2. The term "biometrics" is derived from the Greek
words bio (life) and metric (to measure).
In other words we can say that biometrics are
technologies for measuring and analyzing a
person's physiological or behavioral
characteristics. These characteristics are unique
to individuals hence can be used to verify or
identify a person.
3. Based on Passwords, or ID/Swap cards
Can be Lost.
Can be forgotten.
Worse! Can be stolen and used by a
thief/intruder to access your data, bank
accounts, cards etc….
4. Face recognition
Fingerprint
Voice recognition
Palm print
Hand Geometry
Iris recognition
Retina Scan
DNA
Signatures
Gait recognition
Keystroke
6. Effectiveness :
The basic measure of any authentication solution is
accuracy . Improper rejection of individuals who
should have been successfully authenticated. It results
in user frustration and time lost in reauthenticating
must still be part of the measurement of overall
effectiveness.
8. Ease of deployment and use :
No technology can be effective unless and until
Its operational and in regular use . The solution
should be easy to deploy and maintain & shouldn’t
require significant changes to business processes.
10. Enterprise-wide capability :
while an organization may deploy an
authentication solution to meet a single need
today . It make sense early in the selection process
to look at where and how the use of biometrics
expanded to meet future needs .
11. Effectiveness
Ease of deployment and use
Enterprise-wide capability
Economic consideration
12. Economic consideration :
Keeping cost under control is important even
when budgets aren’t under the strain they are
today .
13. applications such as computer network
login , electronic data security , e-commerce, internet
access, ATM , credit card, physical access control,
medical records management and distance learning.
Government applications such as national ID cards,
driver’s license , social security , border control and
passport control.
Forensic applications such as corpse identification ,
criminal investigation and missing children.
Biometrics airport security devices are also deployed at
some of the world’s famous airport to enhance the
security standards.
Commercial
14.
15.
16.
17.
Identification:
– Match a person’s biometrics against a
database to figure out his identity by
Finding the closest match .
– Commonly referred to as 1:N matching
– ‘Criminal Watch-list’ application scenarios .
18.
Verification:
– The person claims to be ‘John’, system must
match and compare his/hers biometrics with
John’s stored Biometrics.
– If they match, then user is ‘verified’ or
authenticated that he is indeed ‘John’
– Access control application scenarios.
– Typically referred as 1:1 matching
19. 1) Iris-based ATM
2)Smart card with fingerprints
3)Fingerprint at check-out counter
4)Face scan at airports
20. Enhanced security
Can’t copied
Can’t be share
Convenience/control
Accuracy
Can’t be lost
Reduced paper work
Costs
21. 1) Recognition errors :
There are two types of recognition errors first is False
accept rate (FAR) and second is False Reject rate
(FRR). A false Accept is when a non matching pair of
biometrics data is wrongly . False Reject is when a
matching pair of biometrics data is wrongly rejected.
2) Compromised biometric data :
Paradoxically , the greatest strength of biometrics is at
the same time its greatest liability. The pattern such as
Iris , Retina or palm vein remain the same throughout
your life. So user has a limited no. of biometric
features.
22. 3) Attacks :
There are so many Ways to bypass biometrics system
Such as presenting fake biometrics or a copy at sensor
for instance a fake finger or fake mask .