SlideShare a Scribd company logo
1 of 27
25 BIOMETRICS
TERMSYOU
SHOULD KNOW
1. AFIS
■ AFIS refers to an Automated Fingerprint Identification
System which is a method to analyze fingerprint data by
digital imaging technology.
2. ABIS
■ ABIS (Automated Biometric Identification System) is also a
large scale customizable software solution similar to AFIS,
but with the added advantages of utilizing multiple biometric
modalities including iris and facial recognition.
3. Physiological Biometrics
■ Physiological biometric systems use parts of the human body
for individual identification such as fingerprints, finger vein,
facial or iris recognition.
4. Behavioral Biometrics
■ Behavioral biometric systems identify individuals based on
human actions and behaviors such as keystroke dynamics,
signature analysis, and gesture biometrics.
5. False Accept Rate (FAR)
■ False Acceptance Rate (FAR) is a metric used to measure the
accuracy of biometric systems to correctly or incorrectly
identify individuals and demonstrates the chance of incorrect
matches.
6. False Rejection Rate (FRR)
■ When the system rejects an access mistakenly because of
failing to match the biometric input with the template is
called FRR or False Rejection Rate.
7. Equal Error Rate (ERR)
■ Equal error rate or crossover error rate measures when
acceptance and rejection errors are equal to each other.
8. Failure to Enroll (FTE)
■ FTE used to describe when the biometric system fails to
enroll a person’s biometric attribute due to various factors
such as technical, environmental or damage due to accidental
reasons.
9. Failure to Capture (FTC)
■ FTC occurs when the system couldn’t detect a biometric
input, even though it is correct.
10.TemplateCapacity
■ The maximum capability of stored data in a biometric
system.
11. Multimodal Biometrics
■ Multi-modal biometrics is a system that uses more than one
physiological or behavioral characteristic such as a fingerprint
and finger vein for enrollment, verification, and identification
of a person.
12.Vascular Biometrics
■ Vascular biometrics uses near-infrared light to map vein
patterns inside the human body within the finger or palm to
capture the image of blood vessels.
13. Contactless Biometrics
■ Contactless biometrics refers to biometric technology that
can identify an individual without having to make physical
contact with a hardware device such as iris and facial
recognition).
14.Verification (1:1 Matching)
■ Biometric verification is an identity authentication process to
confirm a person’s identity by matching their biometric traits
such as fingerprints, palm vein, iris, and face recognition.
15. Identification (1:N Matching)
■ Biometric identification is the process of identifying a person
by matching their unique biometric traits such as fingerprints,
palm vein, iris, and face recognition with all stored biometric
templates.
16. BiometricTemplate
■ After a person’s unique physical or behavioral characteristics
are captured by a biometric device, it is converted into a
mathematical file using a complex algorithm and saved into
the biometric database for future
identification/authentication purposes.
17. Biometric Enrollment
■ Biometric enrollment is a process of collecting an individual’s
unique physical or behavioral characteristics using biometric
hardware.
18. Latent Fingerprint
■ A latent fingerprint is a type of fingerprint which cannot be
detected by the naked eye but with special technologies can
be captured, extracted, and used for individual identification.
19. Biometric De-Duplication
■ Biometric de-duplication is a process of identifying duplicate
biometric templates from the database to ensure every
biometric template is unique.
20. Multi-Factor Authentication
■ Multi (or two) factor authentication refers to a biometric
system where more than one biometric credential is required
to identify or authenticate a person.
21. Segmented identification
■ Segmented identification method involves confirming or denying a person’s claimed
identity using a biometric scan followed by verbal confirmation to a general
identification question (e.g.,What is your date of birth?) or the entry of some known
general information (gender, race, eye color).
22. Biometric SSO
■ Single sign-on (SSO) is an independent software system
which authenticates access with a single biometric attribute
within the network.
23. Iris Recognition
■ Iris recognition is a method to identify someone by a single
iris or both irises (the colored, ring-shaped region surrounding
the pupil of the eye).
24. PalmVein Recognition
■ Palm vein recognition is a vascular based biometric system
identification method utilizing the vein pattern of one’s hand
to create a unique template and to identify that person in the
future.
25. FingerVein Recognition
■ Finger vein recognition is a vascular based biometric
identification method which scans the veins inside the finger
and generates an enrollment template based on that pattern
for individual identification.
Thanks for Reading!
■ Information Source: The ABC’s of Biometrics: 25TermsTo Know

More Related Content

What's hot

Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
Suhas Deshpande
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 

What's hot (20)

Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometric technology
Biometric technology Biometric technology
Biometric technology
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 

Similar to 25 Biometrics Terms You Should Know

Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
BirkumarJana
 

Similar to 25 Biometrics Terms You Should Know (20)

Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
The technology of biometric and it's recognition process.pptx
The technology of biometric  and it's recognition process.pptxThe technology of biometric  and it's recognition process.pptx
The technology of biometric and it's recognition process.pptx
 
Biometric System
Biometric SystemBiometric System
Biometric System
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individuals
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

25 Biometrics Terms You Should Know

  • 2. 1. AFIS ■ AFIS refers to an Automated Fingerprint Identification System which is a method to analyze fingerprint data by digital imaging technology.
  • 3. 2. ABIS ■ ABIS (Automated Biometric Identification System) is also a large scale customizable software solution similar to AFIS, but with the added advantages of utilizing multiple biometric modalities including iris and facial recognition.
  • 4. 3. Physiological Biometrics ■ Physiological biometric systems use parts of the human body for individual identification such as fingerprints, finger vein, facial or iris recognition.
  • 5. 4. Behavioral Biometrics ■ Behavioral biometric systems identify individuals based on human actions and behaviors such as keystroke dynamics, signature analysis, and gesture biometrics.
  • 6. 5. False Accept Rate (FAR) ■ False Acceptance Rate (FAR) is a metric used to measure the accuracy of biometric systems to correctly or incorrectly identify individuals and demonstrates the chance of incorrect matches.
  • 7. 6. False Rejection Rate (FRR) ■ When the system rejects an access mistakenly because of failing to match the biometric input with the template is called FRR or False Rejection Rate.
  • 8. 7. Equal Error Rate (ERR) ■ Equal error rate or crossover error rate measures when acceptance and rejection errors are equal to each other.
  • 9. 8. Failure to Enroll (FTE) ■ FTE used to describe when the biometric system fails to enroll a person’s biometric attribute due to various factors such as technical, environmental or damage due to accidental reasons.
  • 10. 9. Failure to Capture (FTC) ■ FTC occurs when the system couldn’t detect a biometric input, even though it is correct.
  • 11. 10.TemplateCapacity ■ The maximum capability of stored data in a biometric system.
  • 12. 11. Multimodal Biometrics ■ Multi-modal biometrics is a system that uses more than one physiological or behavioral characteristic such as a fingerprint and finger vein for enrollment, verification, and identification of a person.
  • 13. 12.Vascular Biometrics ■ Vascular biometrics uses near-infrared light to map vein patterns inside the human body within the finger or palm to capture the image of blood vessels.
  • 14. 13. Contactless Biometrics ■ Contactless biometrics refers to biometric technology that can identify an individual without having to make physical contact with a hardware device such as iris and facial recognition).
  • 15. 14.Verification (1:1 Matching) ■ Biometric verification is an identity authentication process to confirm a person’s identity by matching their biometric traits such as fingerprints, palm vein, iris, and face recognition.
  • 16. 15. Identification (1:N Matching) ■ Biometric identification is the process of identifying a person by matching their unique biometric traits such as fingerprints, palm vein, iris, and face recognition with all stored biometric templates.
  • 17. 16. BiometricTemplate ■ After a person’s unique physical or behavioral characteristics are captured by a biometric device, it is converted into a mathematical file using a complex algorithm and saved into the biometric database for future identification/authentication purposes.
  • 18. 17. Biometric Enrollment ■ Biometric enrollment is a process of collecting an individual’s unique physical or behavioral characteristics using biometric hardware.
  • 19. 18. Latent Fingerprint ■ A latent fingerprint is a type of fingerprint which cannot be detected by the naked eye but with special technologies can be captured, extracted, and used for individual identification.
  • 20. 19. Biometric De-Duplication ■ Biometric de-duplication is a process of identifying duplicate biometric templates from the database to ensure every biometric template is unique.
  • 21. 20. Multi-Factor Authentication ■ Multi (or two) factor authentication refers to a biometric system where more than one biometric credential is required to identify or authenticate a person.
  • 22. 21. Segmented identification ■ Segmented identification method involves confirming or denying a person’s claimed identity using a biometric scan followed by verbal confirmation to a general identification question (e.g.,What is your date of birth?) or the entry of some known general information (gender, race, eye color).
  • 23. 22. Biometric SSO ■ Single sign-on (SSO) is an independent software system which authenticates access with a single biometric attribute within the network.
  • 24. 23. Iris Recognition ■ Iris recognition is a method to identify someone by a single iris or both irises (the colored, ring-shaped region surrounding the pupil of the eye).
  • 25. 24. PalmVein Recognition ■ Palm vein recognition is a vascular based biometric system identification method utilizing the vein pattern of one’s hand to create a unique template and to identify that person in the future.
  • 26. 25. FingerVein Recognition ■ Finger vein recognition is a vascular based biometric identification method which scans the veins inside the finger and generates an enrollment template based on that pattern for individual identification.
  • 27. Thanks for Reading! ■ Information Source: The ABC’s of Biometrics: 25TermsTo Know