SlideShare a Scribd company logo
1 of 15
Biometrics = bios + metron. Bios means life and metron
means measure.
In the terms of computer security, biometrics refers to
authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified .
A Biometrics System is a system for the automated
recognition of individuals based on their behaviour and
biological characteristics. Also called
BEHAVIOMETRICS.
Biometric-based solutions are able to provide for
confidential financial transactions and personal data
privacy
There two types of biometrics
1. Physiological biometrics
2. Behavioral biometrics
Depending on the context, in a biometrics system, there are two
different ways to resolve a person’s identity
I. Verification
II. Identification
VERIFICATION
Comparing a sample against a single stored template is called
verification.
IDENTIFICATION
Search a sample against a database of templates.
1) Physiological biometrics :
Physiological are related to the shape of the body.
EXAMPLES :-
Handprint
Fingerprint
Retina
Face
2) Behavioral biometrics:
Behavioral are related to the behavior of a person.
EXAMPLES :-
Voice/Speech
Handwriting/Signature
Movement Patterns(i.e. typing, walking, etc.)
1) Physiological Biometrics
2) Behavioral Biometrics
Everybody has unique handprints.
A handprint Biometric Systems
scans hand and finger sand the
data is compared with the
specimen stored for you in the
system. The user is allowed or
denied based on the result of this
verification.
Fingerprints are used in forensic
and identification for long time.
Fingerprint Biometric Systems
examine the unique
characteristics of your
fingerprints and use that
information to determine
whether or not you should be
Retina Pattern Biometric system
uses an infrared beam to scan
your retina. Retina pattern
biometric systems examine the
unique characteristics of user’s
retina and compare that
information with stored pattern
to determine whether user should
be allowed access.
A facial recognisation system is a
computer application for
automatically identifying or
verifying a person from a digital
image or a video frame from a
video source.
Voice Patterns Biometric
Systems can also be used for
user authentication. Voice
Patterns Biometric Systems
examine the unique
characteristics of user’s voice.
Signature recognition is a
behavioral biometric. The
dynamics is measured as a
means of the pressure,
direction, acceleration and
the length of the strokes,
dynamics number of strokes
and their duration.
Keystroke Biometric Systems
examine the unique
characteristics of user’s
keystrokes and use that
information to determine
whether the user should be
allowed access.
• Criminal identification
• Prison security
• ATM and other Financial
Transactions
• PC/LAN Login
• Database access
• Border crossing controls
Biometrics
• Costly
• Facial imaging can also hinder
accurate identifications.
• Missing body part problem.
• False acceptances and rejections.
• The amount of comfort.
Security
Authentication
E-commerce and E-
governments
Secure Banking and Financial
Transaction
Digital Rights Management
Healthcare Application
Crime Investigation
Social Services
Time Clocks or Biometric time and attendance systems, which
are being increasingly used in various organizations to control
employee timekeeping.
Biometric safes and biometric locks, provides security to the
homeowners.
Biometric access control systems, providing strong security at
entrances.
Biometric systems are also developed for securing access to pc's
and providing single logon facilities.
Biometrics airport security devices are also deployed at some of
the world's famous airports to enhance the security standards.
Biometrics is a very interesting and exciting field that has be growing
exponentially in recent years (especially 2001).
While Biometric authentication can offer a high degree of security,
they are far from perfect solution.
The influences of biometric technology on society and the risks to
privacy and threat to identify will require meditation through
legislation.
The wide variety of physically unique traits our bodies give us will
soon allow us to live in a very secure password-less world.
QUESTIONS

More Related Content

What's hot

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionranjit banshpal
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceNitesh Dubey
 
biometrics
biometricsbiometrics
biometricsAkhil Kumar
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processingshahab islam
 
Biometrics
BiometricsBiometrics
Biometricsanoop80686
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future walletLeelakh Sachdeva
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyRajesh Anupoju
 

What's hot (20)

Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
biometrics
biometricsbiometrics
biometrics
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Biometrics
BiometricsBiometrics
Biometrics
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 

Similar to Ppt on use of biomatrix in secure e trasaction

Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technologypalsantosh
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxSundusKhan42
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowFaithCWorth
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Biometrics
Biometrics Biometrics
Biometrics Divam Goyal
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxNareshKireedula
 
Biometric
Biometric Biometric
Biometric Vinay Gupta
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1yasmeenreem
 

Similar to Ppt on use of biomatrix in secure e trasaction (20)

Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Access control system
Access control systemAccess control system
Access control system
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometric technologies
Biometric technologies Biometric technologies
Biometric technologies
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Biometrics
Biometrics Biometrics
Biometrics
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometric
Biometric Biometric
Biometric
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1
 

More from Devyani Vaidya

Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage systemDevyani Vaidya
 
Data warehousing
Data warehousingData warehousing
Data warehousingDevyani Vaidya
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunicationDevyani Vaidya
 
Resource management
Resource managementResource management
Resource managementDevyani Vaidya
 
telephone directory
 telephone directory telephone directory
telephone directoryDevyani Vaidya
 
Data as a service
Data as a service Data as a service
Data as a service Devyani Vaidya
 
Barcode technology
Barcode technologyBarcode technology
Barcode technologyDevyani Vaidya
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issuesDevyani Vaidya
 
Fuels saver system
Fuels saver systemFuels saver system
Fuels saver systemDevyani Vaidya
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt Devyani Vaidya
 
Data warehousing
Data warehousingData warehousing
Data warehousingDevyani Vaidya
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issuesDevyani Vaidya
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt Devyani Vaidya
 
Open and Close Door ppt
 Open and Close Door ppt Open and Close Door ppt
Open and Close Door pptDevyani Vaidya
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud pptDevyani Vaidya
 
History of Laptops ppt
History of Laptops pptHistory of Laptops ppt
History of Laptops pptDevyani Vaidya
 

More from Devyani Vaidya (18)

Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Resource management
Resource managementResource management
Resource management
 
telephone directory
 telephone directory telephone directory
telephone directory
 
Data as a service
Data as a service Data as a service
Data as a service
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
Digital locker
Digital lockerDigital locker
Digital locker
 
Fuels saver system
Fuels saver systemFuels saver system
Fuels saver system
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
3D Password
3D Password3D Password
3D Password
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
Open and Close Door ppt
 Open and Close Door ppt Open and Close Door ppt
Open and Close Door ppt
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
 
History of Laptops ppt
History of Laptops pptHistory of Laptops ppt
History of Laptops ppt
 

Recently uploaded

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Ppt on use of biomatrix in secure e trasaction

  • 1.
  • 2. Biometrics = bios + metron. Bios means life and metron means measure. In the terms of computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified . A Biometrics System is a system for the automated recognition of individuals based on their behaviour and biological characteristics. Also called BEHAVIOMETRICS. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy
  • 3. There two types of biometrics 1. Physiological biometrics 2. Behavioral biometrics Depending on the context, in a biometrics system, there are two different ways to resolve a person’s identity I. Verification II. Identification VERIFICATION Comparing a sample against a single stored template is called verification. IDENTIFICATION Search a sample against a database of templates.
  • 4. 1) Physiological biometrics : Physiological are related to the shape of the body. EXAMPLES :- Handprint Fingerprint Retina Face 2) Behavioral biometrics: Behavioral are related to the behavior of a person. EXAMPLES :- Voice/Speech Handwriting/Signature Movement Patterns(i.e. typing, walking, etc.) 1) Physiological Biometrics 2) Behavioral Biometrics
  • 5.
  • 6. Everybody has unique handprints. A handprint Biometric Systems scans hand and finger sand the data is compared with the specimen stored for you in the system. The user is allowed or denied based on the result of this verification. Fingerprints are used in forensic and identification for long time. Fingerprint Biometric Systems examine the unique characteristics of your fingerprints and use that information to determine whether or not you should be
  • 7.
  • 8. Retina Pattern Biometric system uses an infrared beam to scan your retina. Retina pattern biometric systems examine the unique characteristics of user’s retina and compare that information with stored pattern to determine whether user should be allowed access. A facial recognisation system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.
  • 9. Voice Patterns Biometric Systems can also be used for user authentication. Voice Patterns Biometric Systems examine the unique characteristics of user’s voice. Signature recognition is a behavioral biometric. The dynamics is measured as a means of the pressure, direction, acceleration and the length of the strokes, dynamics number of strokes and their duration.
  • 10. Keystroke Biometric Systems examine the unique characteristics of user’s keystrokes and use that information to determine whether the user should be allowed access.
  • 11. • Criminal identification • Prison security • ATM and other Financial Transactions • PC/LAN Login • Database access • Border crossing controls Biometrics • Costly • Facial imaging can also hinder accurate identifications. • Missing body part problem. • False acceptances and rejections. • The amount of comfort.
  • 12. Security Authentication E-commerce and E- governments Secure Banking and Financial Transaction Digital Rights Management Healthcare Application Crime Investigation Social Services
  • 13. Time Clocks or Biometric time and attendance systems, which are being increasingly used in various organizations to control employee timekeeping. Biometric safes and biometric locks, provides security to the homeowners. Biometric access control systems, providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities. Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards.
  • 14. Biometrics is a very interesting and exciting field that has be growing exponentially in recent years (especially 2001). While Biometric authentication can offer a high degree of security, they are far from perfect solution. The influences of biometric technology on society and the risks to privacy and threat to identify will require meditation through legislation. The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world.