SlideShare a Scribd company logo
1 of 20
PRESENTATION
ON
BIOMETRICS
By:
Ritesh Kumar Bhanu
B.Tech (CS&E 3rd Year)
R.no.- 1548010008
CONTENTS
 What is Biometric ?
 Why it Use ?
 Role of Biometrics Technology in information Security.
 Common Biometrics Technologies.
 Biometrics Technologies Market Distributions.
 Various Fingerprints Classes.
 Application Of Biometrics.
WHAT IS BIOMETRICS ?
 Automated Methods Of Identification.
 Greek Word “Bio” and “Metric”, Meaning “life
Measurement”.
 Measure and analyses human body characteristics for
Authentication purposes.
Physiological Behavioural
Biometric
WHY IT USE
 Traditional Method Involving password and pin
number.
 Biometrics Highest Level Of Security provide.
 Pattern Recognition System
ROLE OF BIOMETRIC TECHNOLOGIES IN
INFORMATION SECURITY
 Effective way to prove the true Identity of Individual
user
 Biometric devices measure unique characteristic of
each person.
 Biometric device create a more ambitious and user
friendly Environment.
COMMON BIOMETRIC TECHNOLOGIES
 Fingerprint Recognition
 Face Recognition
 Voice Recognition
 Iris Recognition
 Retina Recognition
 Hand Geometry
 Signature Verification
BIOMETRIC TECHNOLOGIES MARKET
DISTRIBUTION
FINGERPRINT RECOGNITION
 Fingerprint recognition is one of the popular
biometric authentication techniques. It refers to the
automated method of verifying a match between
two fingerprint images.
FACE RECOGNITION
 A face recognition system is a computer
applications for automatically identifying or verifying
a person from a digital image or a video frame from
a video source.
VARIOUS FINGERPRINT CLASSES
 Classified into five broad classes
 Classification helps in narrowing down possible
matches
 Distribution is skewed Predominantly towards loops
(>65%)
VARIOUS FINGERPRINT CLASSES
Fingerprints are the patterns formed on the epidermis of
the fingertip. The fingerprints are of three types: arch,
loop and whorl
Arch
DIFFERENT RIDGE CHARACTERISTICS
 Fingerprints can be distinguished based on the
ridge characteristic.
 Ridge characteristics local discontinues in the ridge
flow.
 Why measure ridge characteristics.
THE TECHNOLOGY –STEP BY STEP
 Image from scanner
 Ridge Detection
 Image Enhancement And Binarization
 Thinning
 Minutiae detection and extraction
 Post processing
BIOMETRICS SOFTWARE PROCESS
APPLICATION OF BIOMETRICS
 Banking/Credit
 Computer Network Security
 Mobile Phone Security
 Business and Residential Access Control
 Low Enforcement
 Automobile Security/Access Control
 Military id
 Hotel Access Control
 Time & Attendance
 Criminal Identification
 Airport security
BENEFITS OF BIOMETRICS
 User-Friendly System
 Reduce Fraud
 Better Security And Authenticity
 No Forgotten Password
 Provide greater customer convenience than
carrying cards or tokens
 Increased Accuracy
CONCLUSION
 Biometric is an emerging area with many
opportunities for growth.
 Possibly in the near future, you will not have to
remember PINs and passwords and keys in your
bags or pockets will be things of the past.
Thank you !

More Related Content

What's hot

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 

What's hot (20)

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Similar to Biometrics by ritesh

Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMRoy Awais
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE Roy Awais
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniquesjackofhearty1
 
Biometrics & Finger print Technology
Biometrics & Finger print Technology Biometrics & Finger print Technology
Biometrics & Finger print Technology Mewar University
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 

Similar to Biometrics by ritesh (20)

Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics & Finger print Technology
Biometrics & Finger print Technology Biometrics & Finger print Technology
Biometrics & Finger print Technology
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 

More from Ritesh Kumar Bhanu

Digital Marketing - Ritesh Kumar Bhanu
Digital Marketing - Ritesh Kumar BhanuDigital Marketing - Ritesh Kumar Bhanu
Digital Marketing - Ritesh Kumar BhanuRitesh Kumar Bhanu
 
Digital Marketing for Your Business - Ritesh Kumar Bhanu.pdf
Digital Marketing for Your Business - Ritesh Kumar Bhanu.pdfDigital Marketing for Your Business - Ritesh Kumar Bhanu.pdf
Digital Marketing for Your Business - Ritesh Kumar Bhanu.pdfRitesh Kumar Bhanu
 
1. introduction of digital marketing
1. introduction of digital marketing1. introduction of digital marketing
1. introduction of digital marketingRitesh Kumar Bhanu
 
Industrial Training Report on Java Technology.
Industrial Training Report on Java Technology.Industrial Training Report on Java Technology.
Industrial Training Report on Java Technology.Ritesh Kumar Bhanu
 

More from Ritesh Kumar Bhanu (6)

Digital Marketing - Ritesh Kumar Bhanu
Digital Marketing - Ritesh Kumar BhanuDigital Marketing - Ritesh Kumar Bhanu
Digital Marketing - Ritesh Kumar Bhanu
 
Digital Marketing for Your Business - Ritesh Kumar Bhanu.pdf
Digital Marketing for Your Business - Ritesh Kumar Bhanu.pdfDigital Marketing for Your Business - Ritesh Kumar Bhanu.pdf
Digital Marketing for Your Business - Ritesh Kumar Bhanu.pdf
 
1. introduction of digital marketing
1. introduction of digital marketing1. introduction of digital marketing
1. introduction of digital marketing
 
My daily routine
My daily routineMy daily routine
My daily routine
 
Industrial Training Report on Java Technology.
Industrial Training Report on Java Technology.Industrial Training Report on Java Technology.
Industrial Training Report on Java Technology.
 
Google Glass By Ritesh
Google Glass By RiteshGoogle Glass By Ritesh
Google Glass By Ritesh
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Biometrics by ritesh

  • 2. CONTENTS  What is Biometric ?  Why it Use ?  Role of Biometrics Technology in information Security.  Common Biometrics Technologies.  Biometrics Technologies Market Distributions.  Various Fingerprints Classes.  Application Of Biometrics.
  • 3. WHAT IS BIOMETRICS ?  Automated Methods Of Identification.  Greek Word “Bio” and “Metric”, Meaning “life Measurement”.  Measure and analyses human body characteristics for Authentication purposes.
  • 5. WHY IT USE  Traditional Method Involving password and pin number.  Biometrics Highest Level Of Security provide.  Pattern Recognition System
  • 6. ROLE OF BIOMETRIC TECHNOLOGIES IN INFORMATION SECURITY  Effective way to prove the true Identity of Individual user  Biometric devices measure unique characteristic of each person.  Biometric device create a more ambitious and user friendly Environment.
  • 7. COMMON BIOMETRIC TECHNOLOGIES  Fingerprint Recognition  Face Recognition  Voice Recognition  Iris Recognition  Retina Recognition  Hand Geometry  Signature Verification
  • 8.
  • 10. FINGERPRINT RECOGNITION  Fingerprint recognition is one of the popular biometric authentication techniques. It refers to the automated method of verifying a match between two fingerprint images. FACE RECOGNITION  A face recognition system is a computer applications for automatically identifying or verifying a person from a digital image or a video frame from a video source.
  • 11. VARIOUS FINGERPRINT CLASSES  Classified into five broad classes  Classification helps in narrowing down possible matches  Distribution is skewed Predominantly towards loops (>65%)
  • 12. VARIOUS FINGERPRINT CLASSES Fingerprints are the patterns formed on the epidermis of the fingertip. The fingerprints are of three types: arch, loop and whorl Arch
  • 13. DIFFERENT RIDGE CHARACTERISTICS  Fingerprints can be distinguished based on the ridge characteristic.  Ridge characteristics local discontinues in the ridge flow.  Why measure ridge characteristics.
  • 14.
  • 15. THE TECHNOLOGY –STEP BY STEP  Image from scanner  Ridge Detection  Image Enhancement And Binarization  Thinning  Minutiae detection and extraction  Post processing
  • 17. APPLICATION OF BIOMETRICS  Banking/Credit  Computer Network Security  Mobile Phone Security  Business and Residential Access Control  Low Enforcement  Automobile Security/Access Control  Military id  Hotel Access Control  Time & Attendance  Criminal Identification  Airport security
  • 18. BENEFITS OF BIOMETRICS  User-Friendly System  Reduce Fraud  Better Security And Authenticity  No Forgotten Password  Provide greater customer convenience than carrying cards or tokens  Increased Accuracy
  • 19. CONCLUSION  Biometric is an emerging area with many opportunities for growth.  Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past.