SlideShare a Scribd company logo
1 of 15
BIOMETRICS
PRESENTED BY :
TUSHAR KATARIA
(2K22BBA167)
TABLE OF CONTENTS
Introduction
Importance of Biometrics
Characteristics
Application of Biometrics
Advantages & Disadvantages
Future Prospects
Conclusion
INTRODUCTION
• Biometrics is the science of technology
of measuring and analyzing biological data.
• Biometrics are automated methods of recognizing a
person based on physiological behavioral
characteristics.
• As the level of security decreases and transaction fraud
increases, the need for highly secure identification and
personal verification technologies is more.
• Biometrics-based solutions are able to provide for
confidential financial transactions and personal data
IMPORTANCE OF
BIOMETRICS.
 The security is needed in every place.
 Reduce the existing problems, like those which can
be taken, stolen, borrowed are even forgotten.
 Improves convenience, security and privacy.
 The first and most critical link in the security chain.
 Presented to counteract security threats
CHARACTERISTICS
Physical
oFinger Print
o Face
oRetina
o Iris
oHand Geometry
Behavioral
oVoice
o Keystroke Dynamics
oSignature Dynamics
PHYSICAL BIOMETRICS
Finger Print
• A fingerprint in its narrow sense is an
impression left by the friction ridges of a
human finger.
• Fingerprint recognition is possible using
the finger scanner. A fingerprint scanner
has two basic jobs.(get an image,
matches pattern of pre-scanned
images)
Face
Face The identification of a person by
their facial image characteristics.
Matching algorithm uses the location
and shape of facial attributes.
Retina
Retina Every eye has its
own totally unique pattern of
blood vessels. Retina scan
machines are fairly
expensive.
PHYSICAL CHARACTERISTICS
Iris The iris is the colored ring of
textured tissue that surrounds the
pupil of the eyes. Iris identification
uses the unique pattern of its texture
to recognize an individual.
Hand Geometry This method
uses hand images for person
identification. Person using
identification hand geometry
utilizes hand images to extract a
number of features such as
finger length, width, thickness
and finger area etc.
BEHAVIOURAL
CHARACTERISTICS
APPLICATION OF BIOMETRICS
Security
• Government agencies
• Banks: facial recognition system equipped ATM machines. Airports: Heathrow
airport had Iris recognition Immigration system facilitate frequent travelers.
Time and Attendance Management
• Hospitals
• Banks
Access Control
• Personal computers, phone
ADVANTAGES OF
BIOMETRICS :
• Universality
• Measurability
• They are linked to a single individual (unlike a password, which can be used without
authorisation),
• They are very convenient since there is no need to remember or carry anything,
• The security, they are highly fraud resistant.
• Accuracy
• Comfort
DISADVANTAGES
OF BIOMETRICS :
• Costly
• Facial imagining can also hinder accurate identifications.
• Missing body part problem.
• False acceptances and rejections.
• The scanning of eye is fearful.
• The nervousness that people feel about the scanners identification.
FUTURE PROSPECTS
Biometry is one of the most promising and life-altering technologies in
existence today. It is all set to change the way we live in the future.
Some of the emerging biometrics technologies in the near future are:
• Ear shape identification.
• Body odor identification.
• Body salinity identification.
• EEG fingerprint.
• DNA matching
CONCLUSION
• Not perfect yet.
• Successful applications.
• The field of biometrics is evolving.
• Benefit from this technology.
• Decreasing cost and increasing convenience.
• Increasing both privacy and identity security.
THANK
YOU !!

More Related Content

Similar to Biometrics: An Introduction to Identification Using Physical and Behavioral Characteristics

Biometrics and Identity management
Biometrics and Identity managementBiometrics and Identity management
Biometrics and Identity managementMyAssignmenthelp.com
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptxnagasukanya1
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffkantharajubn600
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 

Similar to Biometrics: An Introduction to Identification Using Physical and Behavioral Characteristics (20)

Biometrics and Identity management
Biometrics and Identity managementBiometrics and Identity management
Biometrics and Identity management
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Farheen123
Farheen123Farheen123
Farheen123
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Ai
AiAi
Ai
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Biometrics: An Introduction to Identification Using Physical and Behavioral Characteristics

  • 1. BIOMETRICS PRESENTED BY : TUSHAR KATARIA (2K22BBA167)
  • 2. TABLE OF CONTENTS Introduction Importance of Biometrics Characteristics Application of Biometrics Advantages & Disadvantages Future Prospects Conclusion
  • 3. INTRODUCTION • Biometrics is the science of technology of measuring and analyzing biological data. • Biometrics are automated methods of recognizing a person based on physiological behavioral characteristics. • As the level of security decreases and transaction fraud increases, the need for highly secure identification and personal verification technologies is more. • Biometrics-based solutions are able to provide for confidential financial transactions and personal data
  • 4. IMPORTANCE OF BIOMETRICS.  The security is needed in every place.  Reduce the existing problems, like those which can be taken, stolen, borrowed are even forgotten.  Improves convenience, security and privacy.  The first and most critical link in the security chain.  Presented to counteract security threats
  • 5. CHARACTERISTICS Physical oFinger Print o Face oRetina o Iris oHand Geometry Behavioral oVoice o Keystroke Dynamics oSignature Dynamics
  • 6. PHYSICAL BIOMETRICS Finger Print • A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. • Fingerprint recognition is possible using the finger scanner. A fingerprint scanner has two basic jobs.(get an image, matches pattern of pre-scanned images)
  • 7. Face Face The identification of a person by their facial image characteristics. Matching algorithm uses the location and shape of facial attributes. Retina Retina Every eye has its own totally unique pattern of blood vessels. Retina scan machines are fairly expensive.
  • 8. PHYSICAL CHARACTERISTICS Iris The iris is the colored ring of textured tissue that surrounds the pupil of the eyes. Iris identification uses the unique pattern of its texture to recognize an individual. Hand Geometry This method uses hand images for person identification. Person using identification hand geometry utilizes hand images to extract a number of features such as finger length, width, thickness and finger area etc.
  • 10. APPLICATION OF BIOMETRICS Security • Government agencies • Banks: facial recognition system equipped ATM machines. Airports: Heathrow airport had Iris recognition Immigration system facilitate frequent travelers. Time and Attendance Management • Hospitals • Banks Access Control • Personal computers, phone
  • 11. ADVANTAGES OF BIOMETRICS : • Universality • Measurability • They are linked to a single individual (unlike a password, which can be used without authorisation), • They are very convenient since there is no need to remember or carry anything, • The security, they are highly fraud resistant. • Accuracy • Comfort
  • 12. DISADVANTAGES OF BIOMETRICS : • Costly • Facial imagining can also hinder accurate identifications. • Missing body part problem. • False acceptances and rejections. • The scanning of eye is fearful. • The nervousness that people feel about the scanners identification.
  • 13. FUTURE PROSPECTS Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are: • Ear shape identification. • Body odor identification. • Body salinity identification. • EEG fingerprint. • DNA matching
  • 14. CONCLUSION • Not perfect yet. • Successful applications. • The field of biometrics is evolving. • Benefit from this technology. • Decreasing cost and increasing convenience. • Increasing both privacy and identity security.