SlideShare a Scribd company logo
1 of 19
BIOMETRICS
Mr. Mayank David Raiborde,
Assistant Professor,
Dept. of Forensic Science,
Kristu Jayanti College, Bengaluru
Overview
• What is Biometrics?
• Measures
• Biometric System
• Modes of Operation
• Modules
• Types of Biometric Recognition
• Applications
• Advantages/Disadvantages
What is Biometrics?
Methods of identifying a person based on
Physiological or Behavioral characteristic.
• Physiological- Hand or finger images, facial
characteristic, speak verification, iris recognition.
• Behavioral- Dynamic Signature Verification and
Keystroke Dynamics.
What Biological Measures Qualify to be a
Biometric
• Universality- Each person should have the characteristic.
• Distinctiveness- Two persons should be different in terms
of characteristics.
• Permanence- Characteristic should be invariant of time.
• Collectability- Characteristic should be measured
Quantitatively.
Biometric Systems
A biometric system is a pattern recognition system
that operates by
o Acquiring Biometric data from an Individual.
o Extracting Feature Set from the Data.
o Comparing the Feature Set with the Template in the
Database.
Operation Modes Of Biometrics
There are two modes of operation.
o Verification Mode
o Identification Mode.
• Depending on the Application Context, Biometric System
can work either on Verification Mode or in Identification
Mode.
Block Diagram of Enrollment, Verification, Identification Phase
INTRODUCTION TO BIOMETRIC RECOGNITION
k diagrams of enrollment, verification, and identification tasks are shown using the four main modules of a biometric system, i.e.,
tcher, and system database.
Operational Modes Contd.
• In Verification mode, the system validates the
person’s identity by comparing the captured
biometric data with the template stored in the
database. This template is stored in the
Enrollment phase.
• In Identification mode the system identifies
the person by searching the templates of all
users in the database for a match. One to
many Comparison.
Modules needed to build a Biometric System
• Sensor module
• Feature Extraction module
• Matcher Module
• System Database Module
1. Sensor Module- It captures the Biometric data of an
Individual. An example can be a Fingerprint Sensor.
2. Feature Extraction Module- Here the obtained biometric data
of an Individual is processed to extract features. Example can be
the Local ridge feature extraction from a Fingerprint.
3. Matcher Module- Here the features extracted during the above
phase are matched against the templates stored in the database.
4. System Database Module- Used to Store Biometric templates
of the users enrolled. The enrollment module is responsible for
Enrolling Individuals to the database.
Types of Biometric Recognition
Common Techniques
• Fingerprint Recognition
• Face Recognition
• Voice Recognition
• Iris Recognition
• Hand Geometry
• Signature Verification
Other Techniques
• Keystroke
• Ear Geometry
• Lip Motion
• Thermograms
• Retina Recognition
Fingerprint Recognition
• Taking an image of a person’s fingertips
and storing the characteristics.
• Includes pattern matching
o Ridges
o Whorls
o Arches
o Furrows
Iris Recognition
• Camera technology
• Infrared illumination
• Mathematical-pattern recognition
techniques
Facial Recognition
• Recording face images through a
digital video camera.
• Analyzing facial characteristics like the
distance between eyes, nose, mouth
and jaw edges.
Applications
• ATMs
• Computer Login
• Online Banking
• National Security
• Elections
• Criminal Investigation
• Identification of missing people
Advantages
• Easy to maintain
• More robust than ID Cards, Passwords, PIN numbers,
etc.
• Cannot be stolen or forgotten
• Single biometric protection for multiple logins
Disadvantages
• It can be very expensive
• The pattern matching might be inaccurate due to
environmental conditions
• The stored biometric data might be vulnerable to
malicious attacks
• Reproduction of biometric data by other people
THANK YOU!!!

More Related Content

Similar to Biometrics -Mayank.pptx

Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access controlArsalan Mohammad
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueSunil Kumar Chawla
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdfVamshiKaram
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySARATHGOVINDKK
 

Similar to Biometrics -Mayank.pptx (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometric
Biometric Biometric
Biometric
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biomatric
BiomatricBiomatric
Biomatric
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
CYBER FORENSIC PPT
CYBER FORENSIC PPTCYBER FORENSIC PPT
CYBER FORENSIC PPT
 

More from Mayank Raiborde

More from Mayank Raiborde (11)

Confessions.pptx
Confessions.pptxConfessions.pptx
Confessions.pptx
 
Relevancy of Facts.pptx
Relevancy of Facts.pptxRelevancy of Facts.pptx
Relevancy of Facts.pptx
 
Dying declaration.pptx
Dying declaration.pptxDying declaration.pptx
Dying declaration.pptx
 
Death Investigation.pptx
Death Investigation.pptxDeath Investigation.pptx
Death Investigation.pptx
 
Basics of genetics.pptx
Basics of genetics.pptxBasics of genetics.pptx
Basics of genetics.pptx
 
DNA Typing - Unit 1.pptx
DNA Typing - Unit 1.pptxDNA Typing - Unit 1.pptx
DNA Typing - Unit 1.pptx
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Hplc.pptx
Hplc.pptxHplc.pptx
Hplc.pptx
 
RIA.pptx
RIA.pptxRIA.pptx
RIA.pptx
 
Blood examination.pptx
Blood examination.pptxBlood examination.pptx
Blood examination.pptx
 
Importance of Genetic Markers in Forensics
Importance of Genetic Markers in ForensicsImportance of Genetic Markers in Forensics
Importance of Genetic Markers in Forensics
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

Biometrics -Mayank.pptx

  • 1. BIOMETRICS Mr. Mayank David Raiborde, Assistant Professor, Dept. of Forensic Science, Kristu Jayanti College, Bengaluru
  • 2. Overview • What is Biometrics? • Measures • Biometric System • Modes of Operation • Modules • Types of Biometric Recognition • Applications • Advantages/Disadvantages
  • 3. What is Biometrics? Methods of identifying a person based on Physiological or Behavioral characteristic. • Physiological- Hand or finger images, facial characteristic, speak verification, iris recognition. • Behavioral- Dynamic Signature Verification and Keystroke Dynamics.
  • 4. What Biological Measures Qualify to be a Biometric • Universality- Each person should have the characteristic. • Distinctiveness- Two persons should be different in terms of characteristics. • Permanence- Characteristic should be invariant of time. • Collectability- Characteristic should be measured Quantitatively.
  • 5. Biometric Systems A biometric system is a pattern recognition system that operates by o Acquiring Biometric data from an Individual. o Extracting Feature Set from the Data. o Comparing the Feature Set with the Template in the Database.
  • 6. Operation Modes Of Biometrics There are two modes of operation. o Verification Mode o Identification Mode. • Depending on the Application Context, Biometric System can work either on Verification Mode or in Identification Mode.
  • 7. Block Diagram of Enrollment, Verification, Identification Phase INTRODUCTION TO BIOMETRIC RECOGNITION k diagrams of enrollment, verification, and identification tasks are shown using the four main modules of a biometric system, i.e., tcher, and system database.
  • 8. Operational Modes Contd. • In Verification mode, the system validates the person’s identity by comparing the captured biometric data with the template stored in the database. This template is stored in the Enrollment phase. • In Identification mode the system identifies the person by searching the templates of all users in the database for a match. One to many Comparison.
  • 9. Modules needed to build a Biometric System • Sensor module • Feature Extraction module • Matcher Module • System Database Module
  • 10. 1. Sensor Module- It captures the Biometric data of an Individual. An example can be a Fingerprint Sensor. 2. Feature Extraction Module- Here the obtained biometric data of an Individual is processed to extract features. Example can be the Local ridge feature extraction from a Fingerprint. 3. Matcher Module- Here the features extracted during the above phase are matched against the templates stored in the database. 4. System Database Module- Used to Store Biometric templates of the users enrolled. The enrollment module is responsible for Enrolling Individuals to the database.
  • 11. Types of Biometric Recognition Common Techniques • Fingerprint Recognition • Face Recognition • Voice Recognition • Iris Recognition • Hand Geometry • Signature Verification
  • 12. Other Techniques • Keystroke • Ear Geometry • Lip Motion • Thermograms • Retina Recognition
  • 13. Fingerprint Recognition • Taking an image of a person’s fingertips and storing the characteristics. • Includes pattern matching o Ridges o Whorls o Arches o Furrows
  • 14. Iris Recognition • Camera technology • Infrared illumination • Mathematical-pattern recognition techniques
  • 15. Facial Recognition • Recording face images through a digital video camera. • Analyzing facial characteristics like the distance between eyes, nose, mouth and jaw edges.
  • 16. Applications • ATMs • Computer Login • Online Banking • National Security • Elections • Criminal Investigation • Identification of missing people
  • 17. Advantages • Easy to maintain • More robust than ID Cards, Passwords, PIN numbers, etc. • Cannot be stolen or forgotten • Single biometric protection for multiple logins
  • 18. Disadvantages • It can be very expensive • The pattern matching might be inaccurate due to environmental conditions • The stored biometric data might be vulnerable to malicious attacks • Reproduction of biometric data by other people