SlideShare a Scribd company logo
1 of 23
SUBMITTED BY :-
RAVI KUMAR
B.TECH C.S.E 5TH SEM
ROLL N0.-54
CONTENT :-
 What is Biometric?
 History of Biometric
 Biometrics Characteristics
 Fingerprint Recognition
 Iris Recognition
 Face Recognition
 Signature Recognition
 Voice Recognition
 Applications of Biometrics
 Future prospects
 Pros and Cons
 Conclusion
What is Biometrics ?
 Biometrics refers to metrics related to human
characteristics. Biometrics authentication is used in
computer science as a form of identification and access
control. It is also used to identify individuals in groups
that are under surveillance..
 Biometrics refers to the automatic identification of a
person based on his or her physiological or behavioral
characteristics .
History…
 The term "biometrics" is derived from the Greek words
bio which means (life) and metric means (to
measure).
 The first known example of biometrics in practice was
a form of finger printing being used in China in the
14th century.
 In the 1890,Bertillonage created a method of bodily
measurement with the criminals who repeated the
crimes with different names and looks.
 After this, finger printing, which was developed by
Richard Edward Henry of Scotland Yard.
Biometrics characteristics:-
• Fingerprint
• Iris scan
• Facial recognition
• Veins recognition
Physiological
• Signature/handwriting
• Voice recognition
• KeystrokeBehavioral
Fingerprint recognition :-
Types of fingerprint Types of fingerprint scanner
 Arch
 Loop
 Whorl
 Optical scanner
 Capacitive scanner
Fingerprint recognition (cont.)
 Fingerprint Recognition is the identification by using
patterns of friction ridges and valleys on an
individual's fingertips which are unique to that
individual.
Fingerprint recognition steps …
Finger Capturing
Feature
extraction
Comparison
Finger information database
Referring
RecordingPresenting
Enrollment
Verification/Identification
R
e
s
u
l
t
Iris recognition :-
 The iris is the colored ring of textured tissue that
surrounds the pupil of the eye.
 The colored pattern of our irises is determined
genetically when we're in the womb but not fully
formed until we're aged about two.
 Although we talk about people having "blue eyes,"
"green eyes," "brown eyes," or whatever, in reality the
color and pattern of people's eyes is extremely complex
and completely unique: the patterns of one person's
two eyes are quite different from each other and even
genetically identical twins have different iris patterns.
Iris recognition (cont.)
How does iris scanning work in practice?
There are two distinct stages involved in iris-scanning:-
1. Enrollment
Each person stands in front of a camera and has their eyes digitally photographed with
both ordinary light and invisible infrared. In iris recognition, infrared helps to show
up the unique features of darkly colored eyes that do not stand out clearly in ordinary
light. These two digital photographs are then analyzed by a computer that removes
unnecessary details (such as eyelashes) and identifies around 240 unique features.
These features, unique to every eye, are turned into a simple, 512-digit number
called an IrisCode® that is stored, alongside your name and other details, in a
computer database. The enrollment process is completely automatic and usually takes
no more than a couple of minutes.
2. Verification/recognition
You simply stand in front of another iris scanner and have your eye photographed
again. The system quickly processes the image and extracts your IrisCode®, before
comparing it against the hundreds, thousands, or millions stored in its database. If
your code matches one of the stored ones, you're positively identified; if not, tough
luck! It either means you're not known to the system or you're not whom you claim to
be.
Iris recognition steps…
Enrollment
Image acquisition
Image processing
Feature extraction
Iris signature
recorded in db
Verification
Image acquisition
Image processing
Feature extraction
Is the signature
matched with the
templates in
database
Access is granted
Identification
fails
YESNO
Face recognition :-
 The human face plays an important role in our social interaction,
conveying people's identity. Using human face as a key to
security, the biometrics face recognition technology has received
significant attention in the past several years due to its potential
for a wide variety of applications in both law enforcement and
non-law enforcement.
 As compared with other biometrics systems using
fingerprint/palm print and iris, face recognition has distinct
advantages because of its non-contact process. Face images can
be captured from a distance without touching the person being
identified, and the identification does not require interacting
with the person. In addition, face recognition serves the crime
deterrent purpose because face images that have been
recorded and archived can later help identify a person.
Face recognition steps :-
input
image
Extraction of
face image
Extraction of
face features
database
Verification
process
Enrolment
process
Signature recognition :-
Signature recognition is a behavioral biometric.
It can be operated in two different ways:
Static mode: Users write their signature on paper, digitize it through an optical
scanner or a camera, and the biometric system recognizes the signature analyzing
its shape. This group is also known as “off-line”.
Dynamic mode: Users write their signature in a digitizing tablet, which acquires
the signature in real time. Some systems also operate on smart-phones or tablets
with a capacitive screen, where users can sign using a finger or an appropriate
pen. Dynamic recognition is also known as “on-line”.
Signature verification process…
Dynamic information usually consists of the following
information :
 The angle at which the pen is held,
 The number of times the pen is lifted,
 The time it takes to write the entire signature,
 The pressure exerted by the person while signing.
 The variations in the speed with which different parts
of the signature are written.
Dynamic
mode
Voice recognition :-
Speaker recognition is the identification of a person
from characteristics of voices (voice biometrics).It is
also called voice recognition.
Voice recognition is the identification using the
acoustic features of speech that have been found to
differ between individuals.
Voice recognition process…
Applications of Biometrics :-
 Access control
• Authenticate
 Time and attendance management
• Hospitals
• Institutes
 Airports
• Iris scan
 ATMs
• Face recognition
• Fingerprint
 Criminal identification
 Fujitsu has developed a mouse that can verify a person’s identity
by recognizing his pattern of blood veins.
Future Prospects :-
Ear shape
identification
Body odor
identification
DNA
matching
Advantages & Disadvantages :-
Advantages Disadvantages
 Uniqueness
 Time
 Reduce fraud
 No forgotten password
 No need to carry Swipe card
 No need to remember PIN or
password
 Accuracy
 Accountability
 Costly
 Facial imaging can also hinder
accurate identifications
 Missing body part problem
 False acceptances and rejections
 The amount of comfort
 The scanning of eye is fearful
 The nervousness that people feel
about the scanners
identification
Conclusion :-
 Not yet perfect.
 Successful applications.
 Decreasing costs and increasing convenience.
 Increasing both privacy and identity security.
 Biometrics is an emerging area with many
opportunities for growth.
References :-
 https://en.wikipedia.org/wiki/Biometrics
 https://www.welivesecurity.com/2014/02/07/sniffing-body-odor-
has-enormous-potential-for-biometrics-researchers-claim/
 http://in.nec.com/en_IN/products/public-safety-
security/technology/overview-facial-recognition-solution.html
 http://www.explainthatstuff.com/how-iris-scans-work.html
 https://en.wikipedia.org/wiki/Fingerprint
 https://en.wikipedia.org/wiki/Signature_recognition
 https://en.wikipedia.org/wiki/Speaker_recognition
 https://en.wikipedia.org/wiki/Facial_recognition
Biometrics technology ravi kumar

More Related Content

What's hot

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsAbhishek Mishra
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 

What's hot (20)

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 

Similar to Biometrics technology ravi kumar

Similar to Biometrics technology ravi kumar (20)

Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Biometrics technology ravi kumar

  • 1. SUBMITTED BY :- RAVI KUMAR B.TECH C.S.E 5TH SEM ROLL N0.-54
  • 2. CONTENT :-  What is Biometric?  History of Biometric  Biometrics Characteristics  Fingerprint Recognition  Iris Recognition  Face Recognition  Signature Recognition  Voice Recognition  Applications of Biometrics  Future prospects  Pros and Cons  Conclusion
  • 3. What is Biometrics ?  Biometrics refers to metrics related to human characteristics. Biometrics authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance..  Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics .
  • 4. History…  The term "biometrics" is derived from the Greek words bio which means (life) and metric means (to measure).  The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century.  In the 1890,Bertillonage created a method of bodily measurement with the criminals who repeated the crimes with different names and looks.  After this, finger printing, which was developed by Richard Edward Henry of Scotland Yard.
  • 5. Biometrics characteristics:- • Fingerprint • Iris scan • Facial recognition • Veins recognition Physiological • Signature/handwriting • Voice recognition • KeystrokeBehavioral
  • 6. Fingerprint recognition :- Types of fingerprint Types of fingerprint scanner  Arch  Loop  Whorl  Optical scanner  Capacitive scanner
  • 7. Fingerprint recognition (cont.)  Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual.
  • 8. Fingerprint recognition steps … Finger Capturing Feature extraction Comparison Finger information database Referring RecordingPresenting Enrollment Verification/Identification R e s u l t
  • 9. Iris recognition :-  The iris is the colored ring of textured tissue that surrounds the pupil of the eye.  The colored pattern of our irises is determined genetically when we're in the womb but not fully formed until we're aged about two.  Although we talk about people having "blue eyes," "green eyes," "brown eyes," or whatever, in reality the color and pattern of people's eyes is extremely complex and completely unique: the patterns of one person's two eyes are quite different from each other and even genetically identical twins have different iris patterns.
  • 10. Iris recognition (cont.) How does iris scanning work in practice? There are two distinct stages involved in iris-scanning:- 1. Enrollment Each person stands in front of a camera and has their eyes digitally photographed with both ordinary light and invisible infrared. In iris recognition, infrared helps to show up the unique features of darkly colored eyes that do not stand out clearly in ordinary light. These two digital photographs are then analyzed by a computer that removes unnecessary details (such as eyelashes) and identifies around 240 unique features. These features, unique to every eye, are turned into a simple, 512-digit number called an IrisCode® that is stored, alongside your name and other details, in a computer database. The enrollment process is completely automatic and usually takes no more than a couple of minutes. 2. Verification/recognition You simply stand in front of another iris scanner and have your eye photographed again. The system quickly processes the image and extracts your IrisCode®, before comparing it against the hundreds, thousands, or millions stored in its database. If your code matches one of the stored ones, you're positively identified; if not, tough luck! It either means you're not known to the system or you're not whom you claim to be.
  • 11. Iris recognition steps… Enrollment Image acquisition Image processing Feature extraction Iris signature recorded in db Verification Image acquisition Image processing Feature extraction Is the signature matched with the templates in database Access is granted Identification fails YESNO
  • 12. Face recognition :-  The human face plays an important role in our social interaction, conveying people's identity. Using human face as a key to security, the biometrics face recognition technology has received significant attention in the past several years due to its potential for a wide variety of applications in both law enforcement and non-law enforcement.  As compared with other biometrics systems using fingerprint/palm print and iris, face recognition has distinct advantages because of its non-contact process. Face images can be captured from a distance without touching the person being identified, and the identification does not require interacting with the person. In addition, face recognition serves the crime deterrent purpose because face images that have been recorded and archived can later help identify a person.
  • 13. Face recognition steps :- input image Extraction of face image Extraction of face features database Verification process Enrolment process
  • 14. Signature recognition :- Signature recognition is a behavioral biometric. It can be operated in two different ways: Static mode: Users write their signature on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the signature analyzing its shape. This group is also known as “off-line”. Dynamic mode: Users write their signature in a digitizing tablet, which acquires the signature in real time. Some systems also operate on smart-phones or tablets with a capacitive screen, where users can sign using a finger or an appropriate pen. Dynamic recognition is also known as “on-line”.
  • 15. Signature verification process… Dynamic information usually consists of the following information :  The angle at which the pen is held,  The number of times the pen is lifted,  The time it takes to write the entire signature,  The pressure exerted by the person while signing.  The variations in the speed with which different parts of the signature are written. Dynamic mode
  • 16. Voice recognition :- Speaker recognition is the identification of a person from characteristics of voices (voice biometrics).It is also called voice recognition. Voice recognition is the identification using the acoustic features of speech that have been found to differ between individuals.
  • 18. Applications of Biometrics :-  Access control • Authenticate  Time and attendance management • Hospitals • Institutes  Airports • Iris scan  ATMs • Face recognition • Fingerprint  Criminal identification  Fujitsu has developed a mouse that can verify a person’s identity by recognizing his pattern of blood veins.
  • 19. Future Prospects :- Ear shape identification Body odor identification DNA matching
  • 20. Advantages & Disadvantages :- Advantages Disadvantages  Uniqueness  Time  Reduce fraud  No forgotten password  No need to carry Swipe card  No need to remember PIN or password  Accuracy  Accountability  Costly  Facial imaging can also hinder accurate identifications  Missing body part problem  False acceptances and rejections  The amount of comfort  The scanning of eye is fearful  The nervousness that people feel about the scanners identification
  • 21. Conclusion :-  Not yet perfect.  Successful applications.  Decreasing costs and increasing convenience.  Increasing both privacy and identity security.  Biometrics is an emerging area with many opportunities for growth.
  • 22. References :-  https://en.wikipedia.org/wiki/Biometrics  https://www.welivesecurity.com/2014/02/07/sniffing-body-odor- has-enormous-potential-for-biometrics-researchers-claim/  http://in.nec.com/en_IN/products/public-safety- security/technology/overview-facial-recognition-solution.html  http://www.explainthatstuff.com/how-iris-scans-work.html  https://en.wikipedia.org/wiki/Fingerprint  https://en.wikipedia.org/wiki/Signature_recognition  https://en.wikipedia.org/wiki/Speaker_recognition  https://en.wikipedia.org/wiki/Facial_recognition