The term "biometrics" is derived from the Greek
words bio (life) and metric (to measure).
In other words we can say that biometrics are
technologies for measuring and analyzing a
person's physiological or behavioral
characteristics. These characteristics are unique
to individuals hence can be used to verify or
identify a person.
Based on Passwords, or ID/Swap cards
Can be Lost.
Can be forgotten.
Worse! Can be stolen and used by a
thief/intruder to access your data, bank
accounts, cards etc….
The basic measure of any authentication solution is
accuracy . Improper rejection of individuals who
should have been successfully authenticated. It results
in user frustration and time lost in reauthenticating
must still be part of the measurement of overall
Ease of deployment and use :
No technology can be effective unless and until
Its operational and in regular use . The solution
should be easy to deploy and maintain & shouldn’t
require significant changes to business processes.
Ease of deployment and use
Enterprise-wide capability :
while an organization may deploy an
authentication solution to meet a single need
today . It make sense early in the selection process
to look at where and how the use of biometrics
expanded to meet future needs .
Ease of deployment and use
Economic consideration :
Keeping cost under control is important even
when budgets aren’t under the strain they are
applications such as computer network
login , electronic data security , e-commerce, internet
access, ATM , credit card, physical access control,
medical records management and distance learning.
Government applications such as national ID cards,
driver’s license , social security , border control and
Forensic applications such as corpse identification ,
criminal investigation and missing children.
Biometrics airport security devices are also deployed at
some of the world’s famous airport to enhance the
– Match a person’s biometrics against a
database to figure out his identity by
Finding the closest match .
– Commonly referred to as 1:N matching
– ‘Criminal Watch-list’ application scenarios .
– The person claims to be ‘John’, system must
match and compare his/hers biometrics with
John’s stored Biometrics.
– If they match, then user is ‘verified’ or
authenticated that he is indeed ‘John’
– Access control application scenarios.
– Typically referred as 1:1 matching
1) Iris-based ATM
2)Smart card with fingerprints
3)Fingerprint at check-out counter
4)Face scan at airports
Can’t be share
Can’t be lost
Reduced paper work
1) Recognition errors :
There are two types of recognition errors first is False
accept rate (FAR) and second is False Reject rate
(FRR). A false Accept is when a non matching pair of
biometrics data is wrongly . False Reject is when a
matching pair of biometrics data is wrongly rejected.
2) Compromised biometric data :
Paradoxically , the greatest strength of biometrics is at
the same time its greatest liability. The pattern such as
Iris , Retina or palm vein remain the same throughout
your life. So user has a limited no. of biometric
3) Attacks :
There are so many Ways to bypass biometrics system
Such as presenting fake biometrics or a copy at sensor
for instance a fake finger or fake mask .