SlideShare a Scribd company logo
1 of 28
Presented By:
SAGAR DEOKATE
KIRAN WANGIKAR
CONTENTS

Biometrics Overview
Need of Biometrics
Working Principal
Physical Modes
Behavioral Modes
Applications
Benefits
Concern
Conclusion
Biometrics Overview

Definition:
  Automated methods of identifying or verifying the identity of a
   person based on a physiological or behavioral characteristic
  Better than traditional method.

    Physical:
      Fingerprint
      Facial Recognition
      Hand Geometry
      Iris Scan
      Retinal Scan
      DNA

    Behavioral:
      Speaker Recognition
      Signature Recognition
NEED

Traditional methods have some flaws
To secure access to building, computer system,
 laptop, phone, ATM, bank account, & many more.
For security & reduce financial fraud.
To prevent fraudulent acts like faking ID badges or
 licenses.
Types of biometric:
   1. single model biometric system.
   2. multi model biometric system.
WORKING PRINCIPAL

1.Enrollment
   Adding biometric information to data file.
2.Input Device
   Sensors, cameras etc
3. Comparison with the database.
4. Decision
WORKING
Biometrics Overview

Ways to recognize a person:
 Verification
     Matching against a single record.
     It is 1:1 matching
 Identification
     Matching against all record in the database.
     It is 1:N matching.
Error and Accuracy

2 types of errors:
False rejection: When an actual client gets identified as
 imposter.
False acceptance: When an actual imposter gets identified as
 client.
Accuracy:
FRR =number of false rejections/number of client accesses
FAR = number of false acceptance/number of client accesses
TER=(no of FA+no of FR)/total no accesses.
PHYSICAL MODES


o   Fingerprint
o   Facial Recognition
o   Hand Geometry
o   Iris Scan
o   Retinal Scan
o   DNA
Fingerprint

Typical System: fingerprint scanner maps the
 series of whorls, ridges, furrows and minutiae on
 the surface of the finger
Optical sensor and Solid State sensor are used.
Fingerprint structure
FACIAL RECOGNITION

Typical system: digital video camera input of a
  person’s face images- measures facial structure;
  compares against database
2 Methods:
Face geometry
Facial thermograph: uses infrared heat scans to identify
  facial characteristics.
HAND GEOMETRY

Analyses and computes features like length and
 width of finger, ratio of palm or fingers, width and
 thickness of the palm.
Basic procedure involves taking images of top and
 side views of hand using camera.
Iris Recognition

Iris analysis
Typical system: scanner analyzes features like rings,
 furrows, and freckles existing in the colored tissue
 surrounding the pupil.
Sophisticated camera uses infrared imager to
 capture high resolution photograph.
Advantage:
o     Iris is well protected area of eye with minimum possibility of
    injury.
Retina Scanning

Analysis of layer of blood vessels at the back of the
 eye
Typical system: low-intensity infrared light source
 and an optical coupler to scan a unique vascular
 pattern of retina and its reflection is recorded.
Most accurate and reliable method.
DNA (Deoxyribonucleic acid)

A DNA sample is used to produce either a DNA
 fingerprint or a DNA profile
Comparison of alleles of DNA sequences found in
 nuclear genetic material.
Used in medical field and forensic investigation
 purpose.
BEHAVIORAL MODE


 Speaker Recognition
 Signature Recognition
Speaker Recognition

Voice recognition and analysis
Typical system: uses the pitch, pattern, tone,
  frequency, rhythm of speech for identification
  purposes; only biometric that allows users to
  authenticate remotely.
3 types:
Fixed text method
Text dependent method
Text independent method
Signature Recognition

 Handwriting analysis
 Typical System: user will sign on a tablet, the device will
  record pressure, speed, sequence and shape of characters
  and compare to a database.
 Verification is based on features like no. of interior
  contours and no. of vertical slope components.
 Rarely used method.
Comparison Chart Accuracy/Reliability

Biometric                       Accuracy Reliability                 Errors
Fingerprint                     Very High        High                Dirt, dryness
Facial Recognition              High             Medium              Hair, glasses, age
Hand Geometry                   High             Medium              Hand injury
Iris Scan                       Very High        High                Poor lighting
Retinal Scan                    Very High        High                Glasses
DNA                             Very High        High                none
Speaker Recognition             Medium           Low                 Noise, colds
Signature Recognition           Medium           Low                 Changing signatures


Accuracy: How well can the specific biometric is able to tell individual apart
Reliability: how dependable the specific biometric is for recognition purposes
APPLICATIONS

BIOMETRIC TECH               APPLICATIONS

FINGERPRINTS             Law enforcement, entry devices for offices
                         and colleges, enterprise security; medical
                         and financial
FACIAL RECOGNITION       Automated bank tellers- user verification
                         purposes

HAND GEOMETRY            Time and attendance systems, physical
                         access

IRIS SCAN                Law Enforcement, Employee Security
                         Check, banking
RETINA SCAN         High-end security, military, power plans


DNA                 Medical applications, Paternity Tests,
                    Criminal identification and forensics




VOICE RECOGNITION   Call Centers, Law enforcement – house
                    arrest authentication



SIGNATURE           Access to documents, Banking services
What Biometrics are Replacing

Traditional verification methods:
Passwords
    PIN numbers
Tokens
    Photo ID cards
    Smart cards
    Magnetic strip cards
    Physical keys
Current Biometric Applications

 Computer logins
 ATMs
 Grocery stores
 Airport kiosks
 Driver’s licenses
 Internet banking
 National ID cards
 Welfare disbursement
 International border crossing
 Forensics – criminal identification
 Annual amusement park pass holders
 Speaker verification for television home shopping
BENEFITS

Increased security measures
Reduce costs of password and ID card maintenance
Ability to track employees and link activities
No passwords to forget
Elimination of problems such as lost/stolen
 identification cards and PIN numbers
Faster login time
Improved security of sensitive information
CONCERNS

Sensitive biometric information susceptible to
 hackers.
Lack of privacy for employees.
Costly and time consuming to implement .
CONCLUSION

Multi biometric systems have a huge potential of
 growth.
Access procedures are made simpler, faster and
 more secure.
 Especially governments, law enforcement agencies,
 military and industrial companies, already make
 partial use of this technology.
In the future biometric devices will surely become
 more involved in many civil areas.
THANK YOU!

More Related Content

What's hot

Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsRmcauley
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprintingpgrr
 
Video Spectral Comparator
Video Spectral ComparatorVideo Spectral Comparator
Video Spectral ComparatorPalash Mehar
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
 
Latent fingerprint development
Latent fingerprint developmentLatent fingerprint development
Latent fingerprint developmentTejasvi Bhatia
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
voice recognition
voice recognition voice recognition
voice recognition Hemant Jain
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition Usman Siddique
 
Comparative study of security features of passports of different countries
Comparative study of security features of passports of different countriesComparative study of security features of passports of different countries
Comparative study of security features of passports of different countriesAkashlina Basu
 

What's hot (20)

Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification Systems
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Video Spectral Comparator
Video Spectral ComparatorVideo Spectral Comparator
Video Spectral Comparator
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
Biometrics
BiometricsBiometrics
Biometrics
 
Latent fingerprint development
Latent fingerprint developmentLatent fingerprint development
Latent fingerprint development
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
ESDA
ESDAESDA
ESDA
 
voice recognition
voice recognition voice recognition
voice recognition
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Comparative study of security features of passports of different countries
Comparative study of security features of passports of different countriesComparative study of security features of passports of different countries
Comparative study of security features of passports of different countries
 
Biometrics
BiometricsBiometrics
Biometrics
 

Viewers also liked

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved barPratish Sardar
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hackingNeel Parikh
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniquesjackofhearty1
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowFaithCWorth
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 
Superior Airport Security screening
Superior Airport Security screening Superior Airport Security screening
Superior Airport Security screening oldwicksy
 
Powerpoint with sound
Powerpoint with soundPowerpoint with sound
Powerpoint with soundBenDiCesare
 
Week 3 Sound and Vision Criticisms Pt1
Week 3 Sound and Vision  Criticisms Pt1Week 3 Sound and Vision  Criticisms Pt1
Week 3 Sound and Vision Criticisms Pt11drbuggles
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringM2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-defQafis
 

Viewers also liked (20)

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Pure-bending of curved bar
Pure-bending of curved barPure-bending of curved bar
Pure-bending of curved bar
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Security & Biometrics LATAM Report
Security & Biometrics LATAM ReportSecurity & Biometrics LATAM Report
Security & Biometrics LATAM Report
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hacking
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Superior Airport Security screening
Superior Airport Security screening Superior Airport Security screening
Superior Airport Security screening
 
Powerpoint with sound
Powerpoint with soundPowerpoint with sound
Powerpoint with sound
 
Week 3 Sound and Vision Criticisms Pt1
Week 3 Sound and Vision  Criticisms Pt1Week 3 Sound and Vision  Criticisms Pt1
Week 3 Sound and Vision Criticisms Pt1
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Biometric
Biometric Biometric
Biometric
 
Slideshare fintech-may26th-def
Slideshare fintech-may26th-defSlideshare fintech-may26th-def
Slideshare fintech-may26th-def
 

Similar to Biometric

Similar to Biometric (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Seetu
SeetuSeetu
Seetu
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics in banking lara and becky
Biometrics in banking lara and beckyBiometrics in banking lara and becky
Biometrics in banking lara and becky
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Biometric

  • 2. CONTENTS Biometrics Overview Need of Biometrics Working Principal Physical Modes Behavioral Modes Applications Benefits Concern Conclusion
  • 3. Biometrics Overview Definition:  Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic  Better than traditional method.  Physical:  Fingerprint  Facial Recognition  Hand Geometry  Iris Scan  Retinal Scan  DNA  Behavioral:  Speaker Recognition  Signature Recognition
  • 4. NEED Traditional methods have some flaws To secure access to building, computer system, laptop, phone, ATM, bank account, & many more. For security & reduce financial fraud. To prevent fraudulent acts like faking ID badges or licenses. Types of biometric: 1. single model biometric system. 2. multi model biometric system.
  • 5. WORKING PRINCIPAL 1.Enrollment  Adding biometric information to data file. 2.Input Device  Sensors, cameras etc 3. Comparison with the database. 4. Decision
  • 7. Biometrics Overview Ways to recognize a person: Verification  Matching against a single record.  It is 1:1 matching Identification  Matching against all record in the database.  It is 1:N matching.
  • 8. Error and Accuracy 2 types of errors: False rejection: When an actual client gets identified as imposter. False acceptance: When an actual imposter gets identified as client. Accuracy: FRR =number of false rejections/number of client accesses FAR = number of false acceptance/number of client accesses TER=(no of FA+no of FR)/total no accesses.
  • 9. PHYSICAL MODES o Fingerprint o Facial Recognition o Hand Geometry o Iris Scan o Retinal Scan o DNA
  • 10. Fingerprint Typical System: fingerprint scanner maps the series of whorls, ridges, furrows and minutiae on the surface of the finger Optical sensor and Solid State sensor are used.
  • 12. FACIAL RECOGNITION Typical system: digital video camera input of a person’s face images- measures facial structure; compares against database 2 Methods: Face geometry Facial thermograph: uses infrared heat scans to identify facial characteristics.
  • 13. HAND GEOMETRY Analyses and computes features like length and width of finger, ratio of palm or fingers, width and thickness of the palm. Basic procedure involves taking images of top and side views of hand using camera.
  • 14. Iris Recognition Iris analysis Typical system: scanner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil. Sophisticated camera uses infrared imager to capture high resolution photograph. Advantage: o Iris is well protected area of eye with minimum possibility of injury.
  • 15. Retina Scanning Analysis of layer of blood vessels at the back of the eye Typical system: low-intensity infrared light source and an optical coupler to scan a unique vascular pattern of retina and its reflection is recorded. Most accurate and reliable method.
  • 16. DNA (Deoxyribonucleic acid) A DNA sample is used to produce either a DNA fingerprint or a DNA profile Comparison of alleles of DNA sequences found in nuclear genetic material. Used in medical field and forensic investigation purpose.
  • 17. BEHAVIORAL MODE  Speaker Recognition  Signature Recognition
  • 18. Speaker Recognition Voice recognition and analysis Typical system: uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes; only biometric that allows users to authenticate remotely. 3 types: Fixed text method Text dependent method Text independent method
  • 19. Signature Recognition  Handwriting analysis  Typical System: user will sign on a tablet, the device will record pressure, speed, sequence and shape of characters and compare to a database.  Verification is based on features like no. of interior contours and no. of vertical slope components.  Rarely used method.
  • 20. Comparison Chart Accuracy/Reliability Biometric Accuracy Reliability Errors Fingerprint Very High High Dirt, dryness Facial Recognition High Medium Hair, glasses, age Hand Geometry High Medium Hand injury Iris Scan Very High High Poor lighting Retinal Scan Very High High Glasses DNA Very High High none Speaker Recognition Medium Low Noise, colds Signature Recognition Medium Low Changing signatures Accuracy: How well can the specific biometric is able to tell individual apart Reliability: how dependable the specific biometric is for recognition purposes
  • 21. APPLICATIONS BIOMETRIC TECH APPLICATIONS FINGERPRINTS Law enforcement, entry devices for offices and colleges, enterprise security; medical and financial FACIAL RECOGNITION Automated bank tellers- user verification purposes HAND GEOMETRY Time and attendance systems, physical access IRIS SCAN Law Enforcement, Employee Security Check, banking
  • 22. RETINA SCAN High-end security, military, power plans DNA Medical applications, Paternity Tests, Criminal identification and forensics VOICE RECOGNITION Call Centers, Law enforcement – house arrest authentication SIGNATURE Access to documents, Banking services
  • 23. What Biometrics are Replacing Traditional verification methods: Passwords  PIN numbers Tokens  Photo ID cards  Smart cards  Magnetic strip cards  Physical keys
  • 24. Current Biometric Applications  Computer logins  ATMs  Grocery stores  Airport kiosks  Driver’s licenses  Internet banking  National ID cards  Welfare disbursement  International border crossing  Forensics – criminal identification  Annual amusement park pass holders  Speaker verification for television home shopping
  • 25. BENEFITS Increased security measures Reduce costs of password and ID card maintenance Ability to track employees and link activities No passwords to forget Elimination of problems such as lost/stolen identification cards and PIN numbers Faster login time Improved security of sensitive information
  • 26. CONCERNS Sensitive biometric information susceptible to hackers. Lack of privacy for employees. Costly and time consuming to implement .
  • 27. CONCLUSION Multi biometric systems have a huge potential of growth. Access procedures are made simpler, faster and more secure.  Especially governments, law enforcement agencies, military and industrial companies, already make partial use of this technology. In the future biometric devices will surely become more involved in many civil areas.

Editor's Notes

  1. Behavioral: traits that are learned or acquired
  2. Only Biometrics can verify you as YOU. Tokens – can be lost, stolen, duplicated (some), forgotten. Passwords – can be forgotten, shared, observed, broken.
  3. Link to biometrics used in military: http://www.biometrics.dod.mil/References/BiometricUseCases.aspx