2. CONTENT
INTRODUCTION
WHAT IS BIOMETRICS
HISTORY OF BIOMETRICS
TYPE OF BIOMETRIC
METHODOLOGY
.BIOMETRICS WORKING SYSYTEM
APPLICATION OF BIOMETRIC
DISADVANTAGES OF BIOMETRICS
ADVANTAGES OF BIOMETRICS
BIOMETRICS TECHNIQUES
BIOMETRICS IN ACCESS CONTROL SYSTEM
HAND SCAN
VERIFICATION
3. INTRODUCTION
SSSBiometrics technology makes use of a
person’s physiological or behavioral
characteristics in identification . Every
human being is unique in nature and
possesses physical parts completely
different from any other person.
4. What is Biometrics ?
Biometrics is a branch of computer
security centering on Authenticating a
person Identity based on some
physiological or Behavioral Characteristic
The Internet System
Authentication System Verifies the
Identity of a User
5. HISTORY OF BIOMETRICS
The
The First known example of biometrics in practice was a
form of finger printing being used in china in the 14th century.
8. Biometrics system work by recording and
comparing Biometric characteristics.
Biometric devices consist of a reader or scanning
device software that converts the gathered information
into digital form and a database that stores the
biometric data.
9. Different Type of biometrics techniques
Identification and verification :
Verification only :
• Fingerprint Scan
• Face recognition (Facial scan)
• Retina scan
• Iris scan
• Hand Geometry
• Keystroke Dynamics
• Mouse Dynamics
• Voice print
• Signature
10. BIOMETRIC IN ACCESS CONTROL SYSTEM
Benefits of fingerprint Access Control System ?
Electronic Card replacement for lost ID cards. Key publication.
1.Reduce Cost.
2.Ellminates Identity fraudulence in unauthorized access
3.Fingerprints ID is convenient, simple
11. Security
Authentication
E-Commerce & E-governments
Secure Banking & Financial Transaction
Digital Right Management
Healthcare Application
Crime Investigation
Social Services
12. It provides higher security Iris recognition.
Biometrics are generally used for authentication.
Voice Recognition works well over the telephone
User friendly Hand geometry reorganization,
Finger print recognition.
13. Iris scanning is incompatible with the substantial investment .
Iris recognition is very difficult to perform at a larger
distance .
Iris recognition is susceptible to poor image quality , with
associated failure to enroll rates .
14. There are five stages involved in finger scan verification and identification
Image Acquisition
Location of distinctive Characteristics
Image Processing
Template creation
Template Matching
15. Hand scan, also know as hand geometry, is a biometric authentication
technology .
The system maps key features of the topology of a person’s hand ,
Measuring all the creases on the palm .
This is more expensive and considered less accurate
than other biometrics .
16. Verification :-
Comparing a sample against a single stored template is called verification
INPUT STORE
TEMPLATE
17. While Biometric authentication can offer a high degree of
security, they are far from perfect solution.
The influences of biometric technology on society and
risks to privacy and threat to identify will require meditation
through legislation .