SlideShare a Scribd company logo
1 of 11
MEANING:
 Biometrics (or biometric authentication)
refers to the identification of humans by
their characteristics or traits. Biometrics is
used in computer science as a form of
identification and access control.
BIOMETRIC HISTORY INDICATES THAT THE SCIENCE DID NOT
ORIGINATE AT A SINGLE PLACE. PEOPLE ALL OVER THE WORLD WERE
USING THE BASICS FOR MAINLY IDENTIFYING INDIVIDUALS FROM
EACH OTHER.
 14TH CENTURY- CHINESE PRACTICE
 1890’S- BERTILLON AGE
 BIOMETRIC HISTORY IN THE RECENT PAST (THREE DECADES) HAS
SEEN DRASTIC ADVANCEMENTS AND THE TECHNOLOGY HAS
MOVED FROM A SINGLE METHOD (FINGERPRINTING) TO MORE
THAN TEN PRUDENT METHODS.
Physiological Characteristics:
Examples:
fingerprint, face recognition, DNA, Palm print,
hand geometry, iris recognition, retina and
odor/scent
 Behavioural Characteristics:
Examples:
typing rhythm, gait, and voice
A BIOMETRIC SYSTEM CAN BE EITHER AN 'IDENTIFICATION'
SYSTEM OR A 'VERIFICATION' (AUTHENTICATION) SYSTEM:
 IDENTIFICATION - ONE TO MANY
 VERIFICATION - ONE TO ONE
BIOMETRIC TECHNOLOGY IS NOW BEING USED IN
ALMOST EVERY AREA.
 Biometric time and attendance systems
 Biometric safes and biometric locks
 biometrics technology in identifying DNA patterns
for identifying criminals
 E-government services
 National security
 Airports, banks
 Recently implemented in ATM’S, VOTING
MACHINES
 ADVANTAGES:
1. CONVENIENCE OF USING YOUR BODY OR A PERSONAL CHARACTERISTIC.
2. THERE IS NO NEED TO REMEMBER SPECIAL CODES/ PASSWORDS.
3. HARDER TO COUNTERFEIT PERSONAL DETAILS
4. ACCURACY
 DISADVANTAGES:
1. BIOMETRIC ELECTRONIC SECURITY SYSTEMS CANNOT BE RESET EASILY.
2. MAY INVADE AN INDIVIDUAL'S PRIVACY.
3. THE ELECTRONIC SECURITY SYSTEM MAY BE FLAWED AND SUDDENLY MAY
NOT RECOGNISE AN INDIVIDUAL.
4. CRIMINALS MAY USE THE INFORMATION STORED.
5. COSTLY
Biometrics Identification Authentication

More Related Content

Similar to Biometrics Identification Authentication

Similar to Biometrics Identification Authentication (7)

seminar_report
seminar_reportseminar_report
seminar_report
 
Anthropometry pps
Anthropometry ppsAnthropometry pps
Anthropometry pps
 
Cam Assi Mahi
Cam Assi MahiCam Assi Mahi
Cam Assi Mahi
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics.pptx
Biometrics.pptxBiometrics.pptx
Biometrics.pptx
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Biometrics Identification Authentication

  • 1.
  • 2. MEANING:  Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control.
  • 3. BIOMETRIC HISTORY INDICATES THAT THE SCIENCE DID NOT ORIGINATE AT A SINGLE PLACE. PEOPLE ALL OVER THE WORLD WERE USING THE BASICS FOR MAINLY IDENTIFYING INDIVIDUALS FROM EACH OTHER.  14TH CENTURY- CHINESE PRACTICE  1890’S- BERTILLON AGE  BIOMETRIC HISTORY IN THE RECENT PAST (THREE DECADES) HAS SEEN DRASTIC ADVANCEMENTS AND THE TECHNOLOGY HAS MOVED FROM A SINGLE METHOD (FINGERPRINTING) TO MORE THAN TEN PRUDENT METHODS.
  • 4. Physiological Characteristics: Examples: fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, retina and odor/scent  Behavioural Characteristics: Examples: typing rhythm, gait, and voice
  • 5.
  • 6. A BIOMETRIC SYSTEM CAN BE EITHER AN 'IDENTIFICATION' SYSTEM OR A 'VERIFICATION' (AUTHENTICATION) SYSTEM:  IDENTIFICATION - ONE TO MANY  VERIFICATION - ONE TO ONE
  • 7.
  • 8. BIOMETRIC TECHNOLOGY IS NOW BEING USED IN ALMOST EVERY AREA.  Biometric time and attendance systems  Biometric safes and biometric locks  biometrics technology in identifying DNA patterns for identifying criminals  E-government services  National security  Airports, banks  Recently implemented in ATM’S, VOTING MACHINES
  • 9.
  • 10.  ADVANTAGES: 1. CONVENIENCE OF USING YOUR BODY OR A PERSONAL CHARACTERISTIC. 2. THERE IS NO NEED TO REMEMBER SPECIAL CODES/ PASSWORDS. 3. HARDER TO COUNTERFEIT PERSONAL DETAILS 4. ACCURACY  DISADVANTAGES: 1. BIOMETRIC ELECTRONIC SECURITY SYSTEMS CANNOT BE RESET EASILY. 2. MAY INVADE AN INDIVIDUAL'S PRIVACY. 3. THE ELECTRONIC SECURITY SYSTEM MAY BE FLAWED AND SUDDENLY MAY NOT RECOGNISE AN INDIVIDUAL. 4. CRIMINALS MAY USE THE INFORMATION STORED. 5. COSTLY