SlideShare a Scribd company logo
1 of 19
TREY
research
1
Biometrics
MBA – Management Information System
TAGUIG CITY UNIVERSITY Ticoy
TREY
research
What is Biometrics?
-is the measurement of physiological characteristics like –
but not limited to – fingerprint, iris patterns, or facial
features that can be used to identify an individual
-The measurement and statistical analysis of a person’s
unique characteristics.
3
TREY
research
Timeline of Biometrics
• 1858 – First systematic capture of hand images for identification purposes is recorded
• Sir William Herschel, working for the Civil Service of India, recorded a handprint on the
back of a contract for each worker to distinguish employees from others who might
claim to be employees when payday arrived
1903 – NY State Prisons begin using fingerprints
-“The New York Civil Service Commission established the practice of fingerprinting
applicants to pre-vent them from having better qualified persons take their tests for
them.” This practice was adopted by the New York state prison system where
fingerprints were used “for the identification of criminals in 1903
1936 – Concept of using the iris pattern for identification is proposed
-Ophthalmologist Frank Burch proposed the concept of using iris patterns as a
method to recognize an individual.
• 1963 – Hughes research paper on fingerprint automation is published
• 1965 -Automated signature recognition research begins
• North American Aviation developed the first signature recognition system in 1965.
4
TREY
research
1936 – Concept of using the iris pattern for identification is proposed
-Ophthalmologist Frank Burch proposed the concept of using iris patterns as a
method to recognize an individual.
1963 – Hughes research paper on fingerprint automation is published
1965 -Automated signature recognition research begins
North American Aviation developed the first signature recognition system in 1965.
1976 – First prototype system for speaker recognition is developed
Texas Instruments developed a prototype speaker recognition system that was tested by
the US Air Force and The MITRE Corporation.
1986 – Patent was awarded stating that the iris can be used for identification
Drs. Leonard Flom and Aran Safir were awarded a patent for their concept that the iris
could be used for identification
1993 – FacE REcognition Technology (FERET) program is initiated
2013 – Apple includes fingerprint scanners into consumer-targed smartphones
5
TREY
research
BIOMETRICSYSTEMPROCESSFLOW
Acquire
Biometric Data
Processing:
Extract Features
and Generate
Template
Registration of
Allowed User
Matching
Allowed User
Add a footer 6
TREY
research
BIOMETRICSIDENTIFIERS
COMMON
1. Finger Print Recognition
2. Face Recognition
3. Voice Recognition
4. Iris Recognition
5. Hand Geometry
6. DNA
OTHERS
1. Thermograms - visual displays of the amount of infrared
energy emitted, transmitted, and reflected by an object
2. Gait- is the pattern of movement of the limbs of animals,
including humans, during locomotion over a solid substrate
3. Keystroke - one touch of one of the keys on a computer or
typewriter keyboard
4. Ear Recognition - consists of ear detection and ear
recognition (authentication and identification) modules
5. Skin Reflection - reflectometry devices are often used to
gauge human skin color through the measurement of skin
reflectance
6. Lip Motion – movement of Lips
7. Body Odor - attempt to identify individuals based on a
unique chemical pattern
7
TREY
research
1.HandGeometry
- is a biometric that identifies users from the shape of their hands. Hand
geometry readers measure a user's hand along many dimensions including
height, width, deviation, and angle and compare those measurements to
measurements stored in a file
- Hand geometry is based on the palm and fingers structure, including width
of the fingers in different places, length of the fingers, thickness of the
palm area, etc.
8
TREY
research
- Advantages:
- hand recognition is a simple technique which is very easy to use and does not require
much memory space.
- user-friendliness
- speed of operation
- Disadvantages:
- Hand geometry is time sensitive and the shape of the hand can be changed during
illness, aging or weight changing. It is actually based on the fact that every person has
differently formed hand which will not drastically change in the future.
- The hand injury can potentially have great impact on the recognition system
- From a hundred randomly chosen persons, at least two will have similar hand geometry
- It is obvious that this technique is easy to forge by finding the most appropriate hand
(one has to find the hand that is “close enough”)
9
TREY
research
2.VoiceRecognition
- is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken
commands. Voice recognition has gained prominence and use with the rise of AI and intelligent assistants,
such as Amazon's Alexa, Apple's Siri and Microsoft's Cortana and Intelligent Lighting
• How voice recognition works
• Voice recognition software on computers requires that analog audio be converted into digital signals,
known as analog-to-digital conversion. The speech patterns are stored on the hard drive and loaded into
memory when the program is run. A comparator checks these stored patterns against the output of
the A/D converter -- an action called pattern recognition
• Advantages - voice recognition technology can quickly turn your spoken work into written text
• Disadvantages
• Background noise can produce false input, which can be avoided by using the system in a quiet room
• There is also a problem with words that sound alike, but that are spelled differently and have different
meanings -- for example, hear and here
10
TREY
research
History of Finger Print Scanning:
- Fingerprints were used as signatures in ancient Babylon in the second
millennium BCE246 BCE, Chinese officials were impressing their fingerprints
into the clay seals used to seal documents.
- By 650, the Chinese historian Kia Kung-Yen stated that fingerprints could be
used as a means of authentication.
- a Fingerprint Bureau was set up in Kolkata, India, in 1897, in order to use
fingerprints for the classification of criminal records. Across the world,
fingerprint evidence is key to solving a crime.
• Advantages:
• it allows fast and easy one-finger access to unlock devices since it is
not easy to fake fingerprints and break the system. Also, unlike your
signature, you can’t forget your fingerprint.
• Disadvantages:
- if someone has got finger injuries or dirty fingrs, then they can interrupt
successful fingerprint scanning and can deny access and cause
confusion among authorized users
- if an employee has not placed his/ her fingerprint in the right spot, the
fingerprint scanner can get confused and incorrectly reject the
employee’s fingerprint
3.FingerprintScanning
11
- are security systems of biometrics. They are used in police
stations, security industries, smartphone, and other mobile
devices. Since Everyone has patterns of friction ridges on
their fingers, it is difficult to alter. they are used to unlock
doors and in other security applications where access is
controlled and monitored closely.
TREY
research
4.FacialRecognition
- is a technology capable of matching a human face from a digital image or a video
frame against a database of faces, typically employed to authenticate users through ID
Verification Services, works by pinpointing and measuring facial features from a given
image. Best example is using face to unlock phones / Mission Impossible movie
- Advantage: One key advantage of a facial recognition system that it is able to perform
mass identification as it does not require the cooperation of the test subject to work.
Properly designed systems installed in airports, multiplexes, and other public places can
identify individuals among the crowd, without passers-by even being aware of the system.
- Disadvantage:
- Face recognition has been getting pretty good at full frontal faces and 20 degrees off,
but as soon as you go towards profile, there've been problems
- Face recognition is less effective if facial expression vary. A big smile can render the
system less effective
12
TREY
research
PopularprojectswithFacialRecognition
- -At the American football championship game Super Bowl XXXV in January 2001, police
in Tampa Bay, Florida used Viisage face recognition software to search for potential
criminals and terrorists in attendance at the event. 19 people with minor criminal records
were potentially identified
- celebrity Taylor Swift surreptitiously employed facial recognition technology at a concert
in 2018. The camera was embedded in a kiosk near a ticket booth and scanned concert-
goers as they entered the facility for known stalkers
- American football stadiums of New York and Los Angeles announced the installation of
facial recognition for upcoming matches. The purpose is to make the entry process as
touchless as possible
- Disney's Magic Kingdom, near Orlando, Florida, likewise announced a test of facial
recognition technology to create a touchless experience during the pandemic; the test
was originally slated to take place between March 23 and April 23, 2021, but the limited
timeframe had been removed as of late April
13
TREY
research
• is an automated method of biometric identification that uses
mathematical pattern-recognition techniques on video images of
one or both of the irises of an individual's eyes, whose complex
patterns are unique, stable, and can be seen from some distance.
• a form of biometric identification that can verify the uniqueness of
an individual with exceptional accuracy
• At least 1.5 billion persons around the world (including 1.2 billion
citizens of India, in the UIDAI / Aadhaar programme) have been
enrolled in iris recognition systems for national ID, e-government
services, benefits distribution, security, and convenience purposes
such as passport-free automated border-crossings
14
5.IrisRecognition
TREY
research
IrisRecognition
Advantages:
• It is an internal organ that is well protected against damage and
wear by a highly transparent and sensitive membrane
(the cornea)
• The chance of false matches for either is extremely low even
genetically identical individuals (and the left and right eyes of
the same individual) have completely independent iris textures
• Iris recognition works with clear contact lenses, eyeglasses,
and non-mirrored sunglasses
• No contact required
Disadvantages:
• Iris recognition is very difficult to perform at a distance larger
than a few meters and if the person to be identified is not
cooperating by holding the head still and looking into the
camera
• The first study on surgical patients involved modern cataract
surgery and showed that it can change iris texture in such a
way that iris pattern recognition is no longer feasible or the
probability of falsely rejected subjects is increased
15
TREY
research
6.DNAMatching
- is the process of sequencing your DNA and comparing it to the DNA of
other people in a database. When a person with a significant amount of
DNA that is identical to yours is found, that can indicate that you have a
common ancestor.
- DNA is made up of billions of letters of the genetic code and, amazingly,
99.9 percent of that code is exactly the same in every human. ... The
probability of the DNA profiles of two unrelated individuals matching is on
average less than 1 in 1 billion
16
TREY
research
DNAMatchingHistory
- The first patent covering the direct use of DNA variation for forensics was filed by Jeffrey
Glassberg in 1983, based upon work he had done while at Rockefeller University in 1981. In
the United Kingdom, Geneticist Sir Alec Jeffreys[5][6][7][8] independently developed a DNA
profiling process beginning in late 1984. DNA is made up of billions of letters of the genetic
code and, amazingly, 99.9 percent of that code is exactly the same in every human. ... The
probability of the DNA profiles of two unrelated individuals matching is on average less
than 1 in 1 billion
- The process was first used forensically in the solving of the murder of two teenage girls
who had been raped and murdered in Narborough, Leicestershire in 1983 and 1986. In the
murder inquiry, led by Detective David Baker, the DNA contained within blood samples
obtained voluntarily from around 5,000 local men who willingly assisted Leicestershire
Constabulary with the investigation, resulted in the exoneration of a man who had
confessed to one of the crimes, and the subsequent conviction of Colin Pitchfork
17
TREY
research
DNAMatchingAdvantagesandDisadvantages
Advantages:
1. Disease Screening - capability to screen for risk factors and genetic diseases.
People who plan to become parents can be tested in order to determine if they
carry the genes that could cause certain conditions, and which might be present in
other members of their families
2. Identification - its use in criminal investigations. DNA tests are done to identify
suspects in crimes, when he or she leaves DNA evidence behind at a crime scene and
then is identified later via DNA tests
Disadvantages:
1. Privacy Issues - possibility of invasion of a person’s privacy. DNA reveals a lot
about a person, making it extremely sensitive information that must be guarded
2. Consequences Of Test Results - Many risks associated involve the social,
financial, or emotional consequences of the test results. People might feel guilty
or angry.
18
TREY
research
Submitted by: Christopher S. Ticoy
0919-8034727
Christophers.Ticoy@gmail.com
19
Taguig City University
Dr. Emelyn Quintos Libunao
Submitted to:

More Related Content

What's hot

Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System Sadan Khan
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication finalAshok Kuikel
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition Systemchristywong1234
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 

What's hot (20)

IRIS Scaner
 IRIS Scaner IRIS Scaner
IRIS Scaner
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication final
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Seminar
SeminarSeminar
Seminar
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
14 5 b8
14 5 b814 5 b8
14 5 b8
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 

Similar to Biometrics Basics

Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace SystemAgbona Azeez
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4sakshi_20
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Biometrics application
Biometrics applicationBiometrics application
Biometrics applicationDivya Shah
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Fingerprint recognitions on smart phone
Fingerprint recognitions on smart phoneFingerprint recognitions on smart phone
Fingerprint recognitions on smart phonektcube
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication'Femi Akin-Laguda
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxMewar University
 
Palm Authentication using Biometrics system
Palm Authentication using Biometrics systemPalm Authentication using Biometrics system
Palm Authentication using Biometrics systemDarshan Parate
 

Similar to Biometrics Basics (20)

Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
seminar_report
seminar_reportseminar_report
seminar_report
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometrics application
Biometrics applicationBiometrics application
Biometrics application
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Biometrics
BiometricsBiometrics
Biometrics
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Fingerprint recognitions on smart phone
Fingerprint recognitions on smart phoneFingerprint recognitions on smart phone
Fingerprint recognitions on smart phone
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Palm Authentication using Biometrics system
Palm Authentication using Biometrics systemPalm Authentication using Biometrics system
Palm Authentication using Biometrics system
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Biometrics Basics

  • 2. Biometrics MBA – Management Information System TAGUIG CITY UNIVERSITY Ticoy
  • 3. TREY research What is Biometrics? -is the measurement of physiological characteristics like – but not limited to – fingerprint, iris patterns, or facial features that can be used to identify an individual -The measurement and statistical analysis of a person’s unique characteristics. 3
  • 4. TREY research Timeline of Biometrics • 1858 – First systematic capture of hand images for identification purposes is recorded • Sir William Herschel, working for the Civil Service of India, recorded a handprint on the back of a contract for each worker to distinguish employees from others who might claim to be employees when payday arrived 1903 – NY State Prisons begin using fingerprints -“The New York Civil Service Commission established the practice of fingerprinting applicants to pre-vent them from having better qualified persons take their tests for them.” This practice was adopted by the New York state prison system where fingerprints were used “for the identification of criminals in 1903 1936 – Concept of using the iris pattern for identification is proposed -Ophthalmologist Frank Burch proposed the concept of using iris patterns as a method to recognize an individual. • 1963 – Hughes research paper on fingerprint automation is published • 1965 -Automated signature recognition research begins • North American Aviation developed the first signature recognition system in 1965. 4
  • 5. TREY research 1936 – Concept of using the iris pattern for identification is proposed -Ophthalmologist Frank Burch proposed the concept of using iris patterns as a method to recognize an individual. 1963 – Hughes research paper on fingerprint automation is published 1965 -Automated signature recognition research begins North American Aviation developed the first signature recognition system in 1965. 1976 – First prototype system for speaker recognition is developed Texas Instruments developed a prototype speaker recognition system that was tested by the US Air Force and The MITRE Corporation. 1986 – Patent was awarded stating that the iris can be used for identification Drs. Leonard Flom and Aran Safir were awarded a patent for their concept that the iris could be used for identification 1993 – FacE REcognition Technology (FERET) program is initiated 2013 – Apple includes fingerprint scanners into consumer-targed smartphones 5
  • 6. TREY research BIOMETRICSYSTEMPROCESSFLOW Acquire Biometric Data Processing: Extract Features and Generate Template Registration of Allowed User Matching Allowed User Add a footer 6
  • 7. TREY research BIOMETRICSIDENTIFIERS COMMON 1. Finger Print Recognition 2. Face Recognition 3. Voice Recognition 4. Iris Recognition 5. Hand Geometry 6. DNA OTHERS 1. Thermograms - visual displays of the amount of infrared energy emitted, transmitted, and reflected by an object 2. Gait- is the pattern of movement of the limbs of animals, including humans, during locomotion over a solid substrate 3. Keystroke - one touch of one of the keys on a computer or typewriter keyboard 4. Ear Recognition - consists of ear detection and ear recognition (authentication and identification) modules 5. Skin Reflection - reflectometry devices are often used to gauge human skin color through the measurement of skin reflectance 6. Lip Motion – movement of Lips 7. Body Odor - attempt to identify individuals based on a unique chemical pattern 7
  • 8. TREY research 1.HandGeometry - is a biometric that identifies users from the shape of their hands. Hand geometry readers measure a user's hand along many dimensions including height, width, deviation, and angle and compare those measurements to measurements stored in a file - Hand geometry is based on the palm and fingers structure, including width of the fingers in different places, length of the fingers, thickness of the palm area, etc. 8
  • 9. TREY research - Advantages: - hand recognition is a simple technique which is very easy to use and does not require much memory space. - user-friendliness - speed of operation - Disadvantages: - Hand geometry is time sensitive and the shape of the hand can be changed during illness, aging or weight changing. It is actually based on the fact that every person has differently formed hand which will not drastically change in the future. - The hand injury can potentially have great impact on the recognition system - From a hundred randomly chosen persons, at least two will have similar hand geometry - It is obvious that this technique is easy to forge by finding the most appropriate hand (one has to find the hand that is “close enough”) 9
  • 10. TREY research 2.VoiceRecognition - is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands. Voice recognition has gained prominence and use with the rise of AI and intelligent assistants, such as Amazon's Alexa, Apple's Siri and Microsoft's Cortana and Intelligent Lighting • How voice recognition works • Voice recognition software on computers requires that analog audio be converted into digital signals, known as analog-to-digital conversion. The speech patterns are stored on the hard drive and loaded into memory when the program is run. A comparator checks these stored patterns against the output of the A/D converter -- an action called pattern recognition • Advantages - voice recognition technology can quickly turn your spoken work into written text • Disadvantages • Background noise can produce false input, which can be avoided by using the system in a quiet room • There is also a problem with words that sound alike, but that are spelled differently and have different meanings -- for example, hear and here 10
  • 11. TREY research History of Finger Print Scanning: - Fingerprints were used as signatures in ancient Babylon in the second millennium BCE246 BCE, Chinese officials were impressing their fingerprints into the clay seals used to seal documents. - By 650, the Chinese historian Kia Kung-Yen stated that fingerprints could be used as a means of authentication. - a Fingerprint Bureau was set up in Kolkata, India, in 1897, in order to use fingerprints for the classification of criminal records. Across the world, fingerprint evidence is key to solving a crime. • Advantages: • it allows fast and easy one-finger access to unlock devices since it is not easy to fake fingerprints and break the system. Also, unlike your signature, you can’t forget your fingerprint. • Disadvantages: - if someone has got finger injuries or dirty fingrs, then they can interrupt successful fingerprint scanning and can deny access and cause confusion among authorized users - if an employee has not placed his/ her fingerprint in the right spot, the fingerprint scanner can get confused and incorrectly reject the employee’s fingerprint 3.FingerprintScanning 11 - are security systems of biometrics. They are used in police stations, security industries, smartphone, and other mobile devices. Since Everyone has patterns of friction ridges on their fingers, it is difficult to alter. they are used to unlock doors and in other security applications where access is controlled and monitored closely.
  • 12. TREY research 4.FacialRecognition - is a technology capable of matching a human face from a digital image or a video frame against a database of faces, typically employed to authenticate users through ID Verification Services, works by pinpointing and measuring facial features from a given image. Best example is using face to unlock phones / Mission Impossible movie - Advantage: One key advantage of a facial recognition system that it is able to perform mass identification as it does not require the cooperation of the test subject to work. Properly designed systems installed in airports, multiplexes, and other public places can identify individuals among the crowd, without passers-by even being aware of the system. - Disadvantage: - Face recognition has been getting pretty good at full frontal faces and 20 degrees off, but as soon as you go towards profile, there've been problems - Face recognition is less effective if facial expression vary. A big smile can render the system less effective 12
  • 13. TREY research PopularprojectswithFacialRecognition - -At the American football championship game Super Bowl XXXV in January 2001, police in Tampa Bay, Florida used Viisage face recognition software to search for potential criminals and terrorists in attendance at the event. 19 people with minor criminal records were potentially identified - celebrity Taylor Swift surreptitiously employed facial recognition technology at a concert in 2018. The camera was embedded in a kiosk near a ticket booth and scanned concert- goers as they entered the facility for known stalkers - American football stadiums of New York and Los Angeles announced the installation of facial recognition for upcoming matches. The purpose is to make the entry process as touchless as possible - Disney's Magic Kingdom, near Orlando, Florida, likewise announced a test of facial recognition technology to create a touchless experience during the pandemic; the test was originally slated to take place between March 23 and April 23, 2021, but the limited timeframe had been removed as of late April 13
  • 14. TREY research • is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance. • a form of biometric identification that can verify the uniqueness of an individual with exceptional accuracy • At least 1.5 billion persons around the world (including 1.2 billion citizens of India, in the UIDAI / Aadhaar programme) have been enrolled in iris recognition systems for national ID, e-government services, benefits distribution, security, and convenience purposes such as passport-free automated border-crossings 14 5.IrisRecognition
  • 15. TREY research IrisRecognition Advantages: • It is an internal organ that is well protected against damage and wear by a highly transparent and sensitive membrane (the cornea) • The chance of false matches for either is extremely low even genetically identical individuals (and the left and right eyes of the same individual) have completely independent iris textures • Iris recognition works with clear contact lenses, eyeglasses, and non-mirrored sunglasses • No contact required Disadvantages: • Iris recognition is very difficult to perform at a distance larger than a few meters and if the person to be identified is not cooperating by holding the head still and looking into the camera • The first study on surgical patients involved modern cataract surgery and showed that it can change iris texture in such a way that iris pattern recognition is no longer feasible or the probability of falsely rejected subjects is increased 15
  • 16. TREY research 6.DNAMatching - is the process of sequencing your DNA and comparing it to the DNA of other people in a database. When a person with a significant amount of DNA that is identical to yours is found, that can indicate that you have a common ancestor. - DNA is made up of billions of letters of the genetic code and, amazingly, 99.9 percent of that code is exactly the same in every human. ... The probability of the DNA profiles of two unrelated individuals matching is on average less than 1 in 1 billion 16
  • 17. TREY research DNAMatchingHistory - The first patent covering the direct use of DNA variation for forensics was filed by Jeffrey Glassberg in 1983, based upon work he had done while at Rockefeller University in 1981. In the United Kingdom, Geneticist Sir Alec Jeffreys[5][6][7][8] independently developed a DNA profiling process beginning in late 1984. DNA is made up of billions of letters of the genetic code and, amazingly, 99.9 percent of that code is exactly the same in every human. ... The probability of the DNA profiles of two unrelated individuals matching is on average less than 1 in 1 billion - The process was first used forensically in the solving of the murder of two teenage girls who had been raped and murdered in Narborough, Leicestershire in 1983 and 1986. In the murder inquiry, led by Detective David Baker, the DNA contained within blood samples obtained voluntarily from around 5,000 local men who willingly assisted Leicestershire Constabulary with the investigation, resulted in the exoneration of a man who had confessed to one of the crimes, and the subsequent conviction of Colin Pitchfork 17
  • 18. TREY research DNAMatchingAdvantagesandDisadvantages Advantages: 1. Disease Screening - capability to screen for risk factors and genetic diseases. People who plan to become parents can be tested in order to determine if they carry the genes that could cause certain conditions, and which might be present in other members of their families 2. Identification - its use in criminal investigations. DNA tests are done to identify suspects in crimes, when he or she leaves DNA evidence behind at a crime scene and then is identified later via DNA tests Disadvantages: 1. Privacy Issues - possibility of invasion of a person’s privacy. DNA reveals a lot about a person, making it extremely sensitive information that must be guarded 2. Consequences Of Test Results - Many risks associated involve the social, financial, or emotional consequences of the test results. People might feel guilty or angry. 18
  • 19. TREY research Submitted by: Christopher S. Ticoy 0919-8034727 Christophers.Ticoy@gmail.com 19 Taguig City University Dr. Emelyn Quintos Libunao Submitted to: