To
STUDENT FORUM
2016 - 2017
CONTENT
INTRODUCTION
WHAT IS BIOMETRICS
HISTORY OF BIOMETRICS
TYPE OF BIOMETRIC
METHODOLOGY
.BIOMETRICS WORKING SYSYTEM
 APPLICATION OF BIOMETRIC
 DISADVANTAGES OF BIOMETRICS
 ADVANTAGES OF BIOMETRICS
BIOMETRICS TECHNIQUES
BIOMETRICS IN ACCESS CONTROL SYSTEM
HAND SCAN
VERIFICATION
INTRODUCTION
SSSBiometrics technology makes use of a
person’s physiological or behavioral
characteristics in identification . Every
human being is unique in nature and
possesses physical parts completely
different from any other person.
What is Biometrics ?
 Biometrics is a branch of computer
security centering on Authenticating a
person Identity based on some
physiological or Behavioral Characteristic
The Internet System
 Authentication System Verifies the
Identity of a User
HISTORY OF BIOMETRICS
The
The First known example of biometrics in practice was a
form of finger printing being used in china in the 14th century.
TYPE OF BIOMETRICS
Mouse Motion
Keystroke
Scroll
Click
Four different biometric traits were collected by pace
university’s existing frontend system and backend classifier
Biometrics system work by recording and
comparing Biometric characteristics.
Biometric devices consist of a reader or scanning
device software that converts the gathered information
into digital form and a database that stores the
biometric data.
Different Type of biometrics techniques
 Identification and verification :
 Verification only :
• Fingerprint Scan
• Face recognition (Facial scan)
• Retina scan
• Iris scan
• Hand Geometry
• Keystroke Dynamics
• Mouse Dynamics
• Voice print
• Signature
BIOMETRIC IN ACCESS CONTROL SYSTEM
Benefits of fingerprint Access Control System ?
Electronic Card replacement for lost ID cards. Key publication.
1.Reduce Cost.
2.Ellminates Identity fraudulence in unauthorized access
3.Fingerprints ID is convenient, simple
 Security
 Authentication
 E-Commerce & E-governments
 Secure Banking & Financial Transaction
 Digital Right Management
 Healthcare Application
 Crime Investigation
 Social Services
 It provides higher security Iris recognition.
 Biometrics are generally used for authentication.
 Voice Recognition works well over the telephone
 User friendly Hand geometry reorganization,
Finger print recognition.
 Iris scanning is incompatible with the substantial investment .
 Iris recognition is very difficult to perform at a larger
distance .
 Iris recognition is susceptible to poor image quality , with
associated failure to enroll rates .
There are five stages involved in finger scan verification and identification
 Image Acquisition
 Location of distinctive Characteristics
 Image Processing
 Template creation
 Template Matching
 Hand scan, also know as hand geometry, is a biometric authentication
technology .
 The system maps key features of the topology of a person’s hand ,
Measuring all the creases on the palm .
 This is more expensive and considered less accurate
than other biometrics .
Verification :-
Comparing a sample against a single stored template is called verification
INPUT STORE
TEMPLATE
 While Biometric authentication can offer a high degree of
security, they are far from perfect solution.
 The influences of biometric technology on society and
risks to privacy and threat to identify will require meditation
through legislation .
( ITC Department)
Sultanpur
UNDERSUPERVISION:-
MR.BASANT SIR
PRESENTED BY:-
Reg. No. Name:-
( 39122 ) MUDASSIR KHAN
( 34091 ) SANTOSH KUMAR

Biometric of technology.ppt

  • 1.
  • 2.
    CONTENT INTRODUCTION WHAT IS BIOMETRICS HISTORYOF BIOMETRICS TYPE OF BIOMETRIC METHODOLOGY .BIOMETRICS WORKING SYSYTEM  APPLICATION OF BIOMETRIC  DISADVANTAGES OF BIOMETRICS  ADVANTAGES OF BIOMETRICS BIOMETRICS TECHNIQUES BIOMETRICS IN ACCESS CONTROL SYSTEM HAND SCAN VERIFICATION
  • 3.
    INTRODUCTION SSSBiometrics technology makesuse of a person’s physiological or behavioral characteristics in identification . Every human being is unique in nature and possesses physical parts completely different from any other person.
  • 4.
    What is Biometrics?  Biometrics is a branch of computer security centering on Authenticating a person Identity based on some physiological or Behavioral Characteristic The Internet System  Authentication System Verifies the Identity of a User
  • 5.
    HISTORY OF BIOMETRICS The TheFirst known example of biometrics in practice was a form of finger printing being used in china in the 14th century.
  • 6.
  • 7.
    Mouse Motion Keystroke Scroll Click Four differentbiometric traits were collected by pace university’s existing frontend system and backend classifier
  • 8.
    Biometrics system workby recording and comparing Biometric characteristics. Biometric devices consist of a reader or scanning device software that converts the gathered information into digital form and a database that stores the biometric data.
  • 9.
    Different Type ofbiometrics techniques  Identification and verification :  Verification only : • Fingerprint Scan • Face recognition (Facial scan) • Retina scan • Iris scan • Hand Geometry • Keystroke Dynamics • Mouse Dynamics • Voice print • Signature
  • 10.
    BIOMETRIC IN ACCESSCONTROL SYSTEM Benefits of fingerprint Access Control System ? Electronic Card replacement for lost ID cards. Key publication. 1.Reduce Cost. 2.Ellminates Identity fraudulence in unauthorized access 3.Fingerprints ID is convenient, simple
  • 11.
     Security  Authentication E-Commerce & E-governments  Secure Banking & Financial Transaction  Digital Right Management  Healthcare Application  Crime Investigation  Social Services
  • 12.
     It provideshigher security Iris recognition.  Biometrics are generally used for authentication.  Voice Recognition works well over the telephone  User friendly Hand geometry reorganization, Finger print recognition.
  • 13.
     Iris scanningis incompatible with the substantial investment .  Iris recognition is very difficult to perform at a larger distance .  Iris recognition is susceptible to poor image quality , with associated failure to enroll rates .
  • 14.
    There are fivestages involved in finger scan verification and identification  Image Acquisition  Location of distinctive Characteristics  Image Processing  Template creation  Template Matching
  • 15.
     Hand scan,also know as hand geometry, is a biometric authentication technology .  The system maps key features of the topology of a person’s hand , Measuring all the creases on the palm .  This is more expensive and considered less accurate than other biometrics .
  • 16.
    Verification :- Comparing asample against a single stored template is called verification INPUT STORE TEMPLATE
  • 17.
     While Biometricauthentication can offer a high degree of security, they are far from perfect solution.  The influences of biometric technology on society and risks to privacy and threat to identify will require meditation through legislation .
  • 20.
    ( ITC Department) Sultanpur UNDERSUPERVISION:- MR.BASANTSIR PRESENTED BY:- Reg. No. Name:- ( 39122 ) MUDASSIR KHAN ( 34091 ) SANTOSH KUMAR