SlideShare a Scribd company logo
1 of 18
Biometrics Authentication
      Technology
                   Submitted By:
                    Navin Kumar
                    09EAXEC075
                    Navin Kumar
Three main types of authentication
           available today are:

•   Something you know, like a password, PIN,
    or code.


•   Something you have, like a swipe card, smart
    card, token, or key.


•   Something you are, which is biometrics.
What is a biometric?

   Biometrics are automated methods of identifying a
    person or verifying the identity of a person based on
    a physiological or behavioural characteristic.

   Most definitive, real-time tool available today.

   Can be combined with other tools to form more
    secure, easier to use verification solutions.

   Recognizes individuals definitively.
Characteristics

The common Physical characteristics are:

   Fingerprint
   Face
   Retina
   Iris
   Vein pattern
   Hand and finger geometry
Characteristics
Behavioral characteristics are:

   Keystroke dynamics


   Voice


   Gait


   Signature dynamics
Biometrics Process

                  new biometric sample is requested.
                                                           No

                                  Signal Processing,       Quality
  Biometric       Transmission   Feature Extraction,      Sufficient?
Data Collection                     Representation

                                                                Yes

                                                       Generate Template


                                       Database         Template Match


                                         Yes              Decision
                                                         Confidence?
                                          No
Fingerprint Recognition steps:




                          Database
Face recognition process:

Input face                                     Extraction of
                               Extraction of   face features
  image                         face image




                             Positive

                                                Database
                            Negative
Iris Identification Steps:

Input of face                                           Recognition of
                     Detection of
   image                            Put iris in focus    iris pattern
                     eye regions




                                      Accept

                                                             Database
                                       Reject
Vein Recognition System:

 Input of palm   The output   Generate veins
    picture       picture       structure




                     Match

                                 Database
                  Not match
Signature Verification Process




 the angle at which the pen is held,
 the number of times the pen is lifted,
 the time it takes to write the entire signature,    Biometric
                                                        trait
 the pressure exerted by the person while signing,

 the variations in the speed with which different
  parts of the signature are written.
Aadhaar

One-time standardized Aadhaar enrollment establishes uniqueness of resident via
„biometric de-duplication‟
  • Only one Aadhaar number per eligible individual

Online Authentication is provided by UIDAI
 • Demographic Data (Name, Address, DOB, Gender)
 • Biometric Data (Fingerprint, Iris, Face)

Aadhaar :subject to online authentication is proof of ID

   Aadhaar enrollment / Update =    Aadhaar No. Issued,     “Verification” of KYC
               KYC                 stored in Auth. Server     (Authentication)




                                                                                    13
Applications Area of Biometric


Enterprise and E-Government services

National Security

Airport, Bank, Offices

Recently implemented in ATM, Voting Machine

Internet Banking

Biometric Time Attendance System
Advantages of biometrics
Disadvantages of Biometrics

Costly.


Facial imaging can also hinder accurate identifications.


Missing body part problem.


False acceptances and rejections.


The scanning of eye is fearful.

The nervousness that people feel about the scanners
identification.
Conclusion

                  Not perfect yet.

              Successful applications.

    Decreasing costs and increasing convenience.

    Increasing both privacy and identity security.

         The field of biometrics is evolving.

           Benefit from this technology .
Biometric authentication ppt by navin 6 feb

More Related Content

What's hot (20)

Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Moneypad
MoneypadMoneypad
Moneypad
 
Face recognition
Face recognitionFace recognition
Face recognition
 

Similar to Biometric authentication ppt by navin 6 feb

Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Presentation F7 corporation_en
Presentation F7 corporation_enPresentation F7 corporation_en
Presentation F7 corporation_engaviles01
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
How AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive OverviewHow AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive OverviewFTx Identity
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasTenet Systems Pvt Ltd
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBirkumarJana
 

Similar to Biometric authentication ppt by navin 6 feb (20)

Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Biomatric
BiomatricBiomatric
Biomatric
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
Presentation F7 corporation_en
Presentation F7 corporation_enPresentation F7 corporation_en
Presentation F7 corporation_en
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
biomatric system
biomatric systembiomatric system
biomatric system
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Face and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial IntelligenceFace and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial Intelligence
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
How AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive OverviewHow AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive Overview
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Biometric
Biometric Biometric
Biometric
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
 

More from Navin Kumar

Fat indian wedding
Fat indian weddingFat indian wedding
Fat indian weddingNavin Kumar
 
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)Navin Kumar
 
Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)Navin Kumar
 
Encoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper pptEncoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper pptNavin Kumar
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyNavin Kumar
 
Embedded Systems
Embedded SystemsEmbedded Systems
Embedded SystemsNavin Kumar
 

More from Navin Kumar (9)

Fat indian wedding
Fat indian weddingFat indian wedding
Fat indian wedding
 
Axis bank
Axis bankAxis bank
Axis bank
 
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
 
Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)
 
Encoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper pptEncoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper ppt
 
Nanogenerator
NanogeneratorNanogenerator
Nanogenerator
 
Image Converter
Image ConverterImage Converter
Image Converter
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Embedded Systems
Embedded SystemsEmbedded Systems
Embedded Systems
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Biometric authentication ppt by navin 6 feb

  • 1. Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075 Navin Kumar
  • 2. Three main types of authentication available today are: • Something you know, like a password, PIN, or code. • Something you have, like a swipe card, smart card, token, or key. • Something you are, which is biometrics.
  • 3. What is a biometric?  Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioural characteristic.  Most definitive, real-time tool available today.  Can be combined with other tools to form more secure, easier to use verification solutions.  Recognizes individuals definitively.
  • 4. Characteristics The common Physical characteristics are:  Fingerprint  Face  Retina  Iris  Vein pattern  Hand and finger geometry
  • 5. Characteristics Behavioral characteristics are:  Keystroke dynamics  Voice  Gait  Signature dynamics
  • 6.
  • 7. Biometrics Process new biometric sample is requested. No Signal Processing, Quality Biometric Transmission Feature Extraction, Sufficient? Data Collection Representation Yes Generate Template Database Template Match Yes Decision Confidence? No
  • 9. Face recognition process: Input face Extraction of Extraction of face features image face image Positive Database Negative
  • 10. Iris Identification Steps: Input of face Recognition of Detection of image Put iris in focus iris pattern eye regions Accept Database Reject
  • 11. Vein Recognition System: Input of palm The output Generate veins picture picture structure Match Database Not match
  • 12. Signature Verification Process  the angle at which the pen is held,  the number of times the pen is lifted,  the time it takes to write the entire signature, Biometric trait  the pressure exerted by the person while signing,  the variations in the speed with which different parts of the signature are written.
  • 13. Aadhaar One-time standardized Aadhaar enrollment establishes uniqueness of resident via „biometric de-duplication‟ • Only one Aadhaar number per eligible individual Online Authentication is provided by UIDAI • Demographic Data (Name, Address, DOB, Gender) • Biometric Data (Fingerprint, Iris, Face) Aadhaar :subject to online authentication is proof of ID Aadhaar enrollment / Update = Aadhaar No. Issued, “Verification” of KYC KYC stored in Auth. Server (Authentication) 13
  • 14. Applications Area of Biometric Enterprise and E-Government services National Security Airport, Bank, Offices Recently implemented in ATM, Voting Machine Internet Banking Biometric Time Attendance System
  • 16. Disadvantages of Biometrics Costly. Facial imaging can also hinder accurate identifications. Missing body part problem. False acceptances and rejections. The scanning of eye is fearful. The nervousness that people feel about the scanners identification.
  • 17. Conclusion Not perfect yet. Successful applications. Decreasing costs and increasing convenience. Increasing both privacy and identity security. The field of biometrics is evolving. Benefit from this technology .