SlideShare a Scribd company logo
1 of 21
 Biometrics refers to the automatic
identification of a person based on his/her
physiological or behavioral characteristics .
DEFINITIONOF BIOMETRICS
Biometrics History
• The term "biometrics" is derived from the Greek words
“bio” which means “life” and “metric” means “to
measure”.
• The first known example of biometrics in practice was a
form of finger printing being used in China in the 14th
century.
• In the 1890s, 'Bertillonage', created a method of bodily
measurement with the criminals who repeated the crimes
with different names and looks.
• After this, finger printing, which was developed by
Richard Edward Henry of Scotland Yard.
Biometric importance
• The security is needed in every place.
• Alleviate the existing problems, Like those
which can be taken, stolen, borrowed or even
forgotten.
• Improves convenience, security, and privacy.
• The first and most critical link in the security
chain.
• presented to counteract security threats.
Physical biometrics
Fingerprint
Facial recognition/face location
Hand geometry
Iris scan
Retina scan
Fingerprint recognition
 A live acquisition of a
person’s fingerprint.
 Dots (very small ridges),
 Space between two
temporarily divergent ridges),
 Spurs (a notch protruding
from a ridge),
 Bridges (small ridges joining
two longer adjacent ridges),
crossovers (two ridges that
cross each other).
Facial Recognition
1. Capture image
2. Find face in image
3. Extract features
(store template)
4. Compare templates
5. Declare matches
 Hand or finger geometry is an automated
measurement of many dimensions of the hand
and fingers.
Hand Geometry
Iris recognition
 Iris scanning measures the iris pattern in the
colored part of the eye.
Retina recognition
 Images back of the
eye and compares
blood vessels with
existing data
Behavioral biometrics
Speaker/voicerecognition
Signature/handwriting
Keystroke/patterning
Speaker / Voice Recognition
 Voice or speaker recognition uses vocal characteristics to
identify individuals using a pass-phrase.
 A telephone or microphone can serve as a sensor.
Signature Verification
 An automated method of measuring an individual’s
signature.
 This technology examines speed , direction and pressure
of writing.
 The time that the stylus is in and out of contact with the
“paper’’.
 Keystroke dynamics is an automated method of
examining an individual’s keystrokes on a keyboard.
 This technology examines such dynamics as speed and
pressure, the total time taken to type particular words,
and the time elapsed between hitting certain keys.
Keystroke dynamics
Biometrics Process
No
Yes
Biometric
Data Collection
Transmission
Quality
Sufficient?
Yes
Template Match
Signal Processing,
Feature Extraction,
Representation
Database
Generate Template
Decision
Confidence?
“new biometric sample is requested”
No
Advantagesof biometrics
1. Uniqueness
2. Universality
3. Permanence
4. Measurability
5. User friendliness
6. Accuracy
7. Comfort
Disadvantages of Biometrics
1. Costly
2. Facial imaging can also hinder accurate
identifications.
3. Missing body part problem.
4. The scanning of eye is fearful.
5. The nervousness that people feel about the
scanners identification
FutureProspects
• Biometry is one of the most promising and life-altering
technologies in existence today. It is all set to change the way
we live in the future. Some of the emerging biometrics
technologies in the near future are:
1)Ear shape identification.
2)Body odor identification.
3)Body salinity identification.
4)EEG Fingerprint
5)DNA matching
Biometrics clear presentation by Adduri kalyan(AK)

More Related Content

What's hot

Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometrics
BiometricsBiometrics
BiometricsNA000000
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its applicationArnab Podder
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometrics authentication
Biometrics   authenticationBiometrics   authentication
Biometrics authenticationDinesh Kumar
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its applicationArnab Podder
 

What's hot (20)

Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometric
BiometricBiometric
Biometric
 
Seminar
SeminarSeminar
Seminar
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Biometrics authentication
Biometrics   authenticationBiometrics   authentication
Biometrics authentication
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 

Similar to Biometrics clear presentation by Adduri kalyan(AK)

Similar to Biometrics clear presentation by Adduri kalyan(AK) (20)

Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
FORENSIC BIOMETRIC
FORENSIC BIOMETRICFORENSIC BIOMETRIC
FORENSIC BIOMETRIC
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Biometrics clear presentation by Adduri kalyan(AK)

  • 1.
  • 2.  Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics . DEFINITIONOF BIOMETRICS
  • 3. Biometrics History • The term "biometrics" is derived from the Greek words “bio” which means “life” and “metric” means “to measure”. • The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century. • In the 1890s, 'Bertillonage', created a method of bodily measurement with the criminals who repeated the crimes with different names and looks. • After this, finger printing, which was developed by Richard Edward Henry of Scotland Yard.
  • 4. Biometric importance • The security is needed in every place. • Alleviate the existing problems, Like those which can be taken, stolen, borrowed or even forgotten. • Improves convenience, security, and privacy. • The first and most critical link in the security chain. • presented to counteract security threats.
  • 5.
  • 6. Physical biometrics Fingerprint Facial recognition/face location Hand geometry Iris scan Retina scan
  • 7. Fingerprint recognition  A live acquisition of a person’s fingerprint.  Dots (very small ridges),  Space between two temporarily divergent ridges),  Spurs (a notch protruding from a ridge),  Bridges (small ridges joining two longer adjacent ridges), crossovers (two ridges that cross each other).
  • 8. Facial Recognition 1. Capture image 2. Find face in image 3. Extract features (store template) 4. Compare templates 5. Declare matches
  • 9.  Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers. Hand Geometry
  • 10. Iris recognition  Iris scanning measures the iris pattern in the colored part of the eye.
  • 11. Retina recognition  Images back of the eye and compares blood vessels with existing data
  • 13. Speaker / Voice Recognition  Voice or speaker recognition uses vocal characteristics to identify individuals using a pass-phrase.  A telephone or microphone can serve as a sensor.
  • 14. Signature Verification  An automated method of measuring an individual’s signature.  This technology examines speed , direction and pressure of writing.  The time that the stylus is in and out of contact with the “paper’’.
  • 15.  Keystroke dynamics is an automated method of examining an individual’s keystrokes on a keyboard.  This technology examines such dynamics as speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys. Keystroke dynamics
  • 16. Biometrics Process No Yes Biometric Data Collection Transmission Quality Sufficient? Yes Template Match Signal Processing, Feature Extraction, Representation Database Generate Template Decision Confidence? “new biometric sample is requested” No
  • 17. Advantagesof biometrics 1. Uniqueness 2. Universality 3. Permanence 4. Measurability 5. User friendliness 6. Accuracy 7. Comfort
  • 18. Disadvantages of Biometrics 1. Costly 2. Facial imaging can also hinder accurate identifications.
  • 19. 3. Missing body part problem. 4. The scanning of eye is fearful. 5. The nervousness that people feel about the scanners identification
  • 20. FutureProspects • Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are: 1)Ear shape identification. 2)Body odor identification. 3)Body salinity identification. 4)EEG Fingerprint 5)DNA matching