Your SlideShare is downloading. ×
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Biometrics

475

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
475
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
19
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. BySachin Yadav I.T. 3 rd year
  • 2.  The term "biometrics" is derived from the Greek words bio (life) and metric (to measure).  In other words we can say that biometrics are technologies for measuring and analyzing a person's physiological or behavioral characteristics. These characteristics are unique to individuals hence can be used to verify or identify a person.
  • 3.  Based on Passwords, or ID/Swap cards  Can be Lost.  Can be forgotten.  Worse! Can be stolen and used by a thief/intruder to access your data, bank accounts, cards etc….
  • 4.  Face recognition  Fingerprint  Voice recognition  Palm print  Hand Geometry  Iris recognition  Retina Scan  DNA  Signatures  Gait recognition  Keystroke
  • 5.  Effectiveness
  • 6.  Effectiveness : The basic measure of any authentication solution is accuracy . Improper rejection of individuals who should have been successfully authenticated. It results in user frustration and time lost in reauthenticating must still be part of the measurement of overall effectiveness.
  • 7.  Effectiveness  Ease of deployment and use
  • 8.  Ease of deployment and use : No technology can be effective unless and until Its operational and in regular use . The solution should be easy to deploy and maintain & shouldn’t require significant changes to business processes.
  • 9.  Effectiveness  Ease of deployment and use  Enterprise-wide capability
  • 10.  Enterprise-wide capability : while an organization may deploy an authentication solution to meet a single need today . It make sense early in the selection process to look at where and how the use of biometrics expanded to meet future needs .
  • 11.  Effectiveness  Ease of deployment and use  Enterprise-wide capability  Economic consideration
  • 12.  Economic consideration : Keeping cost under control is important even when budgets aren’t under the strain they are today .
  • 13. applications such as computer network login , electronic data security , e-commerce, internet access, ATM , credit card, physical access control, medical records management and distance learning.  Government applications such as national ID cards, driver’s license , social security , border control and passport control.  Forensic applications such as corpse identification , criminal investigation and missing children.  Biometrics airport security devices are also deployed at some of the world’s famous airport to enhance the security standards.  Commercial
  • 14.  Identification: – Match a person’s biometrics against a database to figure out his identity by Finding the closest match . – Commonly referred to as 1:N matching – ‘Criminal Watch-list’ application scenarios .
  • 15.  Verification: – The person claims to be ‘John’, system must match and compare his/hers biometrics with John’s stored Biometrics. – If they match, then user is ‘verified’ or authenticated that he is indeed ‘John’ – Access control application scenarios. – Typically referred as 1:1 matching
  • 16. 1) Iris-based ATM 2)Smart card with fingerprints 3)Fingerprint at check-out counter 4)Face scan at airports
  • 17.  Enhanced security  Can’t copied  Can’t be share  Convenience/control  Accuracy  Can’t be lost  Reduced paper work  Costs
  • 18. 1) Recognition errors : There are two types of recognition errors first is False accept rate (FAR) and second is False Reject rate (FRR). A false Accept is when a non matching pair of biometrics data is wrongly . False Reject is when a matching pair of biometrics data is wrongly rejected. 2) Compromised biometric data : Paradoxically , the greatest strength of biometrics is at the same time its greatest liability. The pattern such as Iris , Retina or palm vein remain the same throughout your life. So user has a limited no. of biometric features.
  • 19. 3) Attacks : There are so many Ways to bypass biometrics system Such as presenting fake biometrics or a copy at sensor for instance a fake finger or fake mask .

×