SlideShare a Scribd company logo
1 of 27
INTRODUCTIONTO
BIOMETRICTECHNOLOGY
Presented by Rahul Sag
TABLE OF CONTENTS :
-
• Introduction
• What is Biometrics
• History
• How does BIOMETRIC work
• Characteristics
• Types
• Applications
• PROS & CONS of Biometrics
• Conclusion
INTRODUCTION
WHY DO WE NEED BIOMETRICS?
• High security and assurance – Biometric
identification provides the answers to
“something a person has and is” and helps
verify identity.
• User Experience – Convenient and fast.
• Non-transferrable – Everyone has access to a
unique set of biometrics
• Protect sensitive information
WHAT ARE BIOMETRICS?
•Biometrics are automated method in
which we recognize a person with his
Behavioral or Physiological
characteristic.
• Biometrics are used to identify a
person on the basis of its vital
statistics.
•Biometrics differ from person to
HISTORY
• The first biometrics system was created
in 1870 by French anthropologist
named Alphonse Bertillon
• He developed a method of specific body
measurements for classification and
comparison Biometrics of criminals
and victims
DIFFERENTIATING PEOPLE
Its SIMILAR TO GAIT
HOW DOES BIOMETRIC WORK ?
• Every biometric
authentication process needs
a sensor to read
input samples.
• This data is called a template.
• For a single biometric
authentication method,
thousands of image
combinations are generated.
• Biometrics system makes use
of a database storage to store
a combination of template.
• Then these are converted to
WHAT IS A TEMPLATE?
• A biometric template is a set of stored
biometric features or mapping of biometric
features
• MINUTIAE POINT or simply points are
locations where a ridge(dark lines in
fingerprints) becomes discontinues these
are called features
• EXAMPLE USING FINGER PRINT.
CHARACTERISTICS OF
BIOMETRICS
PHYSIOLOGICA
L
• This is related to the
shape of the body.
• Examples include
fingerprint, face
recognition, DNA, Hand
or Palm geometry, Iris
recognition, Vein
patterns, Retina, etc.
BEHAVIOROL
• This is related to the
behavior of a person.
Examples include
typing rhythm, voice.
• Examples include
Signatures,
Keystrokes, Voice
recognition .
TYPES OF BIOMETRICS
BEHAVIRIOL BIOMETRICS
KEYSTROKES
• The rhythms with which
one types at a keyboard
are sufficiently distinctive
to form the basis of the
biometric technology
known as keystroke
dynamics
• Measures the time
between strokes and
duration of key pressed.
Latencies between keystrokes
when writing by two persons
VOICE RECOGNITION
• Identification of the person who is
speaking by characteristics of
their voices (voice biometrics),
also called Voice Patterns.
• The is a difference between
speaker recognition (recognition
who is speaking) and speech
recognition what is being said)
• Pitch
• Quality
• Strength
• Frequency
1. FINGERPRINT RECOGNITION
2. FACE RECOGNITION
3. IRIS RECOGNITION
IN PHYSIOLOGICAL BIOMETRICS
WHICH ARE POPULAR :
PHYSIOLOGICAL BIOMETRICS
FINGERPRINT RECOGNITION
• A fingerprint includes patterns
found on a fingertip.
• There are a variety of
approaches for the fingerprint
verification, such as traditional
police based method and using
pattern-matching devices.
• Fingerprint scanning seems to
be a good choice for in-house
systems. It can be easily found
on smartphones and laptops
FACE RECOGNITION
• Involves identifying a person based on the high-
resolution images captured.
• Thousands of patterns of the face are captured by
the facial recognition device and stored in its
database.
• In subsequent uses, this data is used to match and
authenticate a person.
• This kind of matching is mostly
used in the police and intelligence
departments.
FACE RECOGNITION
• An iris-based biometric authentication involves analyzing features
found in the colored circular tissue that surrounds the pupil.
• The color of the iris determines the color of the eye. This uses a
conventional camera element that helps to capture high-resolution
images depicting the structure of the iris.
• Further, it is more reliable and results in highest pattern matching.
• Measures unique characteristics
of the retina.
• Blood vessel patterns
• Vein patterns
RETINA SCANNING
APPLICATIONS OF BIOMETRICS
1) Commercial
ATM, credit card, cellular phone, distance learning,
etc.
2) Government
ID card, driver’s license, social security, passport
control, etc.
3) Forensic
terrorist identification, missing children, etc.
4) Heath-Care
Access to medical details, Patient Info, etc.
5) Travelling and Immigration
Air Travel, Boarder Crossing, Passport, etc.
6) Institutions and Offices
Biometric time and attendance systems are used in various
22
SOME OF BIOMETRIC SYSTEMS
SOME BIOMETRIC DEVICES
AVAILABLE IN MARKET:
1. Biometric Attendance Management System
2. Safran Morpho Bio-metric Fingerprint Scanner
3. 3M Cogent High Speed Dual Iris Scanner
4. Yale Premium Biometric Fingerprint Digital Door
Lock
BIOMETRICS
PROS:
• Integrate a wide range of biometric solutions and
technologies, customer applications and databases
into a robust and scalable control solution for facility
and network access.
• Unequivocally link an individual to a transaction or
event.
• Reduce password administration costs.
• Replace hard-to-remember passwords which may
be shared or observed.
BIOMETRICS
CONS
• Security of the biometric data: It is crucial that the storage and retrieval
of the biometric data is highly secured. There is a chance that the
thieves will stalk and assault the property owner to gain access. With
the increase in cybercrimes, ransomware attacks such systems must
be kept under high surveillance and the data should be encrypted
using custom algorithms.
• Biological characteristics may change: With age and growth certain
physiological characteristics may change and the biometric
authentication may not work. One has to keep updating the records
over a period of time.
• The match may fail: There could be a case that the system may find
few identical records and may not be able to finalize the match.
CONCLUSION
• This technology is getting better every day and spreading
globally at a faster rate. Voice and fingerprint authentication is
being collaborated with most of the electronic devices.
• In recent times, biometrics based on brain
(electroencephalogram) and heart (electrocardiogram) signals
have emerged. We hope for many such advancements in the
field of the biometrics.
• Of course, every technology has some drawbacks, we should
concentrate on overcoming these drawbacks instead of
crushing the technology.
THANK YOU

More Related Content

Similar to Intro Biometric Tech

Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Overview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NOverview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NRavikumar Chilmula
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfpreethi3173
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individualsVaibhav Bhalotia
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric PresentationAnand Yadav
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxTusharKataria22
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxNareshKireedula
 

Similar to Intro Biometric Tech (20)

Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Overview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NOverview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya N
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individuals
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometrics
BiometricsBiometrics
Biometrics
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Intro Biometric Tech

  • 2. TABLE OF CONTENTS : - • Introduction • What is Biometrics • History • How does BIOMETRIC work • Characteristics • Types • Applications • PROS & CONS of Biometrics • Conclusion
  • 3. INTRODUCTION WHY DO WE NEED BIOMETRICS? • High security and assurance – Biometric identification provides the answers to “something a person has and is” and helps verify identity. • User Experience – Convenient and fast. • Non-transferrable – Everyone has access to a unique set of biometrics • Protect sensitive information
  • 4. WHAT ARE BIOMETRICS? •Biometrics are automated method in which we recognize a person with his Behavioral or Physiological characteristic. • Biometrics are used to identify a person on the basis of its vital statistics. •Biometrics differ from person to
  • 5. HISTORY • The first biometrics system was created in 1870 by French anthropologist named Alphonse Bertillon • He developed a method of specific body measurements for classification and comparison Biometrics of criminals and victims
  • 7. HOW DOES BIOMETRIC WORK ? • Every biometric authentication process needs a sensor to read input samples. • This data is called a template. • For a single biometric authentication method, thousands of image combinations are generated. • Biometrics system makes use of a database storage to store a combination of template. • Then these are converted to
  • 8. WHAT IS A TEMPLATE? • A biometric template is a set of stored biometric features or mapping of biometric features • MINUTIAE POINT or simply points are locations where a ridge(dark lines in fingerprints) becomes discontinues these are called features • EXAMPLE USING FINGER PRINT.
  • 9. CHARACTERISTICS OF BIOMETRICS PHYSIOLOGICA L • This is related to the shape of the body. • Examples include fingerprint, face recognition, DNA, Hand or Palm geometry, Iris recognition, Vein patterns, Retina, etc. BEHAVIOROL • This is related to the behavior of a person. Examples include typing rhythm, voice. • Examples include Signatures, Keystrokes, Voice recognition .
  • 11. BEHAVIRIOL BIOMETRICS KEYSTROKES • The rhythms with which one types at a keyboard are sufficiently distinctive to form the basis of the biometric technology known as keystroke dynamics • Measures the time between strokes and duration of key pressed.
  • 12. Latencies between keystrokes when writing by two persons
  • 13. VOICE RECOGNITION • Identification of the person who is speaking by characteristics of their voices (voice biometrics), also called Voice Patterns. • The is a difference between speaker recognition (recognition who is speaking) and speech recognition what is being said) • Pitch • Quality • Strength • Frequency
  • 14. 1. FINGERPRINT RECOGNITION 2. FACE RECOGNITION 3. IRIS RECOGNITION IN PHYSIOLOGICAL BIOMETRICS WHICH ARE POPULAR : PHYSIOLOGICAL BIOMETRICS
  • 15. FINGERPRINT RECOGNITION • A fingerprint includes patterns found on a fingertip. • There are a variety of approaches for the fingerprint verification, such as traditional police based method and using pattern-matching devices. • Fingerprint scanning seems to be a good choice for in-house systems. It can be easily found on smartphones and laptops
  • 16. FACE RECOGNITION • Involves identifying a person based on the high- resolution images captured. • Thousands of patterns of the face are captured by the facial recognition device and stored in its database. • In subsequent uses, this data is used to match and authenticate a person. • This kind of matching is mostly used in the police and intelligence departments.
  • 17.
  • 18. FACE RECOGNITION • An iris-based biometric authentication involves analyzing features found in the colored circular tissue that surrounds the pupil. • The color of the iris determines the color of the eye. This uses a conventional camera element that helps to capture high-resolution images depicting the structure of the iris. • Further, it is more reliable and results in highest pattern matching.
  • 19.
  • 20. • Measures unique characteristics of the retina. • Blood vessel patterns • Vein patterns RETINA SCANNING
  • 21. APPLICATIONS OF BIOMETRICS 1) Commercial ATM, credit card, cellular phone, distance learning, etc. 2) Government ID card, driver’s license, social security, passport control, etc. 3) Forensic terrorist identification, missing children, etc. 4) Heath-Care Access to medical details, Patient Info, etc. 5) Travelling and Immigration Air Travel, Boarder Crossing, Passport, etc. 6) Institutions and Offices Biometric time and attendance systems are used in various
  • 23. SOME BIOMETRIC DEVICES AVAILABLE IN MARKET: 1. Biometric Attendance Management System 2. Safran Morpho Bio-metric Fingerprint Scanner 3. 3M Cogent High Speed Dual Iris Scanner 4. Yale Premium Biometric Fingerprint Digital Door Lock
  • 24. BIOMETRICS PROS: • Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access. • Unequivocally link an individual to a transaction or event. • Reduce password administration costs. • Replace hard-to-remember passwords which may be shared or observed.
  • 25. BIOMETRICS CONS • Security of the biometric data: It is crucial that the storage and retrieval of the biometric data is highly secured. There is a chance that the thieves will stalk and assault the property owner to gain access. With the increase in cybercrimes, ransomware attacks such systems must be kept under high surveillance and the data should be encrypted using custom algorithms. • Biological characteristics may change: With age and growth certain physiological characteristics may change and the biometric authentication may not work. One has to keep updating the records over a period of time. • The match may fail: There could be a case that the system may find few identical records and may not be able to finalize the match.
  • 26. CONCLUSION • This technology is getting better every day and spreading globally at a faster rate. Voice and fingerprint authentication is being collaborated with most of the electronic devices. • In recent times, biometrics based on brain (electroencephalogram) and heart (electrocardiogram) signals have emerged. We hope for many such advancements in the field of the biometrics. • Of course, every technology has some drawbacks, we should concentrate on overcoming these drawbacks instead of crushing the technology.