SlideShare a Scribd company logo
 Biometric security is a security, measure unique characteristics of a person,
such as voice pattern, retina pattern of the eye or finger print patterns. This
system automatic and instant verification of an individual's physical
characteristics.
 Traditional methods involving passwords and PIN numbers
 Specific physiological or behavioral characteristics
 Biometrics highest level of security
 Fingerprints
 Voiceprints
 Facial features
 Iris patterns
 Hand geometry
 Data Collection
 Transmission
 Signal Processing
 Data Storage
 Decision
 A live acquisition of a person’s fingerprint.
 Image Acquisition  Image Processing  Template Creation  Template
Matching
 Acquisition Devices:
 Glass plate
 Electronic
 Ultrasound
 Strengths:
 Fingerprints don’t change over time
 Widely believed fingerprints are unique
 Weaknesses:
 Scars
 Attacks:
 Surgery to alter or remove prints
 Finger Decapitation
 Corruption of the database
 Defenses:
 Measure physical properties of a live finger (pulse)
 Based on video Images
 Templates can be based on previously-recorded images
 Technologies:
 Eigen face Approach
 Feature Analysis
 Neural Network
 Strengths:
 Database can be built from driver’s license records, visas, etc.
 Can be applied covertly (surveillance photos).
 Few people object to having their photo taken.
 Weaknesses:
 No real scientific validation
 Attacks:
 Surgery
 Facial Hair
 Hats
 Turning away from the camera
 Defenses:
 Scanning stations with mandated poses
 Scripted vs. non-scripted
 Strengths:
 Most systems have audio hardware
 Works over the telephone
 Can be done covertly
 Lack of negative perception
 Weaknesses:
 Background noise (airplanes)
 No large database of voice samples
 Attacks:
 Tape recordings
 Identical twins / sound-alikes
 Defenses: No defenses
 Image Acquisition  Image Processing  Template Creation  Template
Matching
 Uses to date:
 Physical access control
 Computer authentication
 Strengths:
 300+ characteristics; 200 required for match
 Weaknesses:
 Fear
 Discomfort
 Proprietary acquisition device
 Algorithms may not work on all individuals
 No large databases
 Attacks:
 Surgery
 Defenses: No defenses
 Typical systems measure 90 different features:
 Overall hand and finger width
 Distance between joints
 Bone structure
 Primarily for access control:
 Machine rooms
 Olympics
 Strengths:
 No negative connotations – non-intrusive
 Reasonably robust systems
 Weaknesses:
 Accuracy is limited; can only be used for 1-to-1 verification
 Bulky scanner
 Widely accepted for crime scenes
 Biometric system is not independent as a module for entire computer security
area.
 Some problem in computer security will be solve appropriately for each
person’s identity before they will enter or across to other systems.
 Scientists are still trying improve performance of biometric system with more
enhancement of computer security.
 https://www.google.com.bd/search?biw=1600&bih=789&noj=1&site=webhp
&tbm
 https://www.google.com.bd/url?sa=Fbiometrics-final-
ppt&usg=AFQjCNGnL6eVQY1l8JkEhDrYuqu2dTA5HQ
 https://www.google.com.bd/url?sa=t&rct=j&q=&esrc=s&sourcedefinition%2F
6203%2Fbiometric-security&usg=AFQjCNFvGeCEpkirpZkuzypRwHxl1zmTdQ
Bio metric security

More Related Content

Similar to Bio metric security

L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.pptL10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
rishabhawasthi0365
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
dougfarre
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
Anivar Aravind
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
Deepanshu Saini
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
sakshi_20
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfarestuimrozsm
 
Biometrics (Distributed computing)
Biometrics (Distributed computing)Biometrics (Distributed computing)
Biometrics (Distributed computing)Sri Prasanna
 
Seetu
SeetuSeetu
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
JohnLagman3
 

Similar to Bio metric security (20)

Bio metrics
Bio metricsBio metrics
Bio metrics
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.pptL10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
 
Biometrics (Distributed computing)
Biometrics (Distributed computing)Biometrics (Distributed computing)
Biometrics (Distributed computing)
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Seetu
SeetuSeetu
Seetu
 
Confidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.pptConfidentiality Privacy and Security.ppt
Confidentiality Privacy and Security.ppt
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Bio metric security

  • 1.
  • 2.  Biometric security is a security, measure unique characteristics of a person, such as voice pattern, retina pattern of the eye or finger print patterns. This system automatic and instant verification of an individual's physical characteristics.
  • 3.  Traditional methods involving passwords and PIN numbers  Specific physiological or behavioral characteristics  Biometrics highest level of security
  • 4.  Fingerprints  Voiceprints  Facial features  Iris patterns  Hand geometry
  • 5.  Data Collection  Transmission  Signal Processing  Data Storage  Decision
  • 6.  A live acquisition of a person’s fingerprint.  Image Acquisition  Image Processing  Template Creation  Template Matching  Acquisition Devices:  Glass plate  Electronic  Ultrasound
  • 7.  Strengths:  Fingerprints don’t change over time  Widely believed fingerprints are unique  Weaknesses:  Scars  Attacks:  Surgery to alter or remove prints  Finger Decapitation  Corruption of the database  Defenses:  Measure physical properties of a live finger (pulse)
  • 8.  Based on video Images  Templates can be based on previously-recorded images  Technologies:  Eigen face Approach  Feature Analysis  Neural Network
  • 9.  Strengths:  Database can be built from driver’s license records, visas, etc.  Can be applied covertly (surveillance photos).  Few people object to having their photo taken.  Weaknesses:  No real scientific validation  Attacks:  Surgery  Facial Hair  Hats  Turning away from the camera  Defenses:  Scanning stations with mandated poses
  • 10.  Scripted vs. non-scripted
  • 11.  Strengths:  Most systems have audio hardware  Works over the telephone  Can be done covertly  Lack of negative perception  Weaknesses:  Background noise (airplanes)  No large database of voice samples  Attacks:  Tape recordings  Identical twins / sound-alikes  Defenses: No defenses
  • 12.  Image Acquisition  Image Processing  Template Creation  Template Matching  Uses to date:  Physical access control  Computer authentication
  • 13.  Strengths:  300+ characteristics; 200 required for match  Weaknesses:  Fear  Discomfort  Proprietary acquisition device  Algorithms may not work on all individuals  No large databases  Attacks:  Surgery  Defenses: No defenses
  • 14.  Typical systems measure 90 different features:  Overall hand and finger width  Distance between joints  Bone structure  Primarily for access control:  Machine rooms  Olympics
  • 15.  Strengths:  No negative connotations – non-intrusive  Reasonably robust systems  Weaknesses:  Accuracy is limited; can only be used for 1-to-1 verification  Bulky scanner
  • 16.  Widely accepted for crime scenes
  • 17.  Biometric system is not independent as a module for entire computer security area.  Some problem in computer security will be solve appropriately for each person’s identity before they will enter or across to other systems.  Scientists are still trying improve performance of biometric system with more enhancement of computer security.
  • 18.  https://www.google.com.bd/search?biw=1600&bih=789&noj=1&site=webhp &tbm  https://www.google.com.bd/url?sa=Fbiometrics-final- ppt&usg=AFQjCNGnL6eVQY1l8JkEhDrYuqu2dTA5HQ  https://www.google.com.bd/url?sa=t&rct=j&q=&esrc=s&sourcedefinition%2F 6203%2Fbiometric-security&usg=AFQjCNFvGeCEpkirpZkuzypRwHxl1zmTdQ