2. 2
MEET THE TEAM
HABIBUR RAHMAN ZIHAD
ID : 201-15-3541
AHMED NIHAL
ID : 201-15-3491
NAFIM HASSAN POURNO
ID : 201-15-3510
SANJOY RAJBONGSHI
ID:201-15-3510
3. OVERVIEW
.
8/06/20XX 3
⮚Definition of Biometrics
⮚Purpose of biometrics and security
⮚Introduction of subgroups of
biometrics
⮚Current use of biometrics
⮚Conclusion and thoughts on future
developments
4. DEFINITION OF BIOMETRICS
❑ Biometrics are automated methods of identifying a person or
verifying the identity of a person based on physiological or
behavioral characteristics.
❑ Biometric scanning is used for two major purposes :
4
▪ Identification
▪ Authentication
6. FINGERPRINT SCAN
6
⮚The most widely used biometric
technology
⮚Measures the unique, complex
swirls on a person’s fingertip. The
swirls are characterized and
produced as a template requiring
from 250-1000 bytes.
7. HAND SCAN
⮚ Hand scan also known as hand geometry, is a biometric
authentication technology.
⮚ The system maps key features of the topography of a
person’s hand, measuring all the creases on the palm.
⮚ This is more expensive and consider less accurate then
other biometrics.
7
8. IRIS SCAN
⮚ The technology examines the unique patterns of
the iris ,the ring around the pupil. Its very complex.
⮚ Iris scans are non-invasive, The person puts their
face in front of a camera which then analyzes all
the features.
⮚ Even works with corrective lenses.
⮚ Highest accuracy of all the biometric technology
8
9. 8/06/20XX
FACIAL SCAN
⮚ One method is called feature analysis which
tracks about 80 facial characteristics.
⮚ A facial template requires 1300 bytes.
⮚ Essentially, the technology measures the peaks
and valleys of the face.
⮚ More suitable for wide range.
⮚ Expensive
10. VOICE SCAN
⮚ Voice is a behavioural biometrics.
⮚ Voice verification is used with password and PIN
numbers..
⮚ Voice dynamics relies on the production of a “voice
template” that is used to compare with a spoken phrase. A
speaker must repeat a set phrase several times as the
system builds the template..
10
11. OTHERS SCAN
⮚ Signature scan - : Analysis of characteristics is an individuals
signature. May soon help address the very large demand for document
authentication.
⮚ Keystroke scan -: analysis of an individual’s typing pattern. Can be
used along with passwords for a very secure system.
⮚ Body odor, skin pores, wrist/hand veins, DNA, shape of ear, Gait,
etc……………
12. USES OF
BIOMETRICS
12
✔ Network security -: Authentication, ATM, Internet banking.
✔ Non-Network based security -: Home use, content control.
✔ Sensitive Environment -: e.g. government buildings, prisons.
✔ Schools -: Library cards, Computer access, Enrollment.
✔ Businesses -: Time and attendance.
✔ Law Enforcement -: Casino Operations, Super Bowl.7