SlideShare a Scribd company logo
1 of 14
BIOMETRICS 
SHUBHAM SINGH 
(0902IT121057)
Presentation outlines 
• Issues and concerns. 
• Biometric. 
• How biometric works? 
• Biometric characteristics. 
• Applications. 
• Advantage and disadvantage.
What’s the issue? 
A Survey Report in BBC News 
• More than 70% of people revealed their computer password in 
exchange of a bar of chocolate. 
• 66% of staff have given their password to colleague 
• 75% knew their co-workers passwords 
• 60% use the same password for everything, including their 
personal banking. 
• The most common password was “password” (12%), dob (8%), 
football team(11%). 
Any security procedure is only as strong as their 
weakest link 
The users are the weakest link
What is a biometric? 
• Biometrics refers to metrics related to human characteristics 
and traits. 
• Biometrics authentication (or realistic authentication) is used 
in computer science as a form of identification and access 
control . 
• Biometric identifiers are the distinctive, measurable 
characteristics used to label and describe individuals
Various Biometrics Technologies 
Fingerprint Recognition 
Facial Recognition 
Voice Recognition 
Iris Recognition 
Hand geometry 
Signature verification 
DNA 
Retina recognition 
Thermo grams 
Gait 
Keystroke 
Ear Geometry 
Skin reflection 
Lip motion 
Grip recognition
Biometric characteristics 
Biometrics 
Physiological 
Fingerprints 
scan 
Retina scan 
Palm vein 
scan 
Etc... 
Behavioural 
Voice 
recognition 
Signature 
dynamics 
Etc...
Market distribution in 2007
How Biometric Works 
 The flow of ridges and patterns has been classified into 5 broad classes. 
 Classification helps down in narrowing down possible matches. 
 In reality, the class distribution is skewed(>65% are loops). 
 A fingerprint can be classified based on type of the ridge flow pattern.
Ridge Characteristics
Various Applications of fingerprints 
 Banking/Credit 
 Military ID and access control 
 Computer/Network security 
 Cellular phone security 
 Business/Residential access control 
 Time and attendance 
 Personalization etc.
Advantages of biometrics 
 Increase security - Provide a convenient and low-cost additional tier of security. 
 Reduce fraud by employing hard-to-forge technologies and materials. For e.g . 
Minimize the opportunity for ID fraud, buddy punching. 
 Eliminate problems caused by lost IDs or forgotten passwords by using 
physiological attributes. For e.g. Prevent unauthorized use of lost, stolen or 
"borrowed" ID cards. 
 Reduce password administration costs. 
 Replace hard-to-remember passwords which may be shared or observed. 
 Integrate a wide range of biometric solutions and technologies, customer 
applications and databases into a robust and scalable control solution for 
facility and network access 
 Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! 
 Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! 
 Offer significant cost savings or increasing ROI in areas such as Loss Prevention 
or Time & Attendance.
Disadvantages of Biometric 
Biometric identification machines are 
traditionally more expensive to buy than 
traditional ones. 
Some users may reject biometrics as whole, 
seeing it as an invasion of privacy. 
Biometric identification are not always entirely 
accurate. 
Change in users physical or behavioral 
characteristics will result in loss of access to 
data.
ANY QUERIES?
THANK YOU

More Related Content

What's hot

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 

What's hot (20)

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 

Viewers also liked

Viewers also liked (10)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Security
SecuritySecurity
Security
 
biometrics
biometricsbiometrics
biometrics
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 

Similar to Biometrics

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 

Similar to Biometrics (20)

BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdf
 
Biometrics
BiometricsBiometrics
Biometrics
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Biometrics

  • 1. BIOMETRICS SHUBHAM SINGH (0902IT121057)
  • 2. Presentation outlines • Issues and concerns. • Biometric. • How biometric works? • Biometric characteristics. • Applications. • Advantage and disadvantage.
  • 3. What’s the issue? A Survey Report in BBC News • More than 70% of people revealed their computer password in exchange of a bar of chocolate. • 66% of staff have given their password to colleague • 75% knew their co-workers passwords • 60% use the same password for everything, including their personal banking. • The most common password was “password” (12%), dob (8%), football team(11%). Any security procedure is only as strong as their weakest link The users are the weakest link
  • 4. What is a biometric? • Biometrics refers to metrics related to human characteristics and traits. • Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control . • Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals
  • 5. Various Biometrics Technologies Fingerprint Recognition Facial Recognition Voice Recognition Iris Recognition Hand geometry Signature verification DNA Retina recognition Thermo grams Gait Keystroke Ear Geometry Skin reflection Lip motion Grip recognition
  • 6. Biometric characteristics Biometrics Physiological Fingerprints scan Retina scan Palm vein scan Etc... Behavioural Voice recognition Signature dynamics Etc...
  • 8. How Biometric Works  The flow of ridges and patterns has been classified into 5 broad classes.  Classification helps down in narrowing down possible matches.  In reality, the class distribution is skewed(>65% are loops).  A fingerprint can be classified based on type of the ridge flow pattern.
  • 10. Various Applications of fingerprints  Banking/Credit  Military ID and access control  Computer/Network security  Cellular phone security  Business/Residential access control  Time and attendance  Personalization etc.
  • 11. Advantages of biometrics  Increase security - Provide a convenient and low-cost additional tier of security.  Reduce fraud by employing hard-to-forge technologies and materials. For e.g . Minimize the opportunity for ID fraud, buddy punching.  Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorized use of lost, stolen or "borrowed" ID cards.  Reduce password administration costs.  Replace hard-to-remember passwords which may be shared or observed.  Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access  Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!  Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!  Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance.
  • 12. Disadvantages of Biometric Biometric identification machines are traditionally more expensive to buy than traditional ones. Some users may reject biometrics as whole, seeing it as an invasion of privacy. Biometric identification are not always entirely accurate. Change in users physical or behavioral characteristics will result in loss of access to data.