SlideShare a Scribd company logo
1 of 19
Applications of
Biometrics in
Technology
Presented by:
Sanjay Khubchandani FY MSc IT 04
NVPAS
What is Biometrics?
 The word “biometrics” comes form two Greek
words – ‘bio’ meaning life and ‘metric’ meaning
to measure.
 It includes recognition by retina, iris, fingerprints,
face, vein geometry, voice patterns, hand
measurements, etc which are used to identify
human characteristics and to verify identity.
 There is a wide range of usage of
Biometric in the field of Information
Technology..
 Some of them are as follows…
Retina Scanning
 It is a biometric technique that uses the unique
patterns formed by blood vessels on a
person's retina.
 The network of blood vessels in the retina is not
entirely genetically determined, as a result
even identical twins do not share a similar
pattern.
 It was known from 1930s that each human
eyeball has unique characteristics. This
information was later put to use and in 1984 the
first retinal scanner was made available for
commercial use by a company called EyeDentify.
 The retinal scan uses a
low-intensity light source
and a sensor to scan the
pattern of blood vessels
at the back of the retina.
 As the retinal blood
vessels absorb light more
readily than the
surrounding tissue, the
amount of reflection
varies and the blood
vessels appear darker
compared to other
tissues.
 The pattern of variations
is digitized and stored in
a database.
 ADVANTAGES
 Low error rate of 1 in 10,00,000.
 Highly Reliable
 Easy to use.
 DISADVANTAGES
 Measurement accuracy can be affected by
certain diseases such as cataract,
astigmatism, diabetes, etc.
 Invasive scanning process.
 Not very user friendly
 High equipment cost
Retina Scanning
The controls of a
Topocon Retinal
Camera..
Scanners can be made
handheld and easily
portable, like this one
being used by the US
Army, or wall-mounted
for convenience in
places like airports.
Iris Scanning
 Similar to a retina scan, an iris scan also makes
use of the uniqueness of your eyes.
 In an iris scan, the different patterns in your iris are
scanned and stored.
 In 1994, US-born mathematician John Daugman
develops the algorithms that can turn
photographs of irises into unique numeric codes.
He is granted US patent #5,291,560 for a
"biometric personal identification system based
on iris analysis" .
 The eyes of a person are
digitally photographed with
both ordinary light and
infrared light(it has a slightly
longer wavelength than
ordinary red light).
 The infrared helps to show the
patterns of dark coloured
eyes as it is not very clear in
ordinary light.
 These two digital
photographs, are then
analyzed by
a computer which identifies
around 240 unique features.
 These features, are turned into
a 512-digit number called an
Iris Code that is stored in a
computer database.
 ADVANTAGES
 Accuracy and reliability
 Patterns of iris remain unchanged for long
periods of time.
 Hygienic as direct contact with the scanner is
not needed.
 DISADVANTAGES
 High initial cost of equipments.
Fingerprint Scanning
 When a computer checks your fingerprints, there
obviously isn't a little person with a magnifying
glass sitting inside, comparing your fingerprints
with all the hundreds or thousands stored in the
database!
 So how can a computer compare prints? During
enrolment or verification, each print is analyzed
for very specific features called minutiae, where
the lines in your fingerprint terminate or split in
two.
 The computer measures
the distances and angles
between these features—
a bit like drawing lines
between them—and
then uses an algorithm
(mathematical process)
to turn this information
into a unique numeric
code. Comparing
fingerprints is then simply
a matter of comparing
their unique codes. If the
codes match, the prints
match, and the person
gains access.
Face Recognition
 This project was labeled man-machine because the
human extracted the coordinates of a set of features
from the photographs, which were then used by the
computer for recognition.
 Using a graphics tablet (GRAFACON or RAND TABLET),
the operator would extract the coordinates of features
such as the center of pupils, the inside corner of eyes,
the outside corner of eyes, point of widows peak, and
so on. From these coordinates, a list of 20 distances,
such as width of mouth and width of eyes, pupil to
pupil, were computed.
 These operators could
process about 40 pictures
an hour. When building
the database, the name
of the person in the
photograph was
associated with the list of
computed distances and
stored in the computer.
 In the recognition phase,
the set of distances was
compared with the
corresponding distance
for each photograph,
yielding a distance
between the photograph
and the database
record. The closest
records are returned.
Vein Geometry
 As with irises and fingerprints, a person's veins are
completely unique. Twins don't have identical
veins, and a person's veins differ between their
left and right sides.
 To use a vein recognition system, you simply
place your finger, wrist, palm or the back of your
hand on or near the scanner.
 A camera takes a
digital picture using
near-infrared light. The
haemoglobin in your
blood absorbs the light,
so veins appear black in
the picture.
 As with all the other
biometric types, the
software creates a
reference template
based on the shape
and location of the vein
structure.
 All these techniques have a similar way of functioning.
 When a retina, iris, fingerprint, etc are scanned for the
first time the unique features in the form of data is
stored in the database.
 Next time when the same person uses the scanner, the
computer matches the data already stored in it with
the data of the retina, iris or fingerprint, instead of
performing the process all over again.
Biometrics in India
 India's national ID program called Aadhaar is the
largest biometric database of the world. It is a
digital identity of a person assigned for a lifetime.
 It is based on biometric data(fingerprint, iris
scan and face photo), along with demographic
data (name, age, gender, address, etc.) of a
person.
Applications of Biometrics in Technology

More Related Content

What's hot

Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 

What's hot (20)

Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 

Viewers also liked

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowFaithCWorth
 
Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Rockwell Collins | ARINC airports
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS Animetrics
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 
Optical camouflage by nva93
Optical camouflage by nva93Optical camouflage by nva93
Optical camouflage by nva93Nithin V A
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 

Viewers also liked (18)

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Optical camouflage by nva93
Optical camouflage by nva93Optical camouflage by nva93
Optical camouflage by nva93
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 

Similar to Applications of Biometrics in Technology

Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 
Class PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxClass PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxDivyaKumari588020
 

Similar to Applications of Biometrics in Technology (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
biometric technology
biometric technologybiometric technology
biometric technology
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
14 5 b8
14 5 b814 5 b8
14 5 b8
 
Vein rishabh
Vein rishabhVein rishabh
Vein rishabh
 
Class PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxClass PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptx
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Applications of Biometrics in Technology

  • 1. Applications of Biometrics in Technology Presented by: Sanjay Khubchandani FY MSc IT 04 NVPAS
  • 2. What is Biometrics?  The word “biometrics” comes form two Greek words – ‘bio’ meaning life and ‘metric’ meaning to measure.  It includes recognition by retina, iris, fingerprints, face, vein geometry, voice patterns, hand measurements, etc which are used to identify human characteristics and to verify identity.
  • 3.  There is a wide range of usage of Biometric in the field of Information Technology..  Some of them are as follows…
  • 4. Retina Scanning  It is a biometric technique that uses the unique patterns formed by blood vessels on a person's retina.  The network of blood vessels in the retina is not entirely genetically determined, as a result even identical twins do not share a similar pattern.  It was known from 1930s that each human eyeball has unique characteristics. This information was later put to use and in 1984 the first retinal scanner was made available for commercial use by a company called EyeDentify.
  • 5.  The retinal scan uses a low-intensity light source and a sensor to scan the pattern of blood vessels at the back of the retina.  As the retinal blood vessels absorb light more readily than the surrounding tissue, the amount of reflection varies and the blood vessels appear darker compared to other tissues.  The pattern of variations is digitized and stored in a database.
  • 6.  ADVANTAGES  Low error rate of 1 in 10,00,000.  Highly Reliable  Easy to use.  DISADVANTAGES  Measurement accuracy can be affected by certain diseases such as cataract, astigmatism, diabetes, etc.  Invasive scanning process.  Not very user friendly  High equipment cost
  • 7. Retina Scanning The controls of a Topocon Retinal Camera.. Scanners can be made handheld and easily portable, like this one being used by the US Army, or wall-mounted for convenience in places like airports.
  • 8. Iris Scanning  Similar to a retina scan, an iris scan also makes use of the uniqueness of your eyes.  In an iris scan, the different patterns in your iris are scanned and stored.  In 1994, US-born mathematician John Daugman develops the algorithms that can turn photographs of irises into unique numeric codes. He is granted US patent #5,291,560 for a "biometric personal identification system based on iris analysis" .
  • 9.  The eyes of a person are digitally photographed with both ordinary light and infrared light(it has a slightly longer wavelength than ordinary red light).  The infrared helps to show the patterns of dark coloured eyes as it is not very clear in ordinary light.  These two digital photographs, are then analyzed by a computer which identifies around 240 unique features.  These features, are turned into a 512-digit number called an Iris Code that is stored in a computer database.
  • 10.  ADVANTAGES  Accuracy and reliability  Patterns of iris remain unchanged for long periods of time.  Hygienic as direct contact with the scanner is not needed.  DISADVANTAGES  High initial cost of equipments.
  • 11. Fingerprint Scanning  When a computer checks your fingerprints, there obviously isn't a little person with a magnifying glass sitting inside, comparing your fingerprints with all the hundreds or thousands stored in the database!  So how can a computer compare prints? During enrolment or verification, each print is analyzed for very specific features called minutiae, where the lines in your fingerprint terminate or split in two.
  • 12.  The computer measures the distances and angles between these features— a bit like drawing lines between them—and then uses an algorithm (mathematical process) to turn this information into a unique numeric code. Comparing fingerprints is then simply a matter of comparing their unique codes. If the codes match, the prints match, and the person gains access.
  • 13. Face Recognition  This project was labeled man-machine because the human extracted the coordinates of a set of features from the photographs, which were then used by the computer for recognition.  Using a graphics tablet (GRAFACON or RAND TABLET), the operator would extract the coordinates of features such as the center of pupils, the inside corner of eyes, the outside corner of eyes, point of widows peak, and so on. From these coordinates, a list of 20 distances, such as width of mouth and width of eyes, pupil to pupil, were computed.
  • 14.  These operators could process about 40 pictures an hour. When building the database, the name of the person in the photograph was associated with the list of computed distances and stored in the computer.  In the recognition phase, the set of distances was compared with the corresponding distance for each photograph, yielding a distance between the photograph and the database record. The closest records are returned.
  • 15. Vein Geometry  As with irises and fingerprints, a person's veins are completely unique. Twins don't have identical veins, and a person's veins differ between their left and right sides.  To use a vein recognition system, you simply place your finger, wrist, palm or the back of your hand on or near the scanner.
  • 16.  A camera takes a digital picture using near-infrared light. The haemoglobin in your blood absorbs the light, so veins appear black in the picture.  As with all the other biometric types, the software creates a reference template based on the shape and location of the vein structure.
  • 17.  All these techniques have a similar way of functioning.  When a retina, iris, fingerprint, etc are scanned for the first time the unique features in the form of data is stored in the database.  Next time when the same person uses the scanner, the computer matches the data already stored in it with the data of the retina, iris or fingerprint, instead of performing the process all over again.
  • 18. Biometrics in India  India's national ID program called Aadhaar is the largest biometric database of the world. It is a digital identity of a person assigned for a lifetime.  It is based on biometric data(fingerprint, iris scan and face photo), along with demographic data (name, age, gender, address, etc.) of a person.