SlideShare a Scribd company logo
A Presentation on Biometric
Technology
1
Presentation outlines
 Introduction
 Physiological
finger recognition
Facial recognition
Hand Geometry
Iris recognition
 Behavirol Biometrics
Speaker/voice recognition
Signature
 Applications
 Need of biometric(frauds in industry)
 Advantages and disadvantages
 Conclusion
2
Introduction
The term “biometric” is derived from the Greek words bio (life)
and metric(to measure).
For our use biometrics refers to technologies for measuring and
analysing person's physiological or behavioural characteristics
These characteristics are unique to individuals hence can be used
to verify or identify a person.
3
4
Finger Recognition
 A fingerprint sensor is an electronic
device used to capture a digital image of
the fingerprint pattern.
 The captured image is called a live
scan. This live scan is digitally processed
to create a biometric template (a
collection of extracted features) which is
stored and used for matching.
 This is an overview of some of the more
commonly used fingerprint sensor
technologies.
5
Facial Recognition
 Capture image
 Find face in image
 Extract features
(store template)
 Compare templates
 Declare matches
6
Hand or finger geometry is an automated
measurement of many dimensions of the hand and
fingers.
Hand Geometry
7
Iris Recognition
Iris scanning measures the iris
pattern in the colored part of the
eye,
8
Speaker / Voice Recognition
Voice or speaker recognition uses vocal
characteristics to identify individuals using a pass-
phrase.
 A telephone or microphone can serve as a sensor,
9
Signature Verification
An automated method of measuring an individual’s
signature.
This technology examines speed,direction, and
pressure of writing; the time that the stylus is in and out
of contact with the “paper’’.
10
Prevent unauthorized access to ATMs, Cellular phones
Desktop PCs
Criminal identification
In automobiles biometrics can replace keys with keyless
entry devices
 Airport security
Applications
11
Advantages and Disadvantages
12
Conclusion
Biometric is an emerging area with many
opportunities for growth.
Possibly in the near future, you will not have
to remember PINs and passwords and keys in
your bags or pockets will be things of the past.
13
Reference
www.wikipedia.com
 www.askme.com
14
15

More Related Content

What's hot

Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
Sadan Khan
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
Amit Pandey
 
Biometrics
BiometricsBiometrics
Biometrics
Adothu Ram Babu
 
Biometrics
BiometricsBiometrics
Biometrics
Divya Shah
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
Roshen Berenger
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
Sheel Shah
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
parmsidhu
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Akhil Kumar Pappula
 
Biometric authenticatiion technology
Biometric authenticatiion technologyBiometric authenticatiion technology
Biometric authenticatiion technology
NazeerKhan39
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
SajidHussain340
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
Ausaf khan
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
Abhishek Kumar
 
Biometrics
BiometricsBiometrics
Biometrics
Rajan Kumar
 

What's hot (20)

Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric authenticatiion technology
Biometric authenticatiion technologyBiometric authenticatiion technology
Biometric authenticatiion technology
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Biometrics
BiometricsBiometrics
Biometrics
 

Similar to Biometric

Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
Kalyanam Kiran
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
Srishti Sabharwal
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
sakshi_20
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
desire120
 
Bio shiv
Bio shivBio shiv
Bio shiv
Shivank Garg
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
Chill Chaithanya
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
mounika117
 
Biometrics
BiometricsBiometrics
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
 

Similar to Biometric (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

Biometric

  • 1. A Presentation on Biometric Technology 1
  • 2. Presentation outlines  Introduction  Physiological finger recognition Facial recognition Hand Geometry Iris recognition  Behavirol Biometrics Speaker/voice recognition Signature  Applications  Need of biometric(frauds in industry)  Advantages and disadvantages  Conclusion 2
  • 3. Introduction The term “biometric” is derived from the Greek words bio (life) and metric(to measure). For our use biometrics refers to technologies for measuring and analysing person's physiological or behavioural characteristics These characteristics are unique to individuals hence can be used to verify or identify a person. 3
  • 4. 4
  • 5. Finger Recognition  A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.  The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching.  This is an overview of some of the more commonly used fingerprint sensor technologies. 5
  • 6. Facial Recognition  Capture image  Find face in image  Extract features (store template)  Compare templates  Declare matches 6
  • 7. Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers. Hand Geometry 7
  • 8. Iris Recognition Iris scanning measures the iris pattern in the colored part of the eye, 8
  • 9. Speaker / Voice Recognition Voice or speaker recognition uses vocal characteristics to identify individuals using a pass- phrase.  A telephone or microphone can serve as a sensor, 9
  • 10. Signature Verification An automated method of measuring an individual’s signature. This technology examines speed,direction, and pressure of writing; the time that the stylus is in and out of contact with the “paper’’. 10
  • 11. Prevent unauthorized access to ATMs, Cellular phones Desktop PCs Criminal identification In automobiles biometrics can replace keys with keyless entry devices  Airport security Applications 11
  • 13. Conclusion Biometric is an emerging area with many opportunities for growth. Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past. 13
  • 15. 15