2. TABLE OF CONTENTS :
-
• Introduction
• What is Biometrics
• History
• How does BIOMETRIC work
• Characteristics
• Types
• Applications
• PROS & CONS of Biometrics
• Conclusion
3. INTRODUCTION
WHY DO WE NEED BIOMETRICS?
• High security and assurance – Biometric
identification provides the answers to
“something a person has and is” and helps
verify identity.
• User Experience – Convenient and fast.
• Non-transferrable – Everyone has access to a
unique set of biometrics
• Protect sensitive information
4. WHAT ARE BIOMETRICS?
•Biometrics are automated method in
which we recognize a person with his
Behavioral or Physiological
characteristic.
• Biometrics are used to identify a
person on the basis of its vital
statistics.
•Biometrics differ from person to
5. HISTORY
• The first biometrics system was created
in 1870 by French anthropologist
named Alphonse Bertillon
• He developed a method of specific body
measurements for classification and
comparison Biometrics of criminals
and victims
7. HOW DOES BIOMETRIC WORK ?
• Every biometric
authentication process needs
a sensor to read
input samples.
• This data is called a template.
• For a single biometric
authentication method,
thousands of image
combinations are generated.
• Biometrics system makes use
of a database storage to store
a combination of template.
• Then these are converted to
8. WHAT IS A TEMPLATE?
• A biometric template is a set of stored
biometric features or mapping of biometric
features
• MINUTIAE POINT or simply points are
locations where a ridge(dark lines in
fingerprints) becomes discontinues these
are called features
• EXAMPLE USING FINGER PRINT.
9. CHARACTERISTICS OF
BIOMETRICS
PHYSIOLOGICA
L
• This is related to the
shape of the body.
• Examples include
fingerprint, face
recognition, DNA, Hand
or Palm geometry, Iris
recognition, Vein
patterns, Retina, etc.
BEHAVIOROL
• This is related to the
behavior of a person.
Examples include
typing rhythm, voice.
• Examples include
Signatures,
Keystrokes, Voice
recognition .
11. BEHAVIRIOL BIOMETRICS
KEYSTROKES
• The rhythms with which
one types at a keyboard
are sufficiently distinctive
to form the basis of the
biometric technology
known as keystroke
dynamics
• Measures the time
between strokes and
duration of key pressed.
13. VOICE RECOGNITION
• Identification of the person who is
speaking by characteristics of
their voices (voice biometrics),
also called Voice Patterns.
• The is a difference between
speaker recognition (recognition
who is speaking) and speech
recognition what is being said)
• Pitch
• Quality
• Strength
• Frequency
14. 1. FINGERPRINT RECOGNITION
2. FACE RECOGNITION
3. IRIS RECOGNITION
IN PHYSIOLOGICAL BIOMETRICS
WHICH ARE POPULAR :
PHYSIOLOGICAL BIOMETRICS
15. FINGERPRINT RECOGNITION
• A fingerprint includes patterns
found on a fingertip.
• There are a variety of
approaches for the fingerprint
verification, such as traditional
police based method and using
pattern-matching devices.
• Fingerprint scanning seems to
be a good choice for in-house
systems. It can be easily found
on smartphones and laptops
16. FACE RECOGNITION
• Involves identifying a person based on the high-
resolution images captured.
• Thousands of patterns of the face are captured by
the facial recognition device and stored in its
database.
• In subsequent uses, this data is used to match and
authenticate a person.
• This kind of matching is mostly
used in the police and intelligence
departments.
17.
18. FACE RECOGNITION
• An iris-based biometric authentication involves analyzing features
found in the colored circular tissue that surrounds the pupil.
• The color of the iris determines the color of the eye. This uses a
conventional camera element that helps to capture high-resolution
images depicting the structure of the iris.
• Further, it is more reliable and results in highest pattern matching.
19.
20. • Measures unique characteristics
of the retina.
• Blood vessel patterns
• Vein patterns
RETINA SCANNING
21. APPLICATIONS OF BIOMETRICS
1) Commercial
ATM, credit card, cellular phone, distance learning,
etc.
2) Government
ID card, driver’s license, social security, passport
control, etc.
3) Forensic
terrorist identification, missing children, etc.
4) Heath-Care
Access to medical details, Patient Info, etc.
5) Travelling and Immigration
Air Travel, Boarder Crossing, Passport, etc.
6) Institutions and Offices
Biometric time and attendance systems are used in various
23. SOME BIOMETRIC DEVICES
AVAILABLE IN MARKET:
1. Biometric Attendance Management System
2. Safran Morpho Bio-metric Fingerprint Scanner
3. 3M Cogent High Speed Dual Iris Scanner
4. Yale Premium Biometric Fingerprint Digital Door
Lock
24. BIOMETRICS
PROS:
• Integrate a wide range of biometric solutions and
technologies, customer applications and databases
into a robust and scalable control solution for facility
and network access.
• Unequivocally link an individual to a transaction or
event.
• Reduce password administration costs.
• Replace hard-to-remember passwords which may
be shared or observed.
25. BIOMETRICS
CONS
• Security of the biometric data: It is crucial that the storage and retrieval
of the biometric data is highly secured. There is a chance that the
thieves will stalk and assault the property owner to gain access. With
the increase in cybercrimes, ransomware attacks such systems must
be kept under high surveillance and the data should be encrypted
using custom algorithms.
• Biological characteristics may change: With age and growth certain
physiological characteristics may change and the biometric
authentication may not work. One has to keep updating the records
over a period of time.
• The match may fail: There could be a case that the system may find
few identical records and may not be able to finalize the match.
26. CONCLUSION
• This technology is getting better every day and spreading
globally at a faster rate. Voice and fingerprint authentication is
being collaborated with most of the electronic devices.
• In recent times, biometrics based on brain
(electroencephalogram) and heart (electrocardiogram) signals
have emerged. We hope for many such advancements in the
field of the biometrics.
• Of course, every technology has some drawbacks, we should
concentrate on overcoming these drawbacks instead of
crushing the technology.