SlideShare a Scribd company logo
1 of 28
Under the Guidance of:
Lect. Gagandeep Kaur
YCoE , Talwandi sabo
Presented By
Gurpreet Kaur
M.tech 2 sem
21392009
Biometrics combination of two Greek words:
Bio means “Life” and
Metrics means “To Measure”.
Biometrics are automated methods of identifying a
person or verifying the identity of a person based on
a physiological or behavioural characteristic.
 Authentication is the act of confirming
something what it claims to be.
 It is the process of giving someone identity so
that he or she can access that particular
application or data.
 For e.g.: giving identity-card to a student of an
institute.
Biometric systems uses three steps:
 Enrollment: It records basic information about you,
like your name or an identification number.
 Storage: Some systems also record this data onto a
smart card that you carry with you.
 Comparison: It either accepts or rejects that you are
who you claim to be.
Systems uses three components:
 A sensor that detects the characteristic being used
for identification.
 A computer that reads and stores the information.
 Software that analyzes the characteristic, translates
it into a graph or code and performs the actual
comparisons.
Each biometric has its strengths and weaknesses,
and the choice depends on the application.
 DNA Fingerprinting
 Face Recognition
 Fingerprint
 Iris Recognition
 Signature Verification
 Voice Recognition
 Deoxyribonucleic Acid (DNA) is the one-
dimensional ultimate unique code.
 DNA is very much accurate.
It is based on the location & shape of Facial
Attributes like eyes, eye brows, nose, lips, etc.
Database
Input face
image
Extraction of
face image
Extraction of
face features
Positive
Negative
 A fingerprint is the pattern of ridges and
valleys on the surface of a fingertip.
 It is very easy to use.
 The device is very cheap and portable.
 The device used to recognize Fingerprints
consumes less power.
Database
Input of face
image
Detection of
eye regions
Put iris in focus
Recognition of
iris pattern
Accept
Reject
 Signature identification: is the analyses of the way a
user signs his or her name.
 The angle at which the pen is held.
 The number of times the pen is lifted.
 The time it takes to write the entire signature.
 It is very easier and cheaper.
 National ID card.
 Driver’s license.
 Social security.
 Computer network login.(Fingerprint verification system)
 Electronic data security.
 Internet access.
 ATM .(face recognition)
 Credit card.
 Internet banking.
Directly authenticates the person.
Difficult to steal; thereby making biometrics
authentication very strong.
Portable, and is unlikely to be lost.
user cannot share or forget his retina or fingerprint, while
a password and username are easily forgotten.
Comfort.
Accuracy.
 Costly
 Facial imaging can also hinder accurate
identifications.
 Missing body part problem
 False acceptances and rejections.
 The scanning of eye is fearful.
Biometric Authentication are:
Successful applications.
Decreasing costs and increasing convenience.
Increasing both privacy and identity security.
Benefit from this technology .
“Your body as password”? Now latest work based upon
ECG.
Thank
You
21392009 laddi
21392009 laddi
21392009 laddi
21392009 laddi
21392009 laddi
21392009 laddi
21392009 laddi
21392009 laddi
21392009 laddi
21392009 laddi
21392009 laddi

More Related Content

What's hot

Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar promaproma_goswami
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasTenet Systems Pvt Ltd
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & consGagan Gowda
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 

What's hot (20)

Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Final report
Final reportFinal report
Final report
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 

Viewers also liked

Levis strategicadvantagethroughinformation-phpapp01
Levis   strategicadvantagethroughinformation-phpapp01Levis   strategicadvantagethroughinformation-phpapp01
Levis strategicadvantagethroughinformation-phpapp01Mustafa Ozer
 
Final term paper shakespeare
Final term paper shakespeareFinal term paper shakespeare
Final term paper shakespeareTaylor Payne
 
Small Familiy Bussiness
Small Familiy BussinessSmall Familiy Bussiness
Small Familiy BussinessMustafa Ozer
 
[Webinar] New Features in SharePoint 2016
[Webinar] New Features in SharePoint 2016 [Webinar] New Features in SharePoint 2016
[Webinar] New Features in SharePoint 2016 James Wright
 
[Webinar] New Features in SharePoint 2016
[Webinar] New Features in SharePoint 2016[Webinar] New Features in SharePoint 2016
[Webinar] New Features in SharePoint 2016James Wright
 
How to Improve Usability and Drive Productivity in SharePoint & Office 365
How to Improve Usability and Drive Productivity in SharePoint & Office 365How to Improve Usability and Drive Productivity in SharePoint & Office 365
How to Improve Usability and Drive Productivity in SharePoint & Office 365James Wright
 

Viewers also liked (16)

Levis strategicadvantagethroughinformation-phpapp01
Levis   strategicadvantagethroughinformation-phpapp01Levis   strategicadvantagethroughinformation-phpapp01
Levis strategicadvantagethroughinformation-phpapp01
 
ICT İN HOLLAND
ICT İN HOLLANDICT İN HOLLAND
ICT İN HOLLAND
 
Aaah 2
Aaah 2Aaah 2
Aaah 2
 
Mustafa özer
Mustafa özerMustafa özer
Mustafa özer
 
Buddhism
Buddhism Buddhism
Buddhism
 
Overcoming SAP training challenges
Overcoming SAP training challengesOvercoming SAP training challenges
Overcoming SAP training challenges
 
Why Choose Michael Management?
Why Choose Michael Management?Why Choose Michael Management?
Why Choose Michael Management?
 
Bài tập lớn cơ đất
Bài tập lớn cơ đấtBài tập lớn cơ đất
Bài tập lớn cơ đất
 
Final term paper shakespeare
Final term paper shakespeareFinal term paper shakespeare
Final term paper shakespeare
 
Small Familiy Bussiness
Small Familiy BussinessSmall Familiy Bussiness
Small Familiy Bussiness
 
Economic activities
Economic activitiesEconomic activities
Economic activities
 
[Webinar] New Features in SharePoint 2016
[Webinar] New Features in SharePoint 2016 [Webinar] New Features in SharePoint 2016
[Webinar] New Features in SharePoint 2016
 
Hs powerpoint
Hs powerpointHs powerpoint
Hs powerpoint
 
Introduction To Report Painter
Introduction To Report PainterIntroduction To Report Painter
Introduction To Report Painter
 
[Webinar] New Features in SharePoint 2016
[Webinar] New Features in SharePoint 2016[Webinar] New Features in SharePoint 2016
[Webinar] New Features in SharePoint 2016
 
How to Improve Usability and Drive Productivity in SharePoint & Office 365
How to Improve Usability and Drive Productivity in SharePoint & Office 365How to Improve Usability and Drive Productivity in SharePoint & Office 365
How to Improve Usability and Drive Productivity in SharePoint & Office 365
 

Similar to 21392009 laddi

BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)mounika117
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Biometric security system
Biometric security systemBiometric security system
Biometric security systemMithun Paul
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 

Similar to 21392009 laddi (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

21392009 laddi

  • 1. Under the Guidance of: Lect. Gagandeep Kaur YCoE , Talwandi sabo Presented By Gurpreet Kaur M.tech 2 sem 21392009
  • 2. Biometrics combination of two Greek words: Bio means “Life” and Metrics means “To Measure”. Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioural characteristic.
  • 3.  Authentication is the act of confirming something what it claims to be.  It is the process of giving someone identity so that he or she can access that particular application or data.  For e.g.: giving identity-card to a student of an institute.
  • 4. Biometric systems uses three steps:  Enrollment: It records basic information about you, like your name or an identification number.  Storage: Some systems also record this data onto a smart card that you carry with you.  Comparison: It either accepts or rejects that you are who you claim to be.
  • 5.
  • 6. Systems uses three components:  A sensor that detects the characteristic being used for identification.  A computer that reads and stores the information.  Software that analyzes the characteristic, translates it into a graph or code and performs the actual comparisons.
  • 7. Each biometric has its strengths and weaknesses, and the choice depends on the application.  DNA Fingerprinting  Face Recognition  Fingerprint  Iris Recognition  Signature Verification  Voice Recognition
  • 8.  Deoxyribonucleic Acid (DNA) is the one- dimensional ultimate unique code.  DNA is very much accurate.
  • 9. It is based on the location & shape of Facial Attributes like eyes, eye brows, nose, lips, etc. Database Input face image Extraction of face image Extraction of face features Positive Negative
  • 10.  A fingerprint is the pattern of ridges and valleys on the surface of a fingertip.  It is very easy to use.  The device is very cheap and portable.  The device used to recognize Fingerprints consumes less power.
  • 11. Database Input of face image Detection of eye regions Put iris in focus Recognition of iris pattern Accept Reject
  • 12.  Signature identification: is the analyses of the way a user signs his or her name.  The angle at which the pen is held.  The number of times the pen is lifted.  The time it takes to write the entire signature.  It is very easier and cheaper.
  • 13.  National ID card.  Driver’s license.  Social security.  Computer network login.(Fingerprint verification system)  Electronic data security.  Internet access.  ATM .(face recognition)  Credit card.  Internet banking.
  • 14. Directly authenticates the person. Difficult to steal; thereby making biometrics authentication very strong. Portable, and is unlikely to be lost. user cannot share or forget his retina or fingerprint, while a password and username are easily forgotten. Comfort. Accuracy.
  • 15.  Costly  Facial imaging can also hinder accurate identifications.  Missing body part problem  False acceptances and rejections.  The scanning of eye is fearful.
  • 16. Biometric Authentication are: Successful applications. Decreasing costs and increasing convenience. Increasing both privacy and identity security. Benefit from this technology . “Your body as password”? Now latest work based upon ECG.