SlideShare a Scribd company logo
1 of 20
To
STUDENT FORUM
2016 - 2017
CONTENT
INTRODUCTION
WHAT IS BIOMETRICS
HISTORY OF BIOMETRICS
TYPE OF BIOMETRIC
METHODOLOGY
.BIOMETRICS WORKING SYSYTEM
 APPLICATION OF BIOMETRIC
 DISADVANTAGES OF BIOMETRICS
 ADVANTAGES OF BIOMETRICS
BIOMETRICS TECHNIQUES
BIOMETRICS IN ACCESS CONTROL SYSTEM
HAND SCAN
VERIFICATION
INTRODUCTION
SSSBiometrics technology makes use of a
person’s physiological or behavioral
characteristics in identification . Every
human being is unique in nature and
possesses physical parts completely
different from any other person.
What is Biometrics ?
 Biometrics is a branch of computer
security centering on Authenticating a
person Identity based on some
physiological or Behavioral Characteristic
The Internet System
 Authentication System Verifies the
Identity of a User
HISTORY OF BIOMETRICS
The
The First known example of biometrics in practice was a
form of finger printing being used in china in the 14th century.
TYPE OF BIOMETRICS
Mouse Motion
Keystroke
Scroll
Click
Four different biometric traits were collected by pace
university’s existing frontend system and backend classifier
Biometrics system work by recording and
comparing Biometric characteristics.
Biometric devices consist of a reader or scanning
device software that converts the gathered information
into digital form and a database that stores the
biometric data.
Different Type of biometrics techniques
 Identification and verification :
 Verification only :
• Fingerprint Scan
• Face recognition (Facial scan)
• Retina scan
• Iris scan
• Hand Geometry
• Keystroke Dynamics
• Mouse Dynamics
• Voice print
• Signature
BIOMETRIC IN ACCESS CONTROL SYSTEM
Benefits of fingerprint Access Control System ?
Electronic Card replacement for lost ID cards. Key publication.
1.Reduce Cost.
2.Ellminates Identity fraudulence in unauthorized access
3.Fingerprints ID is convenient, simple
 Security
 Authentication
 E-Commerce & E-governments
 Secure Banking & Financial Transaction
 Digital Right Management
 Healthcare Application
 Crime Investigation
 Social Services
 It provides higher security Iris recognition.
 Biometrics are generally used for authentication.
 Voice Recognition works well over the telephone
 User friendly Hand geometry reorganization,
Finger print recognition.
 Iris scanning is incompatible with the substantial investment .
 Iris recognition is very difficult to perform at a larger
distance .
 Iris recognition is susceptible to poor image quality , with
associated failure to enroll rates .
There are five stages involved in finger scan verification and identification
 Image Acquisition
 Location of distinctive Characteristics
 Image Processing
 Template creation
 Template Matching
 Hand scan, also know as hand geometry, is a biometric authentication
technology .
 The system maps key features of the topology of a person’s hand ,
Measuring all the creases on the palm .
 This is more expensive and considered less accurate
than other biometrics .
Verification :-
Comparing a sample against a single stored template is called verification
INPUT STORE
TEMPLATE
 While Biometric authentication can offer a high degree of
security, they are far from perfect solution.
 The influences of biometric technology on society and
risks to privacy and threat to identify will require meditation
through legislation .
( ITC Department)
Sultanpur
UNDERSUPERVISION:-
MR.BASANT SIR
PRESENTED BY:-
Reg. No. Name:-
( 39122 ) MUDASSIR KHAN
( 34091 ) SANTOSH KUMAR

More Related Content

What's hot

Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & consGagan Gowda
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 

What's hot (20)

Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 

Similar to Biometric of technology.ppt

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredEnterprise Wired
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 

Similar to Biometric of technology.ppt (20)

Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Biometric of technology.ppt

  • 2. CONTENT INTRODUCTION WHAT IS BIOMETRICS HISTORY OF BIOMETRICS TYPE OF BIOMETRIC METHODOLOGY .BIOMETRICS WORKING SYSYTEM  APPLICATION OF BIOMETRIC  DISADVANTAGES OF BIOMETRICS  ADVANTAGES OF BIOMETRICS BIOMETRICS TECHNIQUES BIOMETRICS IN ACCESS CONTROL SYSTEM HAND SCAN VERIFICATION
  • 3. INTRODUCTION SSSBiometrics technology makes use of a person’s physiological or behavioral characteristics in identification . Every human being is unique in nature and possesses physical parts completely different from any other person.
  • 4. What is Biometrics ?  Biometrics is a branch of computer security centering on Authenticating a person Identity based on some physiological or Behavioral Characteristic The Internet System  Authentication System Verifies the Identity of a User
  • 5. HISTORY OF BIOMETRICS The The First known example of biometrics in practice was a form of finger printing being used in china in the 14th century.
  • 7. Mouse Motion Keystroke Scroll Click Four different biometric traits were collected by pace university’s existing frontend system and backend classifier
  • 8. Biometrics system work by recording and comparing Biometric characteristics. Biometric devices consist of a reader or scanning device software that converts the gathered information into digital form and a database that stores the biometric data.
  • 9. Different Type of biometrics techniques  Identification and verification :  Verification only : • Fingerprint Scan • Face recognition (Facial scan) • Retina scan • Iris scan • Hand Geometry • Keystroke Dynamics • Mouse Dynamics • Voice print • Signature
  • 10. BIOMETRIC IN ACCESS CONTROL SYSTEM Benefits of fingerprint Access Control System ? Electronic Card replacement for lost ID cards. Key publication. 1.Reduce Cost. 2.Ellminates Identity fraudulence in unauthorized access 3.Fingerprints ID is convenient, simple
  • 11.  Security  Authentication  E-Commerce & E-governments  Secure Banking & Financial Transaction  Digital Right Management  Healthcare Application  Crime Investigation  Social Services
  • 12.  It provides higher security Iris recognition.  Biometrics are generally used for authentication.  Voice Recognition works well over the telephone  User friendly Hand geometry reorganization, Finger print recognition.
  • 13.  Iris scanning is incompatible with the substantial investment .  Iris recognition is very difficult to perform at a larger distance .  Iris recognition is susceptible to poor image quality , with associated failure to enroll rates .
  • 14. There are five stages involved in finger scan verification and identification  Image Acquisition  Location of distinctive Characteristics  Image Processing  Template creation  Template Matching
  • 15.  Hand scan, also know as hand geometry, is a biometric authentication technology .  The system maps key features of the topology of a person’s hand , Measuring all the creases on the palm .  This is more expensive and considered less accurate than other biometrics .
  • 16. Verification :- Comparing a sample against a single stored template is called verification INPUT STORE TEMPLATE
  • 17.  While Biometric authentication can offer a high degree of security, they are far from perfect solution.  The influences of biometric technology on society and risks to privacy and threat to identify will require meditation through legislation .
  • 18.
  • 19.
  • 20. ( ITC Department) Sultanpur UNDERSUPERVISION:- MR.BASANT SIR PRESENTED BY:- Reg. No. Name:- ( 39122 ) MUDASSIR KHAN ( 34091 ) SANTOSH KUMAR