SlideShare a Scribd company logo
Applications of
Biometrics in
Technology
Presented by:
Sanjay Khubchandani FY MSc IT 04
NVPAS
What is Biometrics?
 The word “biometrics” comes form two Greek
words – ‘bio’ meaning life and ‘metric’ meaning
to measure.
 It includes recognition by retina, iris, fingerprints,
face, vein geometry, voice patterns, hand
measurements, etc which are used to identify
human characteristics and to verify identity.
 There is a wide range of usage of
Biometric in the field of Information
Technology..
 Some of them are as follows…
Retina Scanning
 It is a biometric technique that uses the unique
patterns formed by blood vessels on a
person's retina.
 The network of blood vessels in the retina is not
entirely genetically determined, as a result
even identical twins do not share a similar
pattern.
 It was known from 1930s that each human
eyeball has unique characteristics. This
information was later put to use and in 1984 the
first retinal scanner was made available for
commercial use by a company called EyeDentify.
 The retinal scan uses a
low-intensity light source
and a sensor to scan the
pattern of blood vessels
at the back of the retina.
 As the retinal blood
vessels absorb light more
readily than the
surrounding tissue, the
amount of reflection
varies and the blood
vessels appear darker
compared to other
tissues.
 The pattern of variations
is digitized and stored in
a database.
 ADVANTAGES
 Low error rate of 1 in 10,00,000.
 Highly Reliable
 Easy to use.
 DISADVANTAGES
 Measurement accuracy can be affected by
certain diseases such as cataract,
astigmatism, diabetes, etc.
 Invasive scanning process.
 Not very user friendly
 High equipment cost
Retina Scanning
The controls of a
Topocon Retinal
Camera..
Scanners can be made
handheld and easily
portable, like this one
being used by the US
Army, or wall-mounted
for convenience in
places like airports.
Iris Scanning
 Similar to a retina scan, an iris scan also makes
use of the uniqueness of your eyes.
 In an iris scan, the different patterns in your iris are
scanned and stored.
 In 1994, US-born mathematician John Daugman
develops the algorithms that can turn
photographs of irises into unique numeric codes.
He is granted US patent #5,291,560 for a
"biometric personal identification system based
on iris analysis" .
 The eyes of a person are
digitally photographed with
both ordinary light and
infrared light(it has a slightly
longer wavelength than
ordinary red light).
 The infrared helps to show the
patterns of dark coloured
eyes as it is not very clear in
ordinary light.
 These two digital
photographs, are then
analyzed by
a computer which identifies
around 240 unique features.
 These features, are turned into
a 512-digit number called an
Iris Code that is stored in a
computer database.
 ADVANTAGES
 Accuracy and reliability
 Patterns of iris remain unchanged for long
periods of time.
 Hygienic as direct contact with the scanner is
not needed.
 DISADVANTAGES
 High initial cost of equipments.
Fingerprint Scanning
 When a computer checks your fingerprints, there
obviously isn't a little person with a magnifying
glass sitting inside, comparing your fingerprints
with all the hundreds or thousands stored in the
database!
 So how can a computer compare prints? During
enrolment or verification, each print is analyzed
for very specific features called minutiae, where
the lines in your fingerprint terminate or split in
two.
 The computer measures
the distances and angles
between these features—
a bit like drawing lines
between them—and
then uses an algorithm
(mathematical process)
to turn this information
into a unique numeric
code. Comparing
fingerprints is then simply
a matter of comparing
their unique codes. If the
codes match, the prints
match, and the person
gains access.
Face Recognition
 This project was labeled man-machine because the
human extracted the coordinates of a set of features
from the photographs, which were then used by the
computer for recognition.
 Using a graphics tablet (GRAFACON or RAND TABLET),
the operator would extract the coordinates of features
such as the center of pupils, the inside corner of eyes,
the outside corner of eyes, point of widows peak, and
so on. From these coordinates, a list of 20 distances,
such as width of mouth and width of eyes, pupil to
pupil, were computed.
 These operators could
process about 40 pictures
an hour. When building
the database, the name
of the person in the
photograph was
associated with the list of
computed distances and
stored in the computer.
 In the recognition phase,
the set of distances was
compared with the
corresponding distance
for each photograph,
yielding a distance
between the photograph
and the database
record. The closest
records are returned.
Vein Geometry
 As with irises and fingerprints, a person's veins are
completely unique. Twins don't have identical
veins, and a person's veins differ between their
left and right sides.
 To use a vein recognition system, you simply
place your finger, wrist, palm or the back of your
hand on or near the scanner.
 A camera takes a
digital picture using
near-infrared light. The
haemoglobin in your
blood absorbs the light,
so veins appear black in
the picture.
 As with all the other
biometric types, the
software creates a
reference template
based on the shape
and location of the vein
structure.
 All these techniques have a similar way of functioning.
 When a retina, iris, fingerprint, etc are scanned for the
first time the unique features in the form of data is
stored in the database.
 Next time when the same person uses the scanner, the
computer matches the data already stored in it with
the data of the retina, iris or fingerprint, instead of
performing the process all over again.
Biometrics in India
 India's national ID program called Aadhaar is the
largest biometric database of the world. It is a
digital identity of a person assigned for a lifetime.
 It is based on biometric data(fingerprint, iris
scan and face photo), along with demographic
data (name, age, gender, address, etc.) of a
person.
Applications of Biometrics in Technology

More Related Content

What's hot

Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
Vivek Kumar
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
ANEESH SASIDHARAN
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
Shalika Dissanayaka
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
Biometrics
BiometricsBiometrics
Biometrics
anoop80686
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
vineeth chepuri
 
Biometrics
BiometricsBiometrics
Biometrics
Priyanka Sharma
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
Mazin Alwaaly
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
Aalaa Khattab
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition system
Piyush Mittal
 

What's hot (20)

Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Biometrics
BiometricsBiometrics
Biometrics
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition system
 

Viewers also liked

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
Star Link Communication Pvt Ltd
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
AKS Solutions (Pvt) Ltd.
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
vineeth chepuri
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
esther_sonu
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
FaithCWorth
 
Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015
Rockwell Collins | ARINC airports
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
'Atikah Khalil
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
Animetrics
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
syamil91
 
biometric technology
biometric technologybiometric technology
biometric technology
RAHUL SRIVASTAVA
 
Optical camouflage by nva93
Optical camouflage by nva93Optical camouflage by nva93
Optical camouflage by nva93
Nithin V A
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
twuniversity
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 

Viewers also liked (19)

Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015Using biometric technology to facilitate airport security - November 2015
Using biometric technology to facilitate airport security - November 2015
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Optical camouflage by nva93
Optical camouflage by nva93Optical camouflage by nva93
Optical camouflage by nva93
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 

Similar to Applications of Biometrics in Technology

Biometrics
BiometricsBiometrics
Week12
Week12Week12
Week12
s1170005
 
Week12
Week12Week12
Week12
s1170005
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
Piyush Mittal
 
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
Ajay K
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
YUSRA FERNANDO
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
University of Aizu
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
Akash Patel
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
Dharmendrasingh417
 
14 5 b8
14 5 b814 5 b8
14 5 b8
Chaitanya Ram
 
Vein rishabh
Vein rishabhVein rishabh
Vein rishabh
Rohit Kumar
 
Class PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxClass PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptx
DivyaKumari588020
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
Abhishek Kumar
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignment
s1180051
 

Similar to Applications of Biometrics in Technology (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
14 5 b8
14 5 b814 5 b8
14 5 b8
 
Vein rishabh
Vein rishabhVein rishabh
Vein rishabh
 
Class PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptxClass PPT based on engineering subject cv.pptx
Class PPT based on engineering subject cv.pptx
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Sw2assignment
Sw2assignmentSw2assignment
Sw2assignment
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Applications of Biometrics in Technology

  • 1. Applications of Biometrics in Technology Presented by: Sanjay Khubchandani FY MSc IT 04 NVPAS
  • 2. What is Biometrics?  The word “biometrics” comes form two Greek words – ‘bio’ meaning life and ‘metric’ meaning to measure.  It includes recognition by retina, iris, fingerprints, face, vein geometry, voice patterns, hand measurements, etc which are used to identify human characteristics and to verify identity.
  • 3.  There is a wide range of usage of Biometric in the field of Information Technology..  Some of them are as follows…
  • 4. Retina Scanning  It is a biometric technique that uses the unique patterns formed by blood vessels on a person's retina.  The network of blood vessels in the retina is not entirely genetically determined, as a result even identical twins do not share a similar pattern.  It was known from 1930s that each human eyeball has unique characteristics. This information was later put to use and in 1984 the first retinal scanner was made available for commercial use by a company called EyeDentify.
  • 5.  The retinal scan uses a low-intensity light source and a sensor to scan the pattern of blood vessels at the back of the retina.  As the retinal blood vessels absorb light more readily than the surrounding tissue, the amount of reflection varies and the blood vessels appear darker compared to other tissues.  The pattern of variations is digitized and stored in a database.
  • 6.  ADVANTAGES  Low error rate of 1 in 10,00,000.  Highly Reliable  Easy to use.  DISADVANTAGES  Measurement accuracy can be affected by certain diseases such as cataract, astigmatism, diabetes, etc.  Invasive scanning process.  Not very user friendly  High equipment cost
  • 7. Retina Scanning The controls of a Topocon Retinal Camera.. Scanners can be made handheld and easily portable, like this one being used by the US Army, or wall-mounted for convenience in places like airports.
  • 8. Iris Scanning  Similar to a retina scan, an iris scan also makes use of the uniqueness of your eyes.  In an iris scan, the different patterns in your iris are scanned and stored.  In 1994, US-born mathematician John Daugman develops the algorithms that can turn photographs of irises into unique numeric codes. He is granted US patent #5,291,560 for a "biometric personal identification system based on iris analysis" .
  • 9.  The eyes of a person are digitally photographed with both ordinary light and infrared light(it has a slightly longer wavelength than ordinary red light).  The infrared helps to show the patterns of dark coloured eyes as it is not very clear in ordinary light.  These two digital photographs, are then analyzed by a computer which identifies around 240 unique features.  These features, are turned into a 512-digit number called an Iris Code that is stored in a computer database.
  • 10.  ADVANTAGES  Accuracy and reliability  Patterns of iris remain unchanged for long periods of time.  Hygienic as direct contact with the scanner is not needed.  DISADVANTAGES  High initial cost of equipments.
  • 11. Fingerprint Scanning  When a computer checks your fingerprints, there obviously isn't a little person with a magnifying glass sitting inside, comparing your fingerprints with all the hundreds or thousands stored in the database!  So how can a computer compare prints? During enrolment or verification, each print is analyzed for very specific features called minutiae, where the lines in your fingerprint terminate or split in two.
  • 12.  The computer measures the distances and angles between these features— a bit like drawing lines between them—and then uses an algorithm (mathematical process) to turn this information into a unique numeric code. Comparing fingerprints is then simply a matter of comparing their unique codes. If the codes match, the prints match, and the person gains access.
  • 13. Face Recognition  This project was labeled man-machine because the human extracted the coordinates of a set of features from the photographs, which were then used by the computer for recognition.  Using a graphics tablet (GRAFACON or RAND TABLET), the operator would extract the coordinates of features such as the center of pupils, the inside corner of eyes, the outside corner of eyes, point of widows peak, and so on. From these coordinates, a list of 20 distances, such as width of mouth and width of eyes, pupil to pupil, were computed.
  • 14.  These operators could process about 40 pictures an hour. When building the database, the name of the person in the photograph was associated with the list of computed distances and stored in the computer.  In the recognition phase, the set of distances was compared with the corresponding distance for each photograph, yielding a distance between the photograph and the database record. The closest records are returned.
  • 15. Vein Geometry  As with irises and fingerprints, a person's veins are completely unique. Twins don't have identical veins, and a person's veins differ between their left and right sides.  To use a vein recognition system, you simply place your finger, wrist, palm or the back of your hand on or near the scanner.
  • 16.  A camera takes a digital picture using near-infrared light. The haemoglobin in your blood absorbs the light, so veins appear black in the picture.  As with all the other biometric types, the software creates a reference template based on the shape and location of the vein structure.
  • 17.  All these techniques have a similar way of functioning.  When a retina, iris, fingerprint, etc are scanned for the first time the unique features in the form of data is stored in the database.  Next time when the same person uses the scanner, the computer matches the data already stored in it with the data of the retina, iris or fingerprint, instead of performing the process all over again.
  • 18. Biometrics in India  India's national ID program called Aadhaar is the largest biometric database of the world. It is a digital identity of a person assigned for a lifetime.  It is based on biometric data(fingerprint, iris scan and face photo), along with demographic data (name, age, gender, address, etc.) of a person.