Your SlideShare is downloading. ×
0
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Biometric Technology
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Biometric Technology

3,223

Published on

Vikram Gupta's Pecha Kucha

Vikram Gupta's Pecha Kucha

1 Comment
7 Likes
Statistics
Notes
  • This slide show is simple and to the point about biometric identification
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
3,223
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
362
Comments
1
Likes
7
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. INTRODUCTION TO BIOMETRIC TECHNOLOGY By VIKRAM KUMAR GUPTA
  • 2. Introduction Person Identification: _In the early days of civilization, people lived in small communities and everyone knew each other _With the population growth and increase in mobility, we started relying on documents and secret codes to establish identity Person identification is now an integral part of the infrastructure needed for diverse business sectors such as banking, border control, and law enforcement
  • 3. How People are Identified? People are identified by three basic means: -something they have (Passport ,Credit card) -something they know (Password, PIN) -something they are (Human body)
  • 4. Some Problems…and a Solution •Card may be lost, stolen or forgotten • The traditional approaches are unable to differentiate between an authorized person and an imposter •Too many passwords to remember We need An approach which can uniquely identify an authorized person and is easy to operate …Biometric
  • 5. What is Biometric? “Biometric is the study of methods for uniquely recognizing humans based upon one or more physiological or behavioral traits.” Bios=’life’ Metron=’measure’
  • 6. Requirements for an Ideal Biometric Identifier •Universality • Uniqueness • Permanence • Collectability • Acceptability
  • 7. The Biometric System * ENROLLMENT -Person’s Identity is entered into the database
  • 8. The Biometric System * VERIFICATION: Am I who I claim to be? -One to one comparison -compares a sample against single stored template
  • 9. The Biometric System * IDENTIFICATION: Who am I? -One to many comparison -compares a sample against a database of templates
  • 10. Different of Biometrics Types Biometrics • Physical Biometrics • Iris • Retina • Vein Pattern • Hand Geometry • Face • Fingerprint • Ear shape • Behavioral Biometrics • Keystroke dynamics • Signature dynamics • Walking Gait • Voice
  • 11. Fingerprint Biometrics Types of Recognition
  • 12. FingerprintBiometrics and Matching Types of Extraction commonly used minutiae
  • 13. Types Recognition Face of Biometrics The identification of a person by their facial image characteristics Matching algorithm uses the location and shape of facial attributes
  • 14. Iris Recognition The trabecular meshwork pattern of iris is very distinctive. Iris code (256 bytes)
  • 15. Retinal Recognition Every eye has its own totally unique pattern of blood vessels.
  • 16. Hand and Finger Geometry Identification by measuring either physical characteristics of the fingers or the hands
  • 17. Signature Verification Identification using the dynamic analysis of a signature to authenticate a person 1. X coordinate 2. Y coordinate 3. Pressure 4. Pen azimuth (0°-359°) 5. Pen altitude (0º-90°)
  • 18. Other Recognition Methods Keystroke Dynamics: Measures the typing patterns Gait Recognition: Measures how someone appears while walking Ear: based on the shape of the ear
  • 19. Two Sides of a Coin… Advantages: •Uniqueness •No need to remember Password or carry Cards •Biometrics cannot be lost, stolen or forgotten •More secure than a long password •Not susceptible to traditional dictionary attacks Disadvantages: •Often requires significant computational Equipment. •It cannot be changed: If once forged
  • 20. Thank You All

×