SlideShare a Scribd company logo
1 of 13
BIOMETRIC
TECHNOLOGY
2
MEET THE TEAM
HABIBUR RAHMAN ZIHAD
ID : 201-15-3541
AHMED NIHAL
ID : 201-15-3491
NAFIM HASSAN POURNO
ID : 201-15-3510
SANJOY RAJBONGSHI
ID:201-15-3510
OVERVIEW
.
8/06/20XX 3
⮚Definition of Biometrics
⮚Purpose of biometrics and security
⮚Introduction of subgroups of
biometrics
⮚Current use of biometrics
⮚Conclusion and thoughts on future
developments
DEFINITION OF BIOMETRICS
❑ Biometrics are automated methods of identifying a person or
verifying the identity of a person based on physiological or
behavioral characteristics.
❑ Biometric scanning is used for two major purposes :
4
▪ Identification
▪ Authentication
TYPES OF
BIOMETRICS
PHYSIOLOGICAL BIOMETRICS
BEHAVIORAL BIOMETRICS
5
✔ Fingerprint Recognition
✔ Hand Geometry Recognition
✔ Iris Recognition
✔ Retinal Recognition
✔ Facial Recognition
✔ Voice Recognition
✔ Signature Recognition
✔ Keystroke Recognition
FINGERPRINT SCAN
6
⮚The most widely used biometric
technology
⮚Measures the unique, complex
swirls on a person’s fingertip. The
swirls are characterized and
produced as a template requiring
from 250-1000 bytes.
HAND SCAN
⮚ Hand scan also known as hand geometry, is a biometric
authentication technology.
⮚ The system maps key features of the topography of a
person’s hand, measuring all the creases on the palm.
⮚ This is more expensive and consider less accurate then
other biometrics.
7
IRIS SCAN
⮚ The technology examines the unique patterns of
the iris ,the ring around the pupil. Its very complex.
⮚ Iris scans are non-invasive, The person puts their
face in front of a camera which then analyzes all
the features.
⮚ Even works with corrective lenses.
⮚ Highest accuracy of all the biometric technology
8
8/06/20XX
FACIAL SCAN
⮚ One method is called feature analysis which
tracks about 80 facial characteristics.
⮚ A facial template requires 1300 bytes.
⮚ Essentially, the technology measures the peaks
and valleys of the face.
⮚ More suitable for wide range.
⮚ Expensive
VOICE SCAN
⮚ Voice is a behavioural biometrics.
⮚ Voice verification is used with password and PIN
numbers..
⮚ Voice dynamics relies on the production of a “voice
template” that is used to compare with a spoken phrase. A
speaker must repeat a set phrase several times as the
system builds the template..
10
OTHERS SCAN
⮚ Signature scan - : Analysis of characteristics is an individuals
signature. May soon help address the very large demand for document
authentication.
⮚ Keystroke scan -: analysis of an individual’s typing pattern. Can be
used along with passwords for a very secure system.
⮚ Body odor, skin pores, wrist/hand veins, DNA, shape of ear, Gait,
etc……………
USES OF
BIOMETRICS
12
✔ Network security -: Authentication, ATM, Internet banking.
✔ Non-Network based security -: Home use, content control.
✔ Sensitive Environment -: e.g. government buildings, prisons.
✔ Schools -: Library cards, Computer access, Enrollment.
✔ Businesses -: Time and attendance.
✔ Law Enforcement -: Casino Operations, Super Bowl.7
THANK YOU
8/06/20XX PITCH DECK 13

More Related Content

Similar to Biometrics-Technology-PPT.pptx

Similar to Biometrics-Technology-PPT.pptx (20)

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
SEMINAR.pptx
SEMINAR.pptxSEMINAR.pptx
SEMINAR.pptx
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Biometrics-Technology-PPT.pptx

  • 2. 2 MEET THE TEAM HABIBUR RAHMAN ZIHAD ID : 201-15-3541 AHMED NIHAL ID : 201-15-3491 NAFIM HASSAN POURNO ID : 201-15-3510 SANJOY RAJBONGSHI ID:201-15-3510
  • 3. OVERVIEW . 8/06/20XX 3 ⮚Definition of Biometrics ⮚Purpose of biometrics and security ⮚Introduction of subgroups of biometrics ⮚Current use of biometrics ⮚Conclusion and thoughts on future developments
  • 4. DEFINITION OF BIOMETRICS ❑ Biometrics are automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. ❑ Biometric scanning is used for two major purposes : 4 ▪ Identification ▪ Authentication
  • 5. TYPES OF BIOMETRICS PHYSIOLOGICAL BIOMETRICS BEHAVIORAL BIOMETRICS 5 ✔ Fingerprint Recognition ✔ Hand Geometry Recognition ✔ Iris Recognition ✔ Retinal Recognition ✔ Facial Recognition ✔ Voice Recognition ✔ Signature Recognition ✔ Keystroke Recognition
  • 6. FINGERPRINT SCAN 6 ⮚The most widely used biometric technology ⮚Measures the unique, complex swirls on a person’s fingertip. The swirls are characterized and produced as a template requiring from 250-1000 bytes.
  • 7. HAND SCAN ⮚ Hand scan also known as hand geometry, is a biometric authentication technology. ⮚ The system maps key features of the topography of a person’s hand, measuring all the creases on the palm. ⮚ This is more expensive and consider less accurate then other biometrics. 7
  • 8. IRIS SCAN ⮚ The technology examines the unique patterns of the iris ,the ring around the pupil. Its very complex. ⮚ Iris scans are non-invasive, The person puts their face in front of a camera which then analyzes all the features. ⮚ Even works with corrective lenses. ⮚ Highest accuracy of all the biometric technology 8
  • 9. 8/06/20XX FACIAL SCAN ⮚ One method is called feature analysis which tracks about 80 facial characteristics. ⮚ A facial template requires 1300 bytes. ⮚ Essentially, the technology measures the peaks and valleys of the face. ⮚ More suitable for wide range. ⮚ Expensive
  • 10. VOICE SCAN ⮚ Voice is a behavioural biometrics. ⮚ Voice verification is used with password and PIN numbers.. ⮚ Voice dynamics relies on the production of a “voice template” that is used to compare with a spoken phrase. A speaker must repeat a set phrase several times as the system builds the template.. 10
  • 11. OTHERS SCAN ⮚ Signature scan - : Analysis of characteristics is an individuals signature. May soon help address the very large demand for document authentication. ⮚ Keystroke scan -: analysis of an individual’s typing pattern. Can be used along with passwords for a very secure system. ⮚ Body odor, skin pores, wrist/hand veins, DNA, shape of ear, Gait, etc……………
  • 12. USES OF BIOMETRICS 12 ✔ Network security -: Authentication, ATM, Internet banking. ✔ Non-Network based security -: Home use, content control. ✔ Sensitive Environment -: e.g. government buildings, prisons. ✔ Schools -: Library cards, Computer access, Enrollment. ✔ Businesses -: Time and attendance. ✔ Law Enforcement -: Casino Operations, Super Bowl.7