The general public must accept the
    sample collection routines. Nonintrusive methods are
    more acceptable.

   Circumvention: The technology should be difficult to
    deceive
Working principle:
   Biometric devices consist of a reader or
    scanning device software that converts
    the gathered information into digital
    form, and a database that stores the
    biometric data with comparison with
    existing records.
Modes
   Enrollment Mode.
   Verification Mode.

   Enrollment Mode:
    A sample of the biometric trait is captured,
    processed by a computer, and stored for later
    comparison.

   Verification Mode:
    In this mode biometric system authenticates a
    person’s claimed identity from their previously
    enrolled pattern.
Biometric Modalities:
Fingerprint Recognition:

   For fingerprint Recognition look at:
   Friction ridges
   Core
   Crossover
   Delta
   Island
   Ridge Ending
   Pore
Face Recognition
 It involves recognizing people by there:
 Facial features.
 Face geometry.


   Principle:
    Analysis of unique shape, pattern and
    positioning of facial features.
Voice Recognition:
 Voice recognition is not the same as
  speech recognition, it is speaker
  recognition.
 Considered both physiological and
  behavioral.
 Popular and low-cost, but less accurate
  and sometimes lengthy enrollment.
Styles of spoken input:

 These system have two styles of spoken
  inputs:
 Text Dependent- version inherently
  increases recognition performance, but it
  requires a co-operative user who can
  remember a phrase or sentence.

   Text-independent- version does not even
    need the user to be aware about the
    system, which makes it more convenient
    and secure.
Iris Recognition:
 It is the colored area of the eye that
  surrounds the pupil.
 It is a protected internal organ whose
  random texture is stable throughout life.
 The iris patterns are obtained through a
  video-based image acquisition system .
Iris Images:
Signature Verification:
   Static/Off-line: the conventional way.

   Dynamic/On-line: using electronically
    instrumented device.

   Principle:
    The movement of the pen during the signing
    process rather than the static image of the
    signature. Many aspects of the signature in
    motion can be studied, such as pen pressure,
    the sound the pen makes.
Smart Cards:
   These are digital security pocket-sized
    cards with embedded integrated circuits
    which can process data.

   It can be used for identification,
    authentication, and data storage.

   It can also be used as a medium to provide
    a means of effecting business transactions
    in a flexible, secure, standard way with
    minimal human intervention.
Encryption Systems :
   Transforming information using an
    algorithm to make it unreadable to
    anyone except those possessing special
    knowledge, usually referred to as a key.

   Encryption has long been used by
    militaries and governments to facilitate
    secret communication.
Performance of BIOMETRICS
:
   False accept rate or false match rate (FAR
    or FMR)

   False reject rate or false non-match rate
    (FRR or FNMR)

   Relative operating characteristic (ROC)

   Equal error rate or crossover error rate
    (EER or CER)
Advantages of
Biometrics:
   Biometric identification can provide extremely
    accurate, secured access to information; fingerprints,
    retinal and iris scans produce absolutely unique data
    sets when done properly.

   Current methods like password verification have
    many problems (people write them down, they forget
    them, they make up easy-to-hack passwords) .

   Automated biometric identification can be done very
    rapidly and uniformly, with a minimum of training .

   Your identity can be verified without resort to
    documents that may be stolen, lost or altered.
Disadvantages of
BIOMETRICS:
   The finger print of those people working in Chemical
    industries are often affected. Therefore these companies
    should not use the finger print mode of authentication.

   It is found that with age, the voice of a person differs. Also
    when the person has flu or throat infection the voice
    changes or if there there are too much noise in the
    environment this method maynot authenticate correctly.
    Therefore this method of verification is not workable all
    the time

   For people affected with diabetes, the eyes get affected
    resulting in differences.

   Biometrics is an expensive security solution.
BIOMETRICS SECURITY:
   Security personnel look for biometric
    data that does not change over the
    course of your life; that is, they look for
    physical   characteristics      that  stay
    constant and that are difficult to fake or
    change on purpose
THANK YOU

More Related Content

What's hot

Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processingshahab islam
 
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationTony Chew
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature RecognizationFaimin Khan
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Retina scan
Retina scanRetina scan
Retina scan
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 

Viewers also liked

Viewers also liked (20)

Types of Error in Mechanical Measurement & Metrology (MMM)
Types of Error in Mechanical Measurement & Metrology (MMM)Types of Error in Mechanical Measurement & Metrology (MMM)
Types of Error in Mechanical Measurement & Metrology (MMM)
 
Html5
Html5Html5
Html5
 
Mechanical measurement
Mechanical measurementMechanical measurement
Mechanical measurement
 
India
IndiaIndia
India
 
Robot Configuration - 1
Robot Configuration - 1Robot Configuration - 1
Robot Configuration - 1
 
Html5
Html5Html5
Html5
 
Measurement of force, torque and strain
Measurement of force, torque and strainMeasurement of force, torque and strain
Measurement of force, torque and strain
 
Robot Configuration - 2
Robot Configuration - 2Robot Configuration - 2
Robot Configuration - 2
 
L20 Simplex Method
L20 Simplex MethodL20 Simplex Method
L20 Simplex Method
 
Instructionformatreport 110419102141-phpapp02
Instructionformatreport 110419102141-phpapp02Instructionformatreport 110419102141-phpapp02
Instructionformatreport 110419102141-phpapp02
 
Operation Research (Simplex Method)
Operation Research (Simplex Method)Operation Research (Simplex Method)
Operation Research (Simplex Method)
 
Metrology and Measurements unit 2
Metrology and Measurements unit 2Metrology and Measurements unit 2
Metrology and Measurements unit 2
 
FPDE presentation
FPDE presentationFPDE presentation
FPDE presentation
 
LINEAR ALGEBRA BEHIND GOOGLE SEARCH
LINEAR ALGEBRA BEHIND GOOGLE SEARCHLINEAR ALGEBRA BEHIND GOOGLE SEARCH
LINEAR ALGEBRA BEHIND GOOGLE SEARCH
 
HTML
HTMLHTML
HTML
 
Automation and robotics
Automation and roboticsAutomation and robotics
Automation and robotics
 
Special Cases in Simplex Method
Special Cases in Simplex MethodSpecial Cases in Simplex Method
Special Cases in Simplex Method
 
Operations research - an overview
Operations research -  an overviewOperations research -  an overview
Operations research - an overview
 
Thermocouple gauge & pirani gauge
Thermocouple gauge & pirani gauge  Thermocouple gauge & pirani gauge
Thermocouple gauge & pirani gauge
 
Robots & Automation
Robots & AutomationRobots & Automation
Robots & Automation
 

Similar to Biometrics

SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 

Similar to Biometrics (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 

Recently uploaded

31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Recently uploaded (20)

31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 

Biometrics

  • 2. Introduction  Biometrics is the science and technology of measuring and analyzing biological data.  It measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
  • 3. Biometric devices consist of:  A reader or scanning device  Software that converts the scanned information into digital form and compares match points  A database that stores the biometric data for comparison
  • 4. Biometrics can be sorted into two classes:  Categories of BIOMETRICS  Physiological  Examples- face, fingerprints, hand geometry and iris Recognition, DNA.  Behavioral  Examples-signature and voice.
  • 5. Basic characteristics of BIOMETRIC Technologies:  Universality: Every person should have the characteristic. People who are mute or without a fingerprint will need to be accommodated in some way.  Uniqueness: Generally, no two people have identical characteristics. However, identical twins are hard to distinguish.  Permanence: The characteristics should not vary with time. A person's face, for example, may change with age.
  • 6. Collectibility: The characteristics must be easily collectible and measurable.  Performance: The method must deliver accurate results under varied environmental circumstances.  Acceptability: The general public must accept the sample collection routines. Nonintrusive methods are more acceptable.  Circumvention: The technology should be difficult to deceive
  • 7.
  • 8. Working principle:  Biometric devices consist of a reader or scanning device software that converts the gathered information into digital form, and a database that stores the biometric data with comparison with existing records.
  • 9. Modes  Enrollment Mode.  Verification Mode.  Enrollment Mode: A sample of the biometric trait is captured, processed by a computer, and stored for later comparison.  Verification Mode: In this mode biometric system authenticates a person’s claimed identity from their previously enrolled pattern.
  • 10. Biometric Modalities: Fingerprint Recognition:  For fingerprint Recognition look at:  Friction ridges  Core  Crossover  Delta  Island  Ridge Ending  Pore
  • 11.
  • 12.
  • 13. Face Recognition It involves recognizing people by there:  Facial features.  Face geometry.  Principle: Analysis of unique shape, pattern and positioning of facial features.
  • 14.
  • 15. Voice Recognition:  Voice recognition is not the same as speech recognition, it is speaker recognition.  Considered both physiological and behavioral.  Popular and low-cost, but less accurate and sometimes lengthy enrollment.
  • 16. Styles of spoken input: These system have two styles of spoken inputs:  Text Dependent- version inherently increases recognition performance, but it requires a co-operative user who can remember a phrase or sentence.  Text-independent- version does not even need the user to be aware about the system, which makes it more convenient and secure.
  • 17. Iris Recognition:  It is the colored area of the eye that surrounds the pupil.  It is a protected internal organ whose random texture is stable throughout life.  The iris patterns are obtained through a video-based image acquisition system .
  • 19. Signature Verification:  Static/Off-line: the conventional way.  Dynamic/On-line: using electronically instrumented device.  Principle: The movement of the pen during the signing process rather than the static image of the signature. Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes.
  • 20. Smart Cards:  These are digital security pocket-sized cards with embedded integrated circuits which can process data.  It can be used for identification, authentication, and data storage.  It can also be used as a medium to provide a means of effecting business transactions in a flexible, secure, standard way with minimal human intervention.
  • 21. Encryption Systems :  Transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  Encryption has long been used by militaries and governments to facilitate secret communication.
  • 22. Performance of BIOMETRICS :  False accept rate or false match rate (FAR or FMR)  False reject rate or false non-match rate (FRR or FNMR)  Relative operating characteristic (ROC)  Equal error rate or crossover error rate (EER or CER)
  • 23. Advantages of Biometrics:  Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly.  Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords) .  Automated biometric identification can be done very rapidly and uniformly, with a minimum of training .  Your identity can be verified without resort to documents that may be stolen, lost or altered.
  • 24. Disadvantages of BIOMETRICS:  The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.  It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time  For people affected with diabetes, the eyes get affected resulting in differences.  Biometrics is an expensive security solution.
  • 25. BIOMETRICS SECURITY:  Security personnel look for biometric data that does not change over the course of your life; that is, they look for physical characteristics that stay constant and that are difficult to fake or change on purpose