SlideShare a Scribd company logo
1 of 21
Prepared By :
AKASH DEEP
MAURYA
1351110002
Presentation Outlines
 Authentication & Its types
 Biometric & Why use it ?
 Characteristics & Modes
 Working of Biometric System
 Different Techniques
 Comparison b/w Different techniques
 Application of Biometric Authentication
 Limitations
 Conclusion
 References
Authentication
 Act of confirming something or giving
privileges to access something.
 Process of giving someone identity-he or she
can access that particular application or data.
 For e.g. : Giving identity-card to a student of
an institute.
Types of Authentication
 Passwords, PIN
 Smart card or Swipe card
 Biometric
Biometric
“ something that you are ”
 Two Greek words Bio(Life) and Metric(To Measure).
 Measures and Analyzes - biological traits - human being.
 Automated recognition of an individual - behavioral or
physical characteristics.
 Provides privacy to personal data & high security to
confidential, financial transactions.
Why Biometric ?
 Identity theft is not possible
 Password remembrance problem does not exist
 Cannot be predicted or hacked
 Cannot be shared
 Perceived as more secure
 Accuracy
Characteristics of a Biometric
Recognizing an individual based on two main characteristics :
 Physical characteristics are related to physical shape of the
body. For e.g. Fingerprint, face, hand geometry, iris etc.
 Behavioral characteristics are related to the behavior of a
person. For e.g. Voice pitch, speaking style, typing rhythm,
signature etc.
Modes of Biometric System
Identification
 One-to-many comparison.
 It search for a sample against a database of templates.
 It identifies an unknown individual.
 For e.g. Who is “x” ?
Verification
 One-to-one comparison.
 It compares a sample against a single stored template.
 It verifies the individual’s identity.
 For e.g. Is this “x” ?
Working process
 Enrollment : In this stage, Information captured-sensing
device-stored in database for later comparison. When someone
uses biometric for the first time then the stage is called
enrollment.
 Authentication : Registered biometric sample during the
enrollment process are matched against newly capturing
biometric sample.
Working of Biometric System
Steps :
 Capturing
 Pre-processing
 Feature Extraction
 Template Creation
 Matcher/Comparison
 Application Device
Different biometric technique
Fingerprint technology :
 Oldest and most widely used.
 Registered points are located and compared.
 Optical sensors are used for scanning purpose.
 Affects by impression angle, pressure, dirt, moisture etc.
 It can be used for many applications like pc login security,
voting system, attendance system etc.
Face Recognition Technology :
 For automatic identification or verification of a person from a
digital image.
 These include the position/size/shape of the eyes, nose,
cheekbones and jaw line.
Iris Recognition Technology :
 It measures the iris pattern of the eye i.e. the colored part of
the eye that surrounds the pupil.
 The iris scanner analyzes features like rings, furrows, and
freckles existing in the colored tissue surrounding pupil.
 Iris pattern is not changed over years or by glasses, contact
lenses.
Hand Geometry Technology :
 Uses hand images for identification or verification.
 Person identification utilizes hand images to extract a number
of features such as length, width, thickness, finger area etc.
 Measures the digits of the hand and compares to those
collected at the time of enrollment.
 Places hand on the system which takes the three dimensional
image of the hand.
Voice Recognition Technology :
 Validate user’s claimed identity using
their voice.
 It uses the pitch, pattern, tone,
frequency, rhythm of speech for
identification purposes.
 A telephone or microphone can act as a
sensor.
Comparison between Different
Technique
Applications Limitations
 Criminal identification
 Internet Banking
 Attendance system
 Airport, Bank security
 PC login security
 Prevents unauthorized access to
private data.
 Presence of noise in the sensed
data.
 Variations in the enrolled data
i.e. change in age, disease,
environment etc.
 Non-universality
 It is an expensive security
solution.
Conclusion
 Security of e-commerce or e-government sites -
Enhanced
 The Greatest strength of the biometric system is that
they does not change over time so it is much more
efficient than other traditional security mechanism.
 Accuracy, performance, effectiveness & suitability of
the security systems can be increased.
References
 Wikipedia :
http:en.Wikipedia.org/wiki/Biometric_authentication
 Google Search Engine
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASH

More Related Content

What's hot (20)

Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 

Similar to Biometrics Based Authentication AKASH

A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 

Similar to Biometrics Based Authentication AKASH (20)

A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
Biometric
Biometric Biometric
Biometric
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 

Biometrics Based Authentication AKASH

  • 1. Prepared By : AKASH DEEP MAURYA 1351110002
  • 2. Presentation Outlines  Authentication & Its types  Biometric & Why use it ?  Characteristics & Modes  Working of Biometric System  Different Techniques  Comparison b/w Different techniques  Application of Biometric Authentication  Limitations  Conclusion  References
  • 3. Authentication  Act of confirming something or giving privileges to access something.  Process of giving someone identity-he or she can access that particular application or data.  For e.g. : Giving identity-card to a student of an institute.
  • 4. Types of Authentication  Passwords, PIN  Smart card or Swipe card  Biometric
  • 5. Biometric “ something that you are ”  Two Greek words Bio(Life) and Metric(To Measure).  Measures and Analyzes - biological traits - human being.  Automated recognition of an individual - behavioral or physical characteristics.  Provides privacy to personal data & high security to confidential, financial transactions.
  • 6. Why Biometric ?  Identity theft is not possible  Password remembrance problem does not exist  Cannot be predicted or hacked  Cannot be shared  Perceived as more secure  Accuracy
  • 7. Characteristics of a Biometric Recognizing an individual based on two main characteristics :  Physical characteristics are related to physical shape of the body. For e.g. Fingerprint, face, hand geometry, iris etc.  Behavioral characteristics are related to the behavior of a person. For e.g. Voice pitch, speaking style, typing rhythm, signature etc.
  • 8. Modes of Biometric System Identification  One-to-many comparison.  It search for a sample against a database of templates.  It identifies an unknown individual.  For e.g. Who is “x” ? Verification  One-to-one comparison.  It compares a sample against a single stored template.  It verifies the individual’s identity.  For e.g. Is this “x” ?
  • 9. Working process  Enrollment : In this stage, Information captured-sensing device-stored in database for later comparison. When someone uses biometric for the first time then the stage is called enrollment.  Authentication : Registered biometric sample during the enrollment process are matched against newly capturing biometric sample.
  • 10. Working of Biometric System Steps :  Capturing  Pre-processing  Feature Extraction  Template Creation  Matcher/Comparison  Application Device
  • 11. Different biometric technique Fingerprint technology :  Oldest and most widely used.  Registered points are located and compared.  Optical sensors are used for scanning purpose.  Affects by impression angle, pressure, dirt, moisture etc.  It can be used for many applications like pc login security, voting system, attendance system etc.
  • 12. Face Recognition Technology :  For automatic identification or verification of a person from a digital image.  These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
  • 13. Iris Recognition Technology :  It measures the iris pattern of the eye i.e. the colored part of the eye that surrounds the pupil.  The iris scanner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding pupil.  Iris pattern is not changed over years or by glasses, contact lenses.
  • 14. Hand Geometry Technology :  Uses hand images for identification or verification.  Person identification utilizes hand images to extract a number of features such as length, width, thickness, finger area etc.  Measures the digits of the hand and compares to those collected at the time of enrollment.  Places hand on the system which takes the three dimensional image of the hand.
  • 15. Voice Recognition Technology :  Validate user’s claimed identity using their voice.  It uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes.  A telephone or microphone can act as a sensor.
  • 17. Applications Limitations  Criminal identification  Internet Banking  Attendance system  Airport, Bank security  PC login security  Prevents unauthorized access to private data.  Presence of noise in the sensed data.  Variations in the enrolled data i.e. change in age, disease, environment etc.  Non-universality  It is an expensive security solution.
  • 18. Conclusion  Security of e-commerce or e-government sites - Enhanced  The Greatest strength of the biometric system is that they does not change over time so it is much more efficient than other traditional security mechanism.  Accuracy, performance, effectiveness & suitability of the security systems can be increased.