SlideShare a Scribd company logo
1 of 1
NuevaEcijaHighSchool
Biometrics, automatic methods for identifying a person on the basis
of some biological or behavioral characteristic of the person. Many
biological characteristics, such as fingerprints, ad behavioral
characteristics, such as voice patterns, are distinctive to each person.
Therefore, biometrics is more reliable and more capable in distinguishing between a specific
individual and an impostor than any technique based on identification (ID) document or a
password. The word biometrics comes from the Greek bios (life) and metrikos (measure).
In computer technology, biometrics relates to identity-confirmation and security techniques that
rely on measurable, individual biological characteristics. For example, fingerprints, handprints,
or voice patterns might be used to enable access to a computer, to a room, or to an electronic
commerce account.
In general, there are three levels of computer security schemes.
I. Level 1 relies on something a person carries, such as an ID badge with a photograph or a
computer cardkey.
II. Level 2 relies on something a person knows, such as a password or a code number.
III. Level 3, the highest level, relies on something that is a part of a person’s biological makeup or
behavior, such as a fingerprint, a facial image, or a signature.
iometrics Technique
 Facial Recognition
 Fingerprint Identification
 Hand Geometry
 Retinal Pattern Recognition
 Iris – Based Identification
 Signature Recognition
 Voice Recognition
B DONITA MAY P. ROXAS
7- NEWTON
AUGUST 01, 2014

More Related Content

What's hot

Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security Mobile
Jerry Ruggieri
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
Anit Thapaliya
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 

What's hot (20)

Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security Mobile
 
Biometric
 Biometric Biometric
Biometric
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
biometrics
biometricsbiometrics
biometrics
 

Viewers also liked (9)

Arriva Paddington!
Arriva Paddington!Arriva Paddington!
Arriva Paddington!
 
Programacao fev 2013
Programacao fev 2013Programacao fev 2013
Programacao fev 2013
 
Amigos1
Amigos1Amigos1
Amigos1
 
Fallo Corte: Aguas Riojanas SAPEM s/contencioso administrativo
Fallo Corte: Aguas Riojanas SAPEM s/contencioso administrativoFallo Corte: Aguas Riojanas SAPEM s/contencioso administrativo
Fallo Corte: Aguas Riojanas SAPEM s/contencioso administrativo
 
2009.10.23 projeto de vitrina headhoods (universal)
2009.10.23 projeto de vitrina headhoods (universal)2009.10.23 projeto de vitrina headhoods (universal)
2009.10.23 projeto de vitrina headhoods (universal)
 
Ruegos plenos mes abril 2013
Ruegos plenos mes abril 2013Ruegos plenos mes abril 2013
Ruegos plenos mes abril 2013
 
Robert J. Steinheimer-Awards, Training
Robert J. Steinheimer-Awards, TrainingRobert J. Steinheimer-Awards, Training
Robert J. Steinheimer-Awards, Training
 
3
33
3
 
1
11
1
 

Similar to Practical biometrics

Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
danas19
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 

Similar to Practical biometrics (20)

Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Technology and society computer science 2.pptx
Technology and society computer science 2.pptxTechnology and society computer science 2.pptx
Technology and society computer science 2.pptx
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics technology
Biometrics technologyBiometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de  Reconnaissance faciale - eigenfaces, fisherfaces et lbphApplication de  Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbph
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 

More from WonderingAriana

More from WonderingAriana (20)

Presentation
PresentationPresentation
Presentation
 
Uses of Internet
Uses of InternetUses of Internet
Uses of Internet
 
Uses of Internet
Uses of InternetUses of Internet
Uses of Internet
 
Inset 2014 TLE
Inset 2014 TLEInset 2014 TLE
Inset 2014 TLE
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Tips in Powerpoint Presentation
Tips in Powerpoint PresentationTips in Powerpoint Presentation
Tips in Powerpoint Presentation
 
Uses of Powerpoint
Uses of PowerpointUses of Powerpoint
Uses of Powerpoint
 
Quick reference card
Quick reference cardQuick reference card
Quick reference card
 
Ms office ppt_2010_views
Ms office ppt_2010_viewsMs office ppt_2010_views
Ms office ppt_2010_views
 
L1 introenparts
L1 introenpartsL1 introenparts
L1 introenparts
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Objects and effects
Objects and effectsObjects and effects
Objects and effects
 
Picture effects
Picture effectsPicture effects
Picture effects
 
Animation effects
Animation effectsAnimation effects
Animation effects
 
Inserting Audio
Inserting AudioInserting Audio
Inserting Audio
 
Picture Effects
Picture EffectsPicture Effects
Picture Effects
 
Picture Effects
Picture EffectsPicture Effects
Picture Effects
 
Modifying Objects
Modifying ObjectsModifying Objects
Modifying Objects
 
Slide Layout
Slide LayoutSlide Layout
Slide Layout
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Practical biometrics

  • 1. NuevaEcijaHighSchool Biometrics, automatic methods for identifying a person on the basis of some biological or behavioral characteristic of the person. Many biological characteristics, such as fingerprints, ad behavioral characteristics, such as voice patterns, are distinctive to each person. Therefore, biometrics is more reliable and more capable in distinguishing between a specific individual and an impostor than any technique based on identification (ID) document or a password. The word biometrics comes from the Greek bios (life) and metrikos (measure). In computer technology, biometrics relates to identity-confirmation and security techniques that rely on measurable, individual biological characteristics. For example, fingerprints, handprints, or voice patterns might be used to enable access to a computer, to a room, or to an electronic commerce account. In general, there are three levels of computer security schemes. I. Level 1 relies on something a person carries, such as an ID badge with a photograph or a computer cardkey. II. Level 2 relies on something a person knows, such as a password or a code number. III. Level 3, the highest level, relies on something that is a part of a person’s biological makeup or behavior, such as a fingerprint, a facial image, or a signature. iometrics Technique  Facial Recognition  Fingerprint Identification  Hand Geometry  Retinal Pattern Recognition  Iris – Based Identification  Signature Recognition  Voice Recognition B DONITA MAY P. ROXAS 7- NEWTON AUGUST 01, 2014