SlideShare a Scribd company logo
1 of 19
Applications of
Biometrics in
Technology
Presented by:
Sanjay Khubchandani FY MSc IT 04
NVPAS
What is Biometrics?
 The word “biometrics” comes form two Greek
words – ‘bio’ meaning life and ‘metric’ meaning
to measure.
 It includes recognition by retina, iris, fingerprints,
face, vein geometry, voice patterns, hand
measurements, etc which are used to identify
human characteristics and to verify identity.
 There is a wide range of usage of
Biometric in the field of Information
Technology..
 Some of them are as follows…
Retina Scanning
 It is a biometric technique that uses the unique
patterns formed by blood vessels on a
person's retina.
 The network of blood vessels in the retina is not
entirely genetically determined, as a result
even identical twins do not share a similar
pattern.
 It was known from 1930s that each human
eyeball has unique characteristics. This
information was later put to use and in 1984 the
first retinal scanner was made available for
commercial use by a company called EyeDentify.
 The retinal scan uses a
low-intensity light source
and a sensor to scan the
pattern of blood vessels
at the back of the retina.
 As the retinal blood
vessels absorb light more
readily than the
surrounding tissue, the
amount of reflection
varies and the blood
vessels appear darker
compared to other
tissues.
 The pattern of variations
is digitized and stored in
a database.
 ADVANTAGES
 Low error rate of 1 in 10,00,000.
 Highly Reliable
 Easy to use.
 DISADVANTAGES
 Measurement accuracy can be affected by
certain diseases such as cataract,
astigmatism, diabetes, etc.
 Invasive scanning process.
 Not very user friendly
 High equipment cost
Retina Scanning
The controls of a
Topocon Retinal
Camera..
Scanners can be made
handheld and easily
portable, like this one
being used by the US
Army, or wall-mounted
for convenience in
places like airports.
Iris Scanning
 Similar to a retina scan, an iris scan also makes
use of the uniqueness of your eyes.
 In an iris scan, the different patterns in your iris are
scanned and stored.
 In 1994, US-born mathematician John Daugman
develops the algorithms that can turn
photographs of irises into unique numeric codes.
He is granted US patent #5,291,560 for a
"biometric personal identification system based
on iris analysis" .
 The eyes of a person are
digitally photographed with
both ordinary light and
infrared light(it has a slightly
longer wavelength than
ordinary red light).
 The infrared helps to show the
patterns of dark coloured
eyes as it is not very clear in
ordinary light.
 These two digital
photographs, are then
analyzed by
a computer which identifies
around 240 unique features.
 These features, are turned into
a 512-digit number called an
Iris Code that is stored in a
computer database.
 ADVANTAGES
 Accuracy and reliability
 Patterns of iris remain unchanged for long
periods of time.
 Hygienic as direct contact with the scanner is
not needed.
 DISADVANTAGES
 High initial cost of equipments.
Fingerprint Scanning
 When a computer checks your fingerprints, there
obviously isn't a little person with a magnifying
glass sitting inside, comparing your fingerprints
with all the hundreds or thousands stored in the
database!
 So how can a computer compare prints? During
enrolment or verification, each print is analyzed
for very specific features called minutiae, where
the lines in your fingerprint terminate or split in
two.
 The computer measures
the distances and angles
between these features—
a bit like drawing lines
between them—and
then uses an algorithm
(mathematical process)
to turn this information
into a unique numeric
code. Comparing
fingerprints is then simply
a matter of comparing
their unique codes. If the
codes match, the prints
match, and the person
gains access.
Face Recognition
 This project was labeled man-machine because the
human extracted the coordinates of a set of features
from the photographs, which were then used by the
computer for recognition.
 Using a graphics tablet (GRAFACON or RAND TABLET),
the operator would extract the coordinates of features
such as the center of pupils, the inside corner of eyes,
the outside corner of eyes, point of widows peak, and
so on. From these coordinates, a list of 20 distances,
such as width of mouth and width of eyes, pupil to
pupil, were computed.
 These operators could
process about 40 pictures
an hour. When building
the database, the name
of the person in the
photograph was
associated with the list of
computed distances and
stored in the computer.
 In the recognition phase,
the set of distances was
compared with the
corresponding distance
for each photograph,
yielding a distance
between the photograph
and the database
record. The closest
records are returned.
Vein Geometry
 As with irises and fingerprints, a person's veins are
completely unique. Twins don't have identical
veins, and a person's veins differ between their
left and right sides.
 To use a vein recognition system, you simply
place your finger, wrist, palm or the back of your
hand on or near the scanner.
 A camera takes a
digital picture using
near-infrared light. The
haemoglobin in your
blood absorbs the light,
so veins appear black in
the picture.
 As with all the other
biometric types, the
software creates a
reference template
based on the shape
and location of the vein
structure.
 All these techniques have a similar way of functioning.
 When a retina, iris, fingerprint, etc are scanned for the
first time the unique features in the form of data is
stored in the database.
 Next time when the same person uses the scanner, the
computer matches the data already stored in it with
the data of the retina, iris or fingerprint, instead of
performing the process all over again.
Biometrics in India
 India's national ID program called Aadhaar is the
largest biometric database of the world. It is a
digital identity of a person assigned for a lifetime.
 It is based on biometric data(fingerprint, iris
scan and face photo), along with demographic
data (name, age, gender, address, etc.) of a
person.
Applications of Biometrics in Technology

More Related Content

What's hot

What's hot (20)

Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 

Viewers also liked

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowFaithCWorth
 
Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Rockwell Collins | ARINC airports
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS Animetrics
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 
Optical camouflage by nva93
Optical camouflage by nva93Optical camouflage by nva93
Optical camouflage by nva93Nithin V A
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 

Viewers also liked (18)

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Optical camouflage by nva93
Optical camouflage by nva93Optical camouflage by nva93
Optical camouflage by nva93
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 

Similar to Applications of Biometrics in Technology

Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 
Class PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxClass PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxDivyaKumari588020
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignments1180051
 

Similar to Applications of Biometrics in Technology (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
14 5 b8
14 5 b814 5 b8
14 5 b8
 
Vein rishabh
Vein rishabhVein rishabh
Vein rishabh
 
Class PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxClass PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptx
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignment
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Applications of Biometrics in Technology

  • 1. Applications of Biometrics in Technology Presented by: Sanjay Khubchandani FY MSc IT 04 NVPAS
  • 2. What is Biometrics?  The word “biometrics” comes form two Greek words – ‘bio’ meaning life and ‘metric’ meaning to measure.  It includes recognition by retina, iris, fingerprints, face, vein geometry, voice patterns, hand measurements, etc which are used to identify human characteristics and to verify identity.
  • 3.  There is a wide range of usage of Biometric in the field of Information Technology..  Some of them are as follows…
  • 4. Retina Scanning  It is a biometric technique that uses the unique patterns formed by blood vessels on a person's retina.  The network of blood vessels in the retina is not entirely genetically determined, as a result even identical twins do not share a similar pattern.  It was known from 1930s that each human eyeball has unique characteristics. This information was later put to use and in 1984 the first retinal scanner was made available for commercial use by a company called EyeDentify.
  • 5.  The retinal scan uses a low-intensity light source and a sensor to scan the pattern of blood vessels at the back of the retina.  As the retinal blood vessels absorb light more readily than the surrounding tissue, the amount of reflection varies and the blood vessels appear darker compared to other tissues.  The pattern of variations is digitized and stored in a database.
  • 6.  ADVANTAGES  Low error rate of 1 in 10,00,000.  Highly Reliable  Easy to use.  DISADVANTAGES  Measurement accuracy can be affected by certain diseases such as cataract, astigmatism, diabetes, etc.  Invasive scanning process.  Not very user friendly  High equipment cost
  • 7. Retina Scanning The controls of a Topocon Retinal Camera.. Scanners can be made handheld and easily portable, like this one being used by the US Army, or wall-mounted for convenience in places like airports.
  • 8. Iris Scanning  Similar to a retina scan, an iris scan also makes use of the uniqueness of your eyes.  In an iris scan, the different patterns in your iris are scanned and stored.  In 1994, US-born mathematician John Daugman develops the algorithms that can turn photographs of irises into unique numeric codes. He is granted US patent #5,291,560 for a "biometric personal identification system based on iris analysis" .
  • 9.  The eyes of a person are digitally photographed with both ordinary light and infrared light(it has a slightly longer wavelength than ordinary red light).  The infrared helps to show the patterns of dark coloured eyes as it is not very clear in ordinary light.  These two digital photographs, are then analyzed by a computer which identifies around 240 unique features.  These features, are turned into a 512-digit number called an Iris Code that is stored in a computer database.
  • 10.  ADVANTAGES  Accuracy and reliability  Patterns of iris remain unchanged for long periods of time.  Hygienic as direct contact with the scanner is not needed.  DISADVANTAGES  High initial cost of equipments.
  • 11. Fingerprint Scanning  When a computer checks your fingerprints, there obviously isn't a little person with a magnifying glass sitting inside, comparing your fingerprints with all the hundreds or thousands stored in the database!  So how can a computer compare prints? During enrolment or verification, each print is analyzed for very specific features called minutiae, where the lines in your fingerprint terminate or split in two.
  • 12.  The computer measures the distances and angles between these features— a bit like drawing lines between them—and then uses an algorithm (mathematical process) to turn this information into a unique numeric code. Comparing fingerprints is then simply a matter of comparing their unique codes. If the codes match, the prints match, and the person gains access.
  • 13. Face Recognition  This project was labeled man-machine because the human extracted the coordinates of a set of features from the photographs, which were then used by the computer for recognition.  Using a graphics tablet (GRAFACON or RAND TABLET), the operator would extract the coordinates of features such as the center of pupils, the inside corner of eyes, the outside corner of eyes, point of widows peak, and so on. From these coordinates, a list of 20 distances, such as width of mouth and width of eyes, pupil to pupil, were computed.
  • 14.  These operators could process about 40 pictures an hour. When building the database, the name of the person in the photograph was associated with the list of computed distances and stored in the computer.  In the recognition phase, the set of distances was compared with the corresponding distance for each photograph, yielding a distance between the photograph and the database record. The closest records are returned.
  • 15. Vein Geometry  As with irises and fingerprints, a person's veins are completely unique. Twins don't have identical veins, and a person's veins differ between their left and right sides.  To use a vein recognition system, you simply place your finger, wrist, palm or the back of your hand on or near the scanner.
  • 16.  A camera takes a digital picture using near-infrared light. The haemoglobin in your blood absorbs the light, so veins appear black in the picture.  As with all the other biometric types, the software creates a reference template based on the shape and location of the vein structure.
  • 17.  All these techniques have a similar way of functioning.  When a retina, iris, fingerprint, etc are scanned for the first time the unique features in the form of data is stored in the database.  Next time when the same person uses the scanner, the computer matches the data already stored in it with the data of the retina, iris or fingerprint, instead of performing the process all over again.
  • 18. Biometrics in India  India's national ID program called Aadhaar is the largest biometric database of the world. It is a digital identity of a person assigned for a lifetime.  It is based on biometric data(fingerprint, iris scan and face photo), along with demographic data (name, age, gender, address, etc.) of a person.