SlideShare a Scribd company logo
1 of 15
Biometrics = bios + metron. Bios means life and metron
means measure.
In the terms of computer security, biometrics refers to
authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified .
A Biometrics System is a system for the automated
recognition of individuals based on their behaviour and
biological characteristics. Also called
BEHAVIOMETRICS.
Biometric-based solutions are able to provide for
confidential financial transactions and personal data
privacy
There two types of biometrics
1. Physiological biometrics
2. Behavioral biometrics
Depending on the context, in a biometrics system, there are two
different ways to resolve a person’s identity
I. Verification
II. Identification
VERIFICATION
Comparing a sample against a single stored template is called
verification.
IDENTIFICATION
Search a sample against a database of templates.
1) Physiological biometrics :
Physiological are related to the shape of the body.
EXAMPLES :-
Handprint
Fingerprint
Retina
Face
2) Behavioral biometrics:
Behavioral are related to the behavior of a person.
EXAMPLES :-
Voice/Speech
Handwriting/Signature
Movement Patterns(i.e. typing, walking, etc.)
1) Physiological Biometrics
2) Behavioral Biometrics
Everybody has unique handprints.
A handprint Biometric Systems
scans hand and finger sand the
data is compared with the
specimen stored for you in the
system. The user is allowed or
denied based on the result of this
verification.
Fingerprints are used in forensic
and identification for long time.
Fingerprint Biometric Systems
examine the unique
characteristics of your
fingerprints and use that
information to determine
whether or not you should be
Retina Pattern Biometric system
uses an infrared beam to scan
your retina. Retina pattern
biometric systems examine the
unique characteristics of user’s
retina and compare that
information with stored pattern
to determine whether user should
be allowed access.
A facial recognisation system is a
computer application for
automatically identifying or
verifying a person from a digital
image or a video frame from a
video source.
Voice Patterns Biometric
Systems can also be used for
user authentication. Voice
Patterns Biometric Systems
examine the unique
characteristics of user’s voice.
Signature recognition is a
behavioral biometric. The
dynamics is measured as a
means of the pressure,
direction, acceleration and
the length of the strokes,
dynamics number of strokes
and their duration.
Keystroke Biometric Systems
examine the unique
characteristics of user’s
keystrokes and use that
information to determine
whether the user should be
allowed access.
• Criminal identification
• Prison security
• ATM and other Financial
Transactions
• PC/LAN Login
• Database access
• Border crossing controls
Biometrics
• Costly
• Facial imaging can also hinder
accurate identifications.
• Missing body part problem.
• False acceptances and rejections.
• The amount of comfort.
Security
Authentication
E-commerce and E-
governments
Secure Banking and Financial
Transaction
Digital Rights Management
Healthcare Application
Crime Investigation
Social Services
Time Clocks or Biometric time and attendance systems, which
are being increasingly used in various organizations to control
employee timekeeping.
Biometric safes and biometric locks, provides security to the
homeowners.
Biometric access control systems, providing strong security at
entrances.
Biometric systems are also developed for securing access to pc's
and providing single logon facilities.
Biometrics airport security devices are also deployed at some of
the world's famous airports to enhance the security standards.
Biometrics is a very interesting and exciting field that has be growing
exponentially in recent years (especially 2001).
While Biometric authentication can offer a high degree of security,
they are far from perfect solution.
The influences of biometric technology on society and the risks to
privacy and threat to identify will require meditation through
legislation.
The wide variety of physically unique traits our bodies give us will
soon allow us to live in a very secure password-less world.
QUESTIONS

More Related Content

What's hot

Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATAA STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATAsipij
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law EnforcementHow Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law Enforcementmehedi76
 

What's hot (18)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Ppt1
Ppt1Ppt1
Ppt1
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Biometric
BiometricBiometric
Biometric
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATAA STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law EnforcementHow Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
 

Viewers also liked

Ppt on open and close door using Applet
Ppt on open and close door using Applet Ppt on open and close door using Applet
Ppt on open and close door using Applet Devyani Vaidya
 
Table of contents blue brain
Table of contents blue brainTable of contents blue brain
Table of contents blue brainkoustuba
 
Wireless Charging Of Mobile
Wireless Charging Of Mobile  Wireless Charging Of Mobile
Wireless Charging Of Mobile Devyani Vaidya
 
Wireless mobile charging using microwaves
Wireless mobile charging using microwavesWireless mobile charging using microwaves
Wireless mobile charging using microwavesDevyani Vaidya
 
Seminar on telephone directory
Seminar on telephone directorySeminar on telephone directory
Seminar on telephone directoryDevyani Vaidya
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing SecurityDevyani Vaidya
 
Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting Devyani Vaidya
 

Viewers also liked (20)

secued cloud
 secued cloud secued cloud
secued cloud
 
Ppt on open and close door using Applet
Ppt on open and close door using Applet Ppt on open and close door using Applet
Ppt on open and close door using Applet
 
Table of contents blue brain
Table of contents blue brainTable of contents blue brain
Table of contents blue brain
 
History of Laptop
History of LaptopHistory of Laptop
History of Laptop
 
Wireless Charging Of Mobile
Wireless Charging Of Mobile  Wireless Charging Of Mobile
Wireless Charging Of Mobile
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
 
Wireless network
Wireless networkWireless network
Wireless network
 
Data As A Service
Data As A ServiceData As A Service
Data As A Service
 
Fuels Saver System
Fuels Saver SystemFuels Saver System
Fuels Saver System
 
Environmental law
Environmental lawEnvironmental law
Environmental law
 
Digital Locker
Digital LockerDigital Locker
Digital Locker
 
Wireless mobile charging using microwaves
Wireless mobile charging using microwavesWireless mobile charging using microwaves
Wireless mobile charging using microwaves
 
Resource management
Resource managementResource management
Resource management
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Seminar on telephone directory
Seminar on telephone directorySeminar on telephone directory
Seminar on telephone directory
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting
 
Applet programming
Applet programming Applet programming
Applet programming
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 

Similar to Ppt on use of biomatrix in secure e trasaction

BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxSundusKhan42
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowFaithCWorth
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxNareshKireedula
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1yasmeenreem
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1yasmeenreem
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 

Similar to Ppt on use of biomatrix in secure e trasaction (20)

BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Access control system
Access control systemAccess control system
Access control system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Biometrics
Biometrics Biometrics
Biometrics
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometric
Biometric Biometric
Biometric
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 

More from Devyani Vaidya

Fundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsFundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsDevyani Vaidya
 
Cosequential processing and the sorting of large files
Cosequential processing and the sorting of large filesCosequential processing and the sorting of large files
Cosequential processing and the sorting of large filesDevyani Vaidya
 
Introduction to the design and specification of file structures
Introduction to the design and specification of file structuresIntroduction to the design and specification of file structures
Introduction to the design and specification of file structuresDevyani Vaidya
 
Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage systemDevyani Vaidya
 

More from Devyani Vaidya (10)

Hashing
HashingHashing
Hashing
 
Fundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsFundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of records
 
Cosequential processing and the sorting of large files
Cosequential processing and the sorting of large filesCosequential processing and the sorting of large files
Cosequential processing and the sorting of large files
 
Introduction to the design and specification of file structures
Introduction to the design and specification of file structuresIntroduction to the design and specification of file structures
Introduction to the design and specification of file structures
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode Technology
 
3D- Doctor
3D- Doctor3D- Doctor
3D- Doctor
 
3D-Password
3D-Password 3D-Password
3D-Password
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Ppt on use of biomatrix in secure e trasaction

  • 1.
  • 2. Biometrics = bios + metron. Bios means life and metron means measure. In the terms of computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified . A Biometrics System is a system for the automated recognition of individuals based on their behaviour and biological characteristics. Also called BEHAVIOMETRICS. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy
  • 3. There two types of biometrics 1. Physiological biometrics 2. Behavioral biometrics Depending on the context, in a biometrics system, there are two different ways to resolve a person’s identity I. Verification II. Identification VERIFICATION Comparing a sample against a single stored template is called verification. IDENTIFICATION Search a sample against a database of templates.
  • 4. 1) Physiological biometrics : Physiological are related to the shape of the body. EXAMPLES :- Handprint Fingerprint Retina Face 2) Behavioral biometrics: Behavioral are related to the behavior of a person. EXAMPLES :- Voice/Speech Handwriting/Signature Movement Patterns(i.e. typing, walking, etc.) 1) Physiological Biometrics 2) Behavioral Biometrics
  • 5.
  • 6. Everybody has unique handprints. A handprint Biometric Systems scans hand and finger sand the data is compared with the specimen stored for you in the system. The user is allowed or denied based on the result of this verification. Fingerprints are used in forensic and identification for long time. Fingerprint Biometric Systems examine the unique characteristics of your fingerprints and use that information to determine whether or not you should be
  • 7.
  • 8. Retina Pattern Biometric system uses an infrared beam to scan your retina. Retina pattern biometric systems examine the unique characteristics of user’s retina and compare that information with stored pattern to determine whether user should be allowed access. A facial recognisation system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.
  • 9. Voice Patterns Biometric Systems can also be used for user authentication. Voice Patterns Biometric Systems examine the unique characteristics of user’s voice. Signature recognition is a behavioral biometric. The dynamics is measured as a means of the pressure, direction, acceleration and the length of the strokes, dynamics number of strokes and their duration.
  • 10. Keystroke Biometric Systems examine the unique characteristics of user’s keystrokes and use that information to determine whether the user should be allowed access.
  • 11. • Criminal identification • Prison security • ATM and other Financial Transactions • PC/LAN Login • Database access • Border crossing controls Biometrics • Costly • Facial imaging can also hinder accurate identifications. • Missing body part problem. • False acceptances and rejections. • The amount of comfort.
  • 12. Security Authentication E-commerce and E- governments Secure Banking and Financial Transaction Digital Rights Management Healthcare Application Crime Investigation Social Services
  • 13. Time Clocks or Biometric time and attendance systems, which are being increasingly used in various organizations to control employee timekeeping. Biometric safes and biometric locks, provides security to the homeowners. Biometric access control systems, providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities. Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards.
  • 14. Biometrics is a very interesting and exciting field that has be growing exponentially in recent years (especially 2001). While Biometric authentication can offer a high degree of security, they are far from perfect solution. The influences of biometric technology on society and the risks to privacy and threat to identify will require meditation through legislation. The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world.