SlideShare a Scribd company logo
1 of 25
BIOMETRICS 
PRESENTED BY 
Priyanka Srivastava
INTRODUCTION 
“A biometric is a physiological or behavioral characteristic 
of a human being that can distinguish one person from 
another and that theoretically can be used for identification 
or verification of identity.”
AUTOMATED IDENTIFICATION 
BASED ON 
Physiological or behavioral characteristics 
 Physiological examples 
Fingerprints 
Face 
Eyes 
DNA 
 Behavioral examples 
 1-Voice 2-Keystroke
BIOMETRIC AS AUTHENTICATION 
Authentication Depends On 
 What you have 
 What you know 
 What you ARE !
PHYSIOLOGICAL EXAMPLES 
 Fingerprints 
 Face 
 Eyes 
 DNA
FINGERPRINTING
FINGERPRINT 
IDENTIFICATION 
Matching the 
characteristics of a 
fingerprint on file to 
the one presented to 
the system. 
 Reliability depends 
on how many 
“points” you match.
FINGERPRINT TECHNOLOGY 
USES 
Door Locks 
Access Control 
In room safes 
Payment Systems
FACE
FACE WORKS AS 
 A template is generated which is based on nodal 
points and compared against templates. 
 It’s software is- FACEIT® which can take 
someone’s face out of a crowd.
FACIAL RECOGNITION 
 Facial recognition 
systems are built 
on computer 
programs that 
analyze images 
of human faces 
for the purpose 
of identifying 
them. The 
programs take a 
facial image.
EYES WORKS ACCORDING TO 
 Retinal – measures the pattern of 
blood vessels 
• Iris – examines the 
unique patterns of ridges 
on colored portion of the 
eye
DNA WOKS AS- 
Length and protein sequence are 
analyized to generate a DNA 
profile and compared against 
other profiles where it is used.
BEHAVIORAL EXAMPLES 
1-Voice 2-Keystroke
HOW VOICE RECOGNITION 
WORKS 
 compares a pre-recorded 
voice 
message with the 
current user. 
 Can be a data-base 
system or a stand 
alone device
IT’S APPLICATION 
 In Banks 
 In Financial Firms
KEY STROKE 
 It works as 
The user types his password or phrase 
on keyboard. 
System then records the timing of the 
typing and compares the password 
itself .
APPLICATION OF KEY STROKE 
 In Recording Company 
 Technology for firms digital right 
management Company
ADVANTAGES 
Reduces cost within organizations 
 Increases security 
Competitive advantage 
Convenience to employees 
Non-repudiation 
 Eliminates a paper trail
DISADVANTAGES 
 Accuracy of Performance 
 Failure to enroll rate 
 Information Abuse 
May violate privacy
CONCLUSION 
 Biometrics is a technology that can simplify 
the process of authentication 
 Biometrics can be best used in situations 
where specific identity or exception identity 
is desired
Biometric presentation........

More Related Content

What's hot

Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingSoftware Guru
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionM2SYS Technology
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition TechniquesDaksh Verma
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTSaghir Hussain
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware AuthenticationCoder Tech
 
LDA presentation
LDA presentationLDA presentation
LDA presentationMohit Gupta
 
Protection and Security-R.D.Sivakumar
Protection and Security-R.D.SivakumarProtection and Security-R.D.Sivakumar
Protection and Security-R.D.SivakumarSivakumar R D .
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS Animetrics
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentPrahlad Reddy
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMNikhil Ravi
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
resume _jayendra Kadam
resume _jayendra Kadamresume _jayendra Kadam
resume _jayendra KadamJayendra Kadam
 

What's hot (20)

Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
 
Android project-APP ENFORCEMENT LOCK
Android project-APP ENFORCEMENT LOCKAndroid project-APP ENFORCEMENT LOCK
Android project-APP ENFORCEMENT LOCK
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial IntelligenceFace and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial Intelligence
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
LDA presentation
LDA presentationLDA presentation
LDA presentation
 
Protection and Security-R.D.Sivakumar
Protection and Security-R.D.SivakumarProtection and Security-R.D.Sivakumar
Protection and Security-R.D.Sivakumar
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
face recognition
face recognitionface recognition
face recognition
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise Assessment
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
resume _jayendra Kadam
resume _jayendra Kadamresume _jayendra Kadam
resume _jayendra Kadam
 

Viewers also liked

Le reseau des professionnels grecs
Le reseau des professionnels grecsLe reseau des professionnels grecs
Le reseau des professionnels grecsBucephalos Business
 
June 1 prescription for life
June 1 prescription for lifeJune 1 prescription for life
June 1 prescription for lifeGary Thompson
 
8/22國際研習會成果_workshop output
8/22國際研習會成果_workshop output8/22國際研習會成果_workshop output
8/22國際研習會成果_workshop outputCDRI_snowshih
 
برای تدریس زور الکی نزنید
برای تدریس زور الکی نزنیدبرای تدریس زور الکی نزنید
برای تدریس زور الکی نزنیدSelf-employed
 
Sumit Banik_presentation
Sumit Banik_presentationSumit Banik_presentation
Sumit Banik_presentationSumit Banik
 
Chat box - Enterprises communications platform
Chat box - Enterprises communications platform Chat box - Enterprises communications platform
Chat box - Enterprises communications platform Steven Chang
 
Conference and registration details
Conference and registration detailsConference and registration details
Conference and registration detailsBishwjit Ghoshal
 
Passive house design resource efficient comfortable and healthy - Niwat Archi...
Passive house design resource efficient comfortable and healthy - Niwat Archi...Passive house design resource efficient comfortable and healthy - Niwat Archi...
Passive house design resource efficient comfortable and healthy - Niwat Archi...Niwat Architect Co.,ltd.
 

Viewers also liked (19)

Le reseau des professionnels grecs
Le reseau des professionnels grecsLe reseau des professionnels grecs
Le reseau des professionnels grecs
 
Understanding the Quality of the Student Experience in Blended Learning Envir...
Understanding the Quality of the Student Experience in Blended Learning Envir...Understanding the Quality of the Student Experience in Blended Learning Envir...
Understanding the Quality of the Student Experience in Blended Learning Envir...
 
The Compass to Daniel 11
The Compass to Daniel 11The Compass to Daniel 11
The Compass to Daniel 11
 
Korus
KorusKorus
Korus
 
June 1 prescription for life
June 1 prescription for lifeJune 1 prescription for life
June 1 prescription for life
 
8/22國際研習會成果_workshop output
8/22國際研習會成果_workshop output8/22國際研習會成果_workshop output
8/22國際研習會成果_workshop output
 
برای تدریس زور الکی نزنید
برای تدریس زور الکی نزنیدبرای تدریس زور الکی نزنید
برای تدریس زور الکی نزنید
 
Canada
CanadaCanada
Canada
 
Sumit Banik_presentation
Sumit Banik_presentationSumit Banik_presentation
Sumit Banik_presentation
 
Chat box - Enterprises communications platform
Chat box - Enterprises communications platform Chat box - Enterprises communications platform
Chat box - Enterprises communications platform
 
пасха презентация
пасха презентацияпасха презентация
пасха презентация
 
пасха презентация
пасха презентацияпасха презентация
пасха презентация
 
Northeast school of agriculture
Northeast school of agricultureNortheast school of agriculture
Northeast school of agriculture
 
Blended Learning for Secondary School Teachers: Teaching a new programming en...
Blended Learning for Secondary School Teachers: Teaching a new programming en...Blended Learning for Secondary School Teachers: Teaching a new programming en...
Blended Learning for Secondary School Teachers: Teaching a new programming en...
 
Tutorial delicious (1)
Tutorial delicious (1)Tutorial delicious (1)
Tutorial delicious (1)
 
Conference and registration details
Conference and registration detailsConference and registration details
Conference and registration details
 
Passive house design resource efficient comfortable and healthy - Niwat Archi...
Passive house design resource efficient comfortable and healthy - Niwat Archi...Passive house design resource efficient comfortable and healthy - Niwat Archi...
Passive house design resource efficient comfortable and healthy - Niwat Archi...
 
Blended Learning in learner-centered environments – a case study
Blended Learning in learner-centered environments – a case studyBlended Learning in learner-centered environments – a case study
Blended Learning in learner-centered environments – a case study
 
Education
EducationEducation
Education
 

Similar to Biometric presentation........

SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in androidAnshuli Mittal
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in androidAnshuli Mittal
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 

Similar to Biometric presentation........ (20)

NAVE.pptx
NAVE.pptxNAVE.pptx
NAVE.pptx
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Biometric presentation........

  • 1. BIOMETRICS PRESENTED BY Priyanka Srivastava
  • 2. INTRODUCTION “A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.”
  • 3. AUTOMATED IDENTIFICATION BASED ON Physiological or behavioral characteristics  Physiological examples Fingerprints Face Eyes DNA  Behavioral examples  1-Voice 2-Keystroke
  • 4. BIOMETRIC AS AUTHENTICATION Authentication Depends On  What you have  What you know  What you ARE !
  • 5. PHYSIOLOGICAL EXAMPLES  Fingerprints  Face  Eyes  DNA
  • 7. FINGERPRINT IDENTIFICATION Matching the characteristics of a fingerprint on file to the one presented to the system.  Reliability depends on how many “points” you match.
  • 8. FINGERPRINT TECHNOLOGY USES Door Locks Access Control In room safes Payment Systems
  • 10. FACE WORKS AS  A template is generated which is based on nodal points and compared against templates.  It’s software is- FACEIT® which can take someone’s face out of a crowd.
  • 11. FACIAL RECOGNITION  Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them. The programs take a facial image.
  • 12.
  • 13. EYES WORKS ACCORDING TO  Retinal – measures the pattern of blood vessels • Iris – examines the unique patterns of ridges on colored portion of the eye
  • 14.
  • 15. DNA WOKS AS- Length and protein sequence are analyized to generate a DNA profile and compared against other profiles where it is used.
  • 17.
  • 18. HOW VOICE RECOGNITION WORKS  compares a pre-recorded voice message with the current user.  Can be a data-base system or a stand alone device
  • 19. IT’S APPLICATION  In Banks  In Financial Firms
  • 20. KEY STROKE  It works as The user types his password or phrase on keyboard. System then records the timing of the typing and compares the password itself .
  • 21. APPLICATION OF KEY STROKE  In Recording Company  Technology for firms digital right management Company
  • 22. ADVANTAGES Reduces cost within organizations  Increases security Competitive advantage Convenience to employees Non-repudiation  Eliminates a paper trail
  • 23. DISADVANTAGES  Accuracy of Performance  Failure to enroll rate  Information Abuse May violate privacy
  • 24. CONCLUSION  Biometrics is a technology that can simplify the process of authentication  Biometrics can be best used in situations where specific identity or exception identity is desired