Bio shiv


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Bio shiv

  1. 1. Seminar Presentation on Biometrics Shivank Garg B.Tech(6th Sem) IT(1003213047)
  2. 2. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers totechnologies that measure and analyze humanbody characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns & facial patterns for authentication purpose.
  3. 3. USE OF BIOMETRICS Biometrics are used in two major ways : Identification and Verification. Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity 1of a suspect from crime scene information. Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.
  4. 4. Working of Biometrics
  5. 5. Categories of BiometricsSignature Verification :Handwriting recognition systemssensors can include a touch-sensitive writing surface or a penthat contains sensors that detect angle, pressure anddirection. The software translates the handwriting into agraph and recognizes the small changes in a personshandwriting from day to day and over time.
  6. 6. Fingerprint Analyzing Among all the biometric techniques,fingerprint-based identification is theoldest method, which has beensuccessfully used in numerousapplications. Everyone is known to haveunique fingerprints.
  7. 7. Facial RecognitionFacial recognition software uses theability to recognize a face and thenpinpoint various features of the face.Face recognition works by usinga computer to analyze anindividual’s facial structure. The pointsmeasuredinclude distances between keycharacteristics suchas eyes, nose and mouth, angles of keyfeaturessuch as the jaw and forehead, andlengths ofvarious portions of the face.
  8. 8. Iris recognition Iris recognition is a method of biometricuses pattern recognition techniquesbased on high-resolution images of theirises of an individuals eyes. uniquestructures converted into digitaltemplates, provide mathematicalrepresentations of the iris that yieldunambiguous positive identification of anindividual.
  9. 9. Retinal Scan Oldest biometrics as 1930sresearch suggested Scanninginvolves using a low-intensity lightsource and an optical coupler andcan read the patterns at a greatlevel of accuracy. It does requirethe user to remove glasses, placetheir eye close to the device, andfocus on a certain point. that thepatterns of blood vessels on theback of the human eye were uniqueto each individual
  10. 10. Speaker Recognition Voice authentication, also knownas “speaker verification”, isdefined as the automatedverification of a person’s claimedidentity, based on uniquecharacteristics of their voice. Asimple microphone is enough torecord the voice, and then most ofthe algorithm are analyzing thevoice spectrum. Voice andspeech can be combined to get abetter system:
  11. 11. Advantages of biometrics:1. Uniqueness2. Universality3. Permanence4. Measurability5. User friendliness6. Accuracy7. Comfort
  12. 12. Disadvantages of Biometrics1. Costly.2. Facial imaging can also hinder accurate identifications.3. Missing body part problem.4. The scanning of eye is fearful.
  13. 13. Applications of Biometrics Banking Computer Access National Identity Electronic Data Transfer (EDT) Physical Access Telecommunications Time & Attendance
  14. 14. CONCLUSIONBiometrics is widely being used because of its user friendliness, flexibility in specifying required security level and long term stability.In todays highly connected business environments, securing business-critical data is a vital concern. One of the most problematic areas of security is user authentication. Fortunately, the increasing popularity of biometric devices is making it easier to ensure that users logging into the network are really who they say they are.