SlideShare a Scribd company logo
1 of 16
INTRODUCTION TO
BIOMETRICS
Prepared by : Kaushal Shah
B.E (1st
Semester) Bio-medical Engineering
Outline
 Introduction
 Biometrics techniques
 Strengths, and weaknesses
 FAR/FRR
 Major Players
 Summary
What Is Biometrics
 Biometrics is the reading of a unique human
physical attribute as data, which is then applied to
actuating a system.
 Access control of Secure areas
 Replacing passwords on computers or PDAs
Biometrics Techniques
 Retina scanning
 Iris scanning
 Fingerprint scanning
 Hand scanning
 Face recognition
 Voice recognition & DSV
 Signature recognition
 Keystroke recognition
RETINAL SCANNING
User Looks Into a Viewer and Focuses
on a Point; Infrared Light Scans Retina
Iris Scanning
User looks at a camera
(distance from camera increasing rapidly
to 2-3 feet)
FINGER SCANNING
User Places Finger on Scanning Device
HAND SCANNING
User Places Hand on Device
FACIAL RECOGNITION
User Looks at Camera
User speaks into a microphone or other device,
such as a telephone handset
Signature Recognition
Keystroke Recognition
User signs name on a device
User types standard sample on keyboard
Voice Recognition & DSV
Other Techniques
Strengths, and Weakness
Technique Strengths
Retina Highly accurate
Iris Highly accurate; works with eyeglasses; more acceptable
to users than retina scan
Fingerprint Mature technology; highly accurate; low cost; small size,
becoming widely acceptable
Hand/Finger Geometry accurate and flexible; widely acceptable to users
Face Recognition Widely acceptable to users; low cost; no direct contact;
passive monitoring possible
Voice Recognition Usable over existing telephone system; good for remote
access and monitoring;
Signature Recognition Widely acceptable to users
Keystroke Recognition Widely acceptable to users; low cost; uses existing
hardware.
Strengths, and Weakness
Technique Weaknesses
Retina Inconvenient forpersons with eyeglasses; dislike
contact with device and light beam
Iris New technology, cost, although this is rapidly
changing
Fingerprint Users can create high FRR; some persons dislike
contact with device
Hand/Finger Geometry Userinterface is bulky; dislike contact with device
Face Recognition Face recognition is less accurate than othermethods
Voice Recognition Less accuracy; subject to background noise
Signature Recognition Less accuracy; not widely used yet, but has potential
with PDAs
Keystroke Recognition Less accuracy
FAR & FRR
• FAR(False Acceptance rate) – refers to how often the
system accepts someone it should reject
• FRR(False Rejection Rate) is how often the system
rejects someone it shouldn’t.
FAR
Accept wrong person
FRR
Reject the correct person
HighSecurity LevelLow
Relation of FAR and FRR
Major Players
 Computer access
 Physical access
 Handheld devices
 Military/Govt. Agencies/DOD
 Financial services
 Hospitals
 Telecommunication
Summary
 As biometric technology advances, the cost of systems will
decrease.
 At the same time, biometrics systems will become increasingly
sophisticated and accurate.
 Scientist will physical and behavioral traits will increase the
usefulness of biometrics.
 The general public will gradually come to accept biometric
system.
References
 Fuller, Scott and Pagan, Kevin 1997. Intranet Firewalls “Planning and Implementing
Your Network Security System.” Ventana Communications Group, Inc.
 Conry-Murray, Andrew. Network Magazine. Oct. 1, 2002. p28 Securing End Users from
Attack.
 McCollum, T. Security concerns prompt new initiatives. The Internal Auditor. Oct. 2002.
 Short, Bob. September 2002. Getting the 411 on Biometrics. Security Magazine. p48.
 Tocci, Salvatore. 2000. High-Tech IDs: From Finger Scans To Voice Patterns. Grolier
Publishing
 Mitnick, Kevin & Simon, William L. The Art of Deception: Controlling the Human
Element of Security. Library Journal.

More Related Content

What's hot

Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
RAJASHREE B
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
Akhil Kumar
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
Sarvani Mallipeddi
 

What's hot (19)

Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Palmsecure
PalmsecurePalmsecure
Palmsecure
 
Biometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnologyBiometric securityfujitsupalmveintechnology
Biometric securityfujitsupalmveintechnology
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 

Similar to Introduction to biomectrics_kaushal_shah

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
Mumbai Academisc
 

Similar to Introduction to biomectrics_kaushal_shah (20)

Biometric
Biometric Biometric
Biometric
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometrics
BiometricsBiometrics
Biometrics
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Seetu
SeetuSeetu
Seetu
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Firewalls
FirewallsFirewalls
Firewalls
 

Recently uploaded

scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 

Introduction to biomectrics_kaushal_shah

  • 1. INTRODUCTION TO BIOMETRICS Prepared by : Kaushal Shah B.E (1st Semester) Bio-medical Engineering
  • 2. Outline  Introduction  Biometrics techniques  Strengths, and weaknesses  FAR/FRR  Major Players  Summary
  • 3. What Is Biometrics  Biometrics is the reading of a unique human physical attribute as data, which is then applied to actuating a system.  Access control of Secure areas  Replacing passwords on computers or PDAs
  • 4. Biometrics Techniques  Retina scanning  Iris scanning  Fingerprint scanning  Hand scanning  Face recognition  Voice recognition & DSV  Signature recognition  Keystroke recognition
  • 5. RETINAL SCANNING User Looks Into a Viewer and Focuses on a Point; Infrared Light Scans Retina Iris Scanning User looks at a camera (distance from camera increasing rapidly to 2-3 feet)
  • 6. FINGER SCANNING User Places Finger on Scanning Device
  • 7. HAND SCANNING User Places Hand on Device
  • 9. User speaks into a microphone or other device, such as a telephone handset Signature Recognition Keystroke Recognition User signs name on a device User types standard sample on keyboard Voice Recognition & DSV Other Techniques
  • 10. Strengths, and Weakness Technique Strengths Retina Highly accurate Iris Highly accurate; works with eyeglasses; more acceptable to users than retina scan Fingerprint Mature technology; highly accurate; low cost; small size, becoming widely acceptable Hand/Finger Geometry accurate and flexible; widely acceptable to users Face Recognition Widely acceptable to users; low cost; no direct contact; passive monitoring possible Voice Recognition Usable over existing telephone system; good for remote access and monitoring; Signature Recognition Widely acceptable to users Keystroke Recognition Widely acceptable to users; low cost; uses existing hardware.
  • 11. Strengths, and Weakness Technique Weaknesses Retina Inconvenient forpersons with eyeglasses; dislike contact with device and light beam Iris New technology, cost, although this is rapidly changing Fingerprint Users can create high FRR; some persons dislike contact with device Hand/Finger Geometry Userinterface is bulky; dislike contact with device Face Recognition Face recognition is less accurate than othermethods Voice Recognition Less accuracy; subject to background noise Signature Recognition Less accuracy; not widely used yet, but has potential with PDAs Keystroke Recognition Less accuracy
  • 12. FAR & FRR • FAR(False Acceptance rate) – refers to how often the system accepts someone it should reject • FRR(False Rejection Rate) is how often the system rejects someone it shouldn’t.
  • 13. FAR Accept wrong person FRR Reject the correct person HighSecurity LevelLow Relation of FAR and FRR
  • 14. Major Players  Computer access  Physical access  Handheld devices  Military/Govt. Agencies/DOD  Financial services  Hospitals  Telecommunication
  • 15. Summary  As biometric technology advances, the cost of systems will decrease.  At the same time, biometrics systems will become increasingly sophisticated and accurate.  Scientist will physical and behavioral traits will increase the usefulness of biometrics.  The general public will gradually come to accept biometric system.
  • 16. References  Fuller, Scott and Pagan, Kevin 1997. Intranet Firewalls “Planning and Implementing Your Network Security System.” Ventana Communications Group, Inc.  Conry-Murray, Andrew. Network Magazine. Oct. 1, 2002. p28 Securing End Users from Attack.  McCollum, T. Security concerns prompt new initiatives. The Internal Auditor. Oct. 2002.  Short, Bob. September 2002. Getting the 411 on Biometrics. Security Magazine. p48.  Tocci, Salvatore. 2000. High-Tech IDs: From Finger Scans To Voice Patterns. Grolier Publishing  Mitnick, Kevin & Simon, William L. The Art of Deception: Controlling the Human Element of Security. Library Journal.

Editor's Notes

  1. The graph tells us that at high security setting we need to accept that an authorized person might have to touch the sensor more than once.
  2. Computer Access Securing computer and network access is one of the most common uses of biometric devices. As financial data, medical records and other personal information becomes the target of attack, biometric systems can remove the risk of passwords being shared, stolen or guessed.   Physical Access As security and privacy becomes more important for employers, government, parents and others, biometrics is increasingly being seen as an acceptable solution. Around the world hospitals, military facilities, government buildings and offices are employing biometric access solutions to minimize security threats.   Time and Attendance Biometric systems are being used as a replacement for the traditional punch-card system of clocking-in and clocking-out. Replacing the manual process with biometrics prevents abuse of the system. Time management software provides attendance reports. This solution can be combined with a physical access system to restrict access certain areas without the risk of keys, proximity cards or door access codes being lost or shared.   Handheld devices As handheld device usage increase amongst executives, sales people and health-care professionals, organizations are focusing on how to protect the confidential data on them from falling into the wrong hands. Dynamic signature verification is proving itself as an important tool for securing access to pen-based devices and PDAs.   National Security Governments around the world are beginning to use biometrics to identify citizens and prevent fraud during elections. These systems often involve storing a biometric template, typically a fingerprint scan, on a card that acts as a national identity card.   Telecommunications With the rapid growth of call centers, telephone banking and telephone ordering systems, users are struggling to remember the number of user IDs and PINs required to access these systems. To combat this, voice-recognition systems are being used to provide access control without the need to remember personal access codes.