SlideShare a Scribd company logo
1 of 27
Download to read offline
“BIOMETRICS”
BY-
VARTIKA PAUL
4IT55
BIOMETRICS
Definition
“ Biometrics is the identification or
verification of human identity through the
measurement of repeatable physiological
and behavioral characteristics”
• Physiological
• Behavioral
Examples-face,fingerprints,hand geometry
and iris Recognition,dna.
Examples-signature and voice.
Biometrics can be sorted into two classes:
Categories of BIOMETRICS:
Basic characteristics of BIOMETRIC
Technologies:
• Universality: Every person should have the characteristic.
People who are mute or without a fingerprint will need to be
accommodated in some way.
• Uniqueness: Generally, no two people have identical
characteristics. However, identical twins are hard to distinguish.
• Permanence: The characteristics should not vary with time. A
person's face, for example, may change with age.
• Collectibility: The characteristics must be easily collectible and
measurable.
• Performance: The method must deliver accurate results under
varied environmental circumstances.
• Acceptability: The general public must accept the sample
collection routines. Nonintrusive methods are more acceptable.
• Circumvention: The technology should be difficult to deceive
Working principle :
Biometric devices consist of a reader or scanning
device software that converts the gathered information
into digital form, and a database that stores the
biometric data with comparison with existing records.
• Enrollment Mode.
• Verification Mode.
Modes:
• Enrollment Mode:
A sample of the biometric trait is captured,
processed by a computer, and stored for later
comparison .
• Verification Mode:
In this mode biometric system authenticates a
person’s claimed identity from their previously
enrolled pattern.
Biometric Modalities:
• Fingerprint Recognition:
For fingerprint Recognition look at :
 Friction ridges.
 Core
 Crossover.
 Delta.
 Island
 Ridge Ending.
 Pore.
LOOP, ARCH AND WHORL
Minutiae
• Uses ridge endings ,bifurcations on a person’s
finger to plot points know as Minutiae.
• The number and locations of the minutiae vary from
finger to finger in any particular person, and from
person to person for any particular finger.
Finger Image Finger Image + Minutiae Minutiae
Face Recognition:
It involves recognizing
people by there:
• Facial features.
• Face geometry.
Principle:
Analysis of unique shape, pattern and
positioning of facial features.
Voice Recognition:
• Voice recognition is not the same as
speech recognition, it is speaker
recognition.
• Considered both physiological and
behavioral.
• Popular and low-cost, but less accurate
and sometimes lengthy enrollment.
Styles of spoken input:
These system have three styles of
spoken inputs:
• Text Dependent.
• Text prompted.
• Text Independent.
Iris Recognition:
Iris:
• It is the coloured area of the eye that
surrounds the pupil.
• It is a protected internal organ whose
random texture is stable throughout
life.
• The iris patterns are obtained through a
video-based image acquisition system .
Iris Images:
Signature Verification:
• Static/Off-line: the conventional way.
• Dynamic/On-line: using electronically
instrumented device.
Principle:
The movement of the pen during the signing
process rather than the static image of the
signature.Many aspects of the signature in motion
can be studied, such as pen pressure, the sound
the pen makes.
Biometric devices:
• Optical fingerprint scanner:
• Personal fingerprint safes:
These safes are revolutionary locking
systems storage cases that open with
just the touch of your finger.
Advantages of Biometrics:
• Biometric identification can provide extremely
accurate, secured access to information; fingerprints,
retinal and iris scans produce absolutely unique data
sets when done properly.
• Current methods like password verification have
many problems (people write them down, they forget
them, they make up easy-to-hack passwords) .
• Automated biometric identification can be done very
rapidly and uniformly, with a minimum of training .
• Your identity can be verified without resort to
documents that may be stolen, lost or altered.
Disadvantages of BIOMETRICS:
• The finger print of those people working in Chemical
industries are often affected. Therefore these
companies should not use the finger print mode of
authentication.
• It is found that with age, the voice of a person
differs. Also when the person has flu or throat
infection the voice changes or if there there are too
much noise in the environment this method maynot
authenticate correctly. Therefore this method of
verification is not workable all the time
• For people affected with diabetes, the eyes get
affected resulting in differences.
• Biometrics is an expensive security solution.
BIOMETRICS SECURITY:
Security personnel look for biometric data that
does not change over the course of your life;
that is, they look for physical characteristics
that stay constant and that are difficult to fake
or change on purpose.
23636372-biometrics-seminar-ppt.pdf

More Related Content

Similar to 23636372-biometrics-seminar-ppt.pdf

Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsVeridium
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueSunil Kumar Chawla
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication'Femi Akin-Laguda
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptxnagasukanya1
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxSundusKhan42
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric PresentationAnand Yadav
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individualsVaibhav Bhalotia
 

Similar to 23636372-biometrics-seminar-ppt.pdf (20)

Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Top Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & RewardsTop Biometric Identifiers: Risks & Rewards
Top Biometric Identifiers: Risks & Rewards
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric
BiometricBiometric
Biometric
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individuals
 

Recently uploaded

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

23636372-biometrics-seminar-ppt.pdf

  • 2. BIOMETRICS Definition “ Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics”
  • 3. • Physiological • Behavioral Examples-face,fingerprints,hand geometry and iris Recognition,dna. Examples-signature and voice. Biometrics can be sorted into two classes: Categories of BIOMETRICS:
  • 4. Basic characteristics of BIOMETRIC Technologies: • Universality: Every person should have the characteristic. People who are mute or without a fingerprint will need to be accommodated in some way. • Uniqueness: Generally, no two people have identical characteristics. However, identical twins are hard to distinguish. • Permanence: The characteristics should not vary with time. A person's face, for example, may change with age. • Collectibility: The characteristics must be easily collectible and measurable. • Performance: The method must deliver accurate results under varied environmental circumstances. • Acceptability: The general public must accept the sample collection routines. Nonintrusive methods are more acceptable. • Circumvention: The technology should be difficult to deceive
  • 5.
  • 6. Working principle : Biometric devices consist of a reader or scanning device software that converts the gathered information into digital form, and a database that stores the biometric data with comparison with existing records. • Enrollment Mode. • Verification Mode.
  • 7. Modes: • Enrollment Mode: A sample of the biometric trait is captured, processed by a computer, and stored for later comparison . • Verification Mode: In this mode biometric system authenticates a person’s claimed identity from their previously enrolled pattern.
  • 8. Biometric Modalities: • Fingerprint Recognition: For fingerprint Recognition look at :  Friction ridges.  Core  Crossover.  Delta.  Island  Ridge Ending.  Pore.
  • 9.
  • 10. LOOP, ARCH AND WHORL
  • 11. Minutiae • Uses ridge endings ,bifurcations on a person’s finger to plot points know as Minutiae. • The number and locations of the minutiae vary from finger to finger in any particular person, and from person to person for any particular finger. Finger Image Finger Image + Minutiae Minutiae
  • 12.
  • 13. Face Recognition: It involves recognizing people by there: • Facial features. • Face geometry. Principle: Analysis of unique shape, pattern and positioning of facial features.
  • 14.
  • 15. Voice Recognition: • Voice recognition is not the same as speech recognition, it is speaker recognition. • Considered both physiological and behavioral. • Popular and low-cost, but less accurate and sometimes lengthy enrollment.
  • 16.
  • 17. Styles of spoken input: These system have three styles of spoken inputs: • Text Dependent. • Text prompted. • Text Independent.
  • 18. Iris Recognition: Iris: • It is the coloured area of the eye that surrounds the pupil. • It is a protected internal organ whose random texture is stable throughout life. • The iris patterns are obtained through a video-based image acquisition system .
  • 20.
  • 21. Signature Verification: • Static/Off-line: the conventional way. • Dynamic/On-line: using electronically instrumented device. Principle: The movement of the pen during the signing process rather than the static image of the signature.Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes.
  • 22. Biometric devices: • Optical fingerprint scanner:
  • 23. • Personal fingerprint safes: These safes are revolutionary locking systems storage cases that open with just the touch of your finger.
  • 24. Advantages of Biometrics: • Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly. • Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords) . • Automated biometric identification can be done very rapidly and uniformly, with a minimum of training . • Your identity can be verified without resort to documents that may be stolen, lost or altered.
  • 25. Disadvantages of BIOMETRICS: • The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication. • It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time • For people affected with diabetes, the eyes get affected resulting in differences. • Biometrics is an expensive security solution.
  • 26. BIOMETRICS SECURITY: Security personnel look for biometric data that does not change over the course of your life; that is, they look for physical characteristics that stay constant and that are difficult to fake or change on purpose.