SlideShare a Scribd company logo
TOPIC
ON:-
CONTENTS
 INTRODUCTION
 WHAT IS BIOMETRICS?
 TYPE OF BIOMETRIC
 HOW BIOMETRICS SYSTEMS WORK
 RESEARCH METHODOLOGY
 BIOMETRICS AND ACCESS CONTROL
 BIOMETRICS AND PRIVACY
 ADVANTAGES OF BIOMETRIC
 DISADVANTAGES OF BIOMETRICS
 FINGERPRINTING BIOMETRIC
 HAND-SCAN
 VERIFICATION
INTRODUCTION
Biometric technology makes use of a person's
physiological or behavioral characteristics in
identification. Every human being is unique in
nature and possesses physical parts
completely different from any other person.
WHAT IS BIOMETRICS?
"Biometrics refers to the automatic
identifications of a person based on his or
her physiological or behavioral
characteristics" (Chirillo and Blaul 2003). It
is an authorization method that verifies or
identifies a user based on what they are
before authorizing access.
TYPE OF BIOMETRIC
BIOMETRI
C
TYPES
FINGERP
RINTING
EAR PRINT
IRIS SCAN
HAND
GEOMETRY
HOW BIOMETRICS SYSTEMS WORK
"A biometric system is essentially a pattern-
recognition system that makes a personal
identification by determining the authenticity of a
specific physiological .
Biometrics has so far been developed to work in
two ways mainly verification and identification.
RESEARCH METHODOLOGY
The research methodology designed for
this dissertation is mainly the qualitative
approach. A quantitative approach has
been overlooked due to limited time as
designing surveys.
BIOMETRICS AND ACCESS CONTROL
 Over the years, biometrics has evolved rapidly and many
vertical markets such as governments, transport, financial
sectors, security, public justice and safety, healthcare and many
more have adopted biometrics.
 Biometrics has been of high benefit to organization as they seek
a reliable security method to safeguard assets. Fully
understanding how biometrics work, it can be said that the
ultimate aim of applying .
WHAT ARE BIOMETRIC STANDARDS
 The growth of the biometric industry has been relatively slowed
by the absence of industry wide standards and this has also
impeded various types of biometric deployment.
 However in an effort to actively address the standards issue, the
biometric industry has finalized some blueprints and the process
of getting industries to accept these standards is ongoing
BIOMETRICS AND PRIVACY
The fact that biometric technologies are
based on measuring physiological or
behavioral and archiving these data has
raised concerns on privacy risks, and also
raised discussion on the role biometrics
play when it comes to privacy.
ADVANTAGES OF BIOMETRIC
 Password and PINs have been the most frequently used
authentication method. Their use involves controlling access to
a building or a room, securing access to computers, network,
the applications on the personal computers and many more.
Due to some problems related to these methods, the suitability
and reliability of these authentication technologies have been
questioned especially in this modern
DISADVANTAGES OF BIOMETRICS
 Biometric technologies can either be physiological or behavioral.
Physical biometrics includes fingerprint, facial recognition, hand
geometry, iris scan, and retina scan. Voice recognition,
signature and keystroke are all examples of behavioral
biometrics. The commonly used biometrics are briefly described
below.
FINGERPRINTING BIOMETRIC
 Fingerprints have been used by humans for personal
identification and access control for centuries. The matching
accuracy using the biometric type has shown very high figure.
Fingerprints of even identical twins are different and so are the
prints on each finger of the same person which increases the
rate of accuracy.
HAND-SCAN
 Hand -scan is one of the most established biometric
technologies. It has been in use for years in several applications
especially for verification of individuals.
 Although hand-scan geometry biometrics is still a technology
that is growing slowly, biometric market.
VERIFICATION
 Verification:-
Comparing a sample against a single stored
template is called verification.
INPUT
STORD
TEMPLATE
CONCLUSION
Technology is growing rapidly, but at
the same time security braches and
transactions frauds are also in the
increase world over.
All agencies including libraries who
are in need of security and safety
have to adopt biometric.
ANY QUERIES
PERSENTEDBY :-
SANTOSH KUMAR
REG NO.(34091)
MD. MUDASSIR KHAN
REG NO.(39122)

More Related Content

What's hot

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
Raga Deepthi
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
SajidHussain340
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
Tejasvi Bhatia
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
Abduhalim Beknazarov
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
Arhind Gautam
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
University Of Education Lahore D.G Khan Campus
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
Ritesh Kumar Bhanu
 
Seminar
SeminarSeminar
Seminar
Nidhi Nayan
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
Jorge Sebastiao
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometric
 Biometric Biometric
Biometric
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Seminar
SeminarSeminar
Seminar
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 

Similar to Biomatric technology

What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
Enterprise Wired
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
Lanate Drummond
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
Bahaa Abdulhadi
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
SundusKhan42
 
Ai
AiAi
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
nagasukanya1
 
Biometric System
Biometric SystemBiometric System
Biometric System
Imtiaz Siddique
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
GQ Research
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
TusharKataria22
 
Biometrics
BiometricsBiometrics
Biometrics
biometrics12
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
Bahaa Abdulhadi
 
Behavioral biometrics (1)
Behavioral biometrics (1)Behavioral biometrics (1)
Behavioral biometrics (1)
nishiyath
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
Waseelsultan
 

Similar to Biomatric technology (20)

What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Ai
AiAi
Ai
 
Biometrics
Biometrics Biometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
 
Biometric System
Biometric SystemBiometric System
Biometric System
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
 
Behavioral biometrics (1)
Behavioral biometrics (1)Behavioral biometrics (1)
Behavioral biometrics (1)
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 

Recently uploaded

Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
Falcon Invoice Discounting
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
FinTech Belgium
 
Latino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino CaucusLatino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino Caucus
Danay Escanaverino
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
va2132004
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
GunjanSharma28848
 
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
betoozp
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Henry Tapper
 
Monthly Economic Monitoring of Ukraine No. 232, May 2024
Monthly Economic Monitoring of Ukraine No. 232, May 2024Monthly Economic Monitoring of Ukraine No. 232, May 2024
The new type of smart, sustainable entrepreneurship and the next day | Europe...
The new type of smart, sustainable entrepreneurship and the next day | Europe...The new type of smart, sustainable entrepreneurship and the next day | Europe...
The new type of smart, sustainable entrepreneurship and the next day | Europe...
Antonis Zairis
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
Proposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in EthereumProposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in Ethereum
RasoulRamezanian1
 
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad, Mandi Bah...
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad,  Mandi Bah...NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad,  Mandi Bah...
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad, Mandi Bah...
Amil Baba Dawood bangali
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
DOT TECH
 
how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.
DOT TECH
 
what is a pi whale and how to access one.
what is a pi whale and how to access one.what is a pi whale and how to access one.
what is a pi whale and how to access one.
DOT TECH
 

Recently uploaded (20)

Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
Latino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino CaucusLatino Buying Power - May 2024 Presentation for Latino Caucus
Latino Buying Power - May 2024 Presentation for Latino Caucus
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
 
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
一比一原版Birmingham毕业证伯明翰大学|学院毕业证成绩单如何办理
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
 
Monthly Economic Monitoring of Ukraine No. 232, May 2024
Monthly Economic Monitoring of Ukraine No. 232, May 2024Monthly Economic Monitoring of Ukraine No. 232, May 2024
Monthly Economic Monitoring of Ukraine No. 232, May 2024
 
The new type of smart, sustainable entrepreneurship and the next day | Europe...
The new type of smart, sustainable entrepreneurship and the next day | Europe...The new type of smart, sustainable entrepreneurship and the next day | Europe...
The new type of smart, sustainable entrepreneurship and the next day | Europe...
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
Proposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in EthereumProposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in Ethereum
 
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad, Mandi Bah...
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad,  Mandi Bah...NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad,  Mandi Bah...
NO1 Uk Black Magic Specialist Expert In Sahiwal, Okara, Hafizabad, Mandi Bah...
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.
 
what is a pi whale and how to access one.
what is a pi whale and how to access one.what is a pi whale and how to access one.
what is a pi whale and how to access one.
 

Biomatric technology

  • 2. CONTENTS  INTRODUCTION  WHAT IS BIOMETRICS?  TYPE OF BIOMETRIC  HOW BIOMETRICS SYSTEMS WORK  RESEARCH METHODOLOGY  BIOMETRICS AND ACCESS CONTROL  BIOMETRICS AND PRIVACY  ADVANTAGES OF BIOMETRIC  DISADVANTAGES OF BIOMETRICS  FINGERPRINTING BIOMETRIC  HAND-SCAN  VERIFICATION
  • 3. INTRODUCTION Biometric technology makes use of a person's physiological or behavioral characteristics in identification. Every human being is unique in nature and possesses physical parts completely different from any other person.
  • 4. WHAT IS BIOMETRICS? "Biometrics refers to the automatic identifications of a person based on his or her physiological or behavioral characteristics" (Chirillo and Blaul 2003). It is an authorization method that verifies or identifies a user based on what they are before authorizing access.
  • 6. HOW BIOMETRICS SYSTEMS WORK "A biometric system is essentially a pattern- recognition system that makes a personal identification by determining the authenticity of a specific physiological . Biometrics has so far been developed to work in two ways mainly verification and identification.
  • 7. RESEARCH METHODOLOGY The research methodology designed for this dissertation is mainly the qualitative approach. A quantitative approach has been overlooked due to limited time as designing surveys.
  • 8. BIOMETRICS AND ACCESS CONTROL  Over the years, biometrics has evolved rapidly and many vertical markets such as governments, transport, financial sectors, security, public justice and safety, healthcare and many more have adopted biometrics.  Biometrics has been of high benefit to organization as they seek a reliable security method to safeguard assets. Fully understanding how biometrics work, it can be said that the ultimate aim of applying .
  • 9. WHAT ARE BIOMETRIC STANDARDS  The growth of the biometric industry has been relatively slowed by the absence of industry wide standards and this has also impeded various types of biometric deployment.  However in an effort to actively address the standards issue, the biometric industry has finalized some blueprints and the process of getting industries to accept these standards is ongoing
  • 10. BIOMETRICS AND PRIVACY The fact that biometric technologies are based on measuring physiological or behavioral and archiving these data has raised concerns on privacy risks, and also raised discussion on the role biometrics play when it comes to privacy.
  • 11. ADVANTAGES OF BIOMETRIC  Password and PINs have been the most frequently used authentication method. Their use involves controlling access to a building or a room, securing access to computers, network, the applications on the personal computers and many more. Due to some problems related to these methods, the suitability and reliability of these authentication technologies have been questioned especially in this modern
  • 12. DISADVANTAGES OF BIOMETRICS  Biometric technologies can either be physiological or behavioral. Physical biometrics includes fingerprint, facial recognition, hand geometry, iris scan, and retina scan. Voice recognition, signature and keystroke are all examples of behavioral biometrics. The commonly used biometrics are briefly described below.
  • 13. FINGERPRINTING BIOMETRIC  Fingerprints have been used by humans for personal identification and access control for centuries. The matching accuracy using the biometric type has shown very high figure. Fingerprints of even identical twins are different and so are the prints on each finger of the same person which increases the rate of accuracy.
  • 14. HAND-SCAN  Hand -scan is one of the most established biometric technologies. It has been in use for years in several applications especially for verification of individuals.  Although hand-scan geometry biometrics is still a technology that is growing slowly, biometric market.
  • 15. VERIFICATION  Verification:- Comparing a sample against a single stored template is called verification. INPUT STORD TEMPLATE
  • 16. CONCLUSION Technology is growing rapidly, but at the same time security braches and transactions frauds are also in the increase world over. All agencies including libraries who are in need of security and safety have to adopt biometric.
  • 17.
  • 19. PERSENTEDBY :- SANTOSH KUMAR REG NO.(34091) MD. MUDASSIR KHAN REG NO.(39122)