Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
BySachin Yadav
I.T. 3 rd year
 The term "biometrics" is derived from the Greek

words bio (life) and metric (to measure).
 In other words we can say t...
 Based on Passwords, or ID/Swap cards

 Can be Lost.
 Can be forgotten.
 Worse! Can be stolen and used by a

thief/int...
 Face recognition
 Fingerprint
 Voice recognition
 Palm print
 Hand Geometry
 Iris recognition
 Retina Scan
 DNA
...
 Effectiveness
 Effectiveness :
The basic measure of any authentication solution is
accuracy . Improper rejection of individuals who
sho...
 Effectiveness

 Ease of deployment and use
 Ease of deployment and use :
No technology can be effective unless and until
Its operational and in regular use . The so...
 Effectiveness

 Ease of deployment and use
 Enterprise-wide capability
 Enterprise-wide capability :
while an organization may deploy an
authentication solution to meet a single need
today . I...
 Effectiveness

 Ease of deployment and use
 Enterprise-wide capability
 Economic consideration
 Economic consideration :
Keeping cost under control is important even
when budgets aren’t under the strain they are
toda...
applications such as computer network
login , electronic data security , e-commerce, internet
access, ATM , credit card, p...


Identification:

– Match a person’s biometrics against a
database to figure out his identity by
Finding the closest mat...


Verification:

– The person claims to be ‘John’, system must
match and compare his/hers biometrics with
John’s stored B...
1) Iris-based ATM
2)Smart card with fingerprints

3)Fingerprint at check-out counter

4)Face scan at airports
 Enhanced security
 Can’t copied
 Can’t be share
 Convenience/control
 Accuracy
 Can’t be lost
 Reduced paper work
...
1) Recognition errors :
There are two types of recognition errors first is False
accept rate (FAR) and second is False Rej...
3) Attacks :
There are so many Ways to bypass biometrics system
Such as presenting fake biometrics or a copy at sensor
for...
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Upcoming SlideShare
Loading in …5
×

Biometrics Presentation By Sachin Yadav (S/W Engineer)

723 views

Published on

Here I have best presentation of Biometrics System use of Biometrics in daily life PPT for College level Seminars

Published in: Technology, Business
  • Be the first to comment

Biometrics Presentation By Sachin Yadav (S/W Engineer)

  1. 1. BySachin Yadav I.T. 3 rd year
  2. 2.  The term "biometrics" is derived from the Greek words bio (life) and metric (to measure).  In other words we can say that biometrics are technologies for measuring and analyzing a person's physiological or behavioral characteristics. These characteristics are unique to individuals hence can be used to verify or identify a person.
  3. 3.  Based on Passwords, or ID/Swap cards  Can be Lost.  Can be forgotten.  Worse! Can be stolen and used by a thief/intruder to access your data, bank accounts, cards etc….
  4. 4.  Face recognition  Fingerprint  Voice recognition  Palm print  Hand Geometry  Iris recognition  Retina Scan  DNA  Signatures  Gait recognition  Keystroke
  5. 5.  Effectiveness
  6. 6.  Effectiveness : The basic measure of any authentication solution is accuracy . Improper rejection of individuals who should have been successfully authenticated. It results in user frustration and time lost in reauthenticating must still be part of the measurement of overall effectiveness.
  7. 7.  Effectiveness  Ease of deployment and use
  8. 8.  Ease of deployment and use : No technology can be effective unless and until Its operational and in regular use . The solution should be easy to deploy and maintain & shouldn’t require significant changes to business processes.
  9. 9.  Effectiveness  Ease of deployment and use  Enterprise-wide capability
  10. 10.  Enterprise-wide capability : while an organization may deploy an authentication solution to meet a single need today . It make sense early in the selection process to look at where and how the use of biometrics expanded to meet future needs .
  11. 11.  Effectiveness  Ease of deployment and use  Enterprise-wide capability  Economic consideration
  12. 12.  Economic consideration : Keeping cost under control is important even when budgets aren’t under the strain they are today .
  13. 13. applications such as computer network login , electronic data security , e-commerce, internet access, ATM , credit card, physical access control, medical records management and distance learning.  Government applications such as national ID cards, driver’s license , social security , border control and passport control.  Forensic applications such as corpse identification , criminal investigation and missing children.  Biometrics airport security devices are also deployed at some of the world’s famous airport to enhance the security standards.  Commercial
  14. 14.  Identification: – Match a person’s biometrics against a database to figure out his identity by Finding the closest match . – Commonly referred to as 1:N matching – ‘Criminal Watch-list’ application scenarios .
  15. 15.  Verification: – The person claims to be ‘John’, system must match and compare his/hers biometrics with John’s stored Biometrics. – If they match, then user is ‘verified’ or authenticated that he is indeed ‘John’ – Access control application scenarios. – Typically referred as 1:1 matching
  16. 16. 1) Iris-based ATM 2)Smart card with fingerprints 3)Fingerprint at check-out counter 4)Face scan at airports
  17. 17.  Enhanced security  Can’t copied  Can’t be share  Convenience/control  Accuracy  Can’t be lost  Reduced paper work  Costs
  18. 18. 1) Recognition errors : There are two types of recognition errors first is False accept rate (FAR) and second is False Reject rate (FRR). A false Accept is when a non matching pair of biometrics data is wrongly . False Reject is when a matching pair of biometrics data is wrongly rejected. 2) Compromised biometric data : Paradoxically , the greatest strength of biometrics is at the same time its greatest liability. The pattern such as Iris , Retina or palm vein remain the same throughout your life. So user has a limited no. of biometric features.
  19. 19. 3) Attacks : There are so many Ways to bypass biometrics system Such as presenting fake biometrics or a copy at sensor for instance a fake finger or fake mask .

×