SlideShare a Scribd company logo
BIOMETRIC TECHNOLOGY
Objectives
1) What is a Biometric ?
2) Various Types of Biometric
3) History of Biometric
4) Working & Authentication process
5) Advantages and Disadvantages
6) Applications
7) Conclusion
What is a Biometric ???
Biometric verification is any means by which a
person can be uniquely identified by evaluating one or
more distinguishing biological traits. Unique identifiers
include fingerprints, hand geometry, earlobe
geometry, retina and iris patterns, voice waves, DNA,
and signatures.
History of Biometric Technology
ī‚— The term “biometrics” is derived from the
Greek words “bio” (life) and “metrics” (to
measure).
ī‚— Biometric is the automated process of
identifying or verifying an individual based
upon his or her behavioral or physical
characteristics.
1858 – First systematic capture of hand
images for identification purposes is
recorded by Sir William Herschel
William Herschel
1936 – Concept of using the iris pattern
for identification is proposed
frank
What is Authentication ???
ī‚— Authentication is the act of confirming
something what it claims to be.
ī‚— It is the process of giving someone
identity so that he or she can access that
particular application or data.
ī‚— For e.g.: giving identity-card to a student
of an institute.
Authentication
Main Types of Authentication
ī‚— By using passwords, PIN
ī‚— By using smart card or swipe card
ī‚— By using Biometric
Mode of Biometric System
Identification
īą One-to-many comparison
īą It search for a sample against a database of
templates
īą It identifies an unknown individual.
īą For e.g.: who is “x”?
Verification
īą One-to-one comparison
īą It compares a sample against a single stored
template
īą It verifies that the individual is who he claims to
be
īą For e.g.: is this “x”?
Working of biometric system
Steps:
īƒŧ Capturing
īƒŧ Pre-processing
īƒŧ Feature extraction
īƒŧ Template matching
īƒŧ Matcher/Comparison
īƒŧ Application Device
Working process
ī‚— Enrollment: In this stage, the information
captured from the subject by the sensing device is
stored in a database for later comparison. When
someone uses biometric for the first time then the
stage is called enrollment.
Contdâ€Ļ
ī‚— Authentication: In this stage, the
registered biometric sample during the
enrollment process are matched against
newly capturing biometric sample.
Biometric devices consist of
ī‚— A scanning device
ī‚— A software which converts scanned information into
digital forms and compares on some matching points
ī‚— A database that stores biometric features for
further comparison
Different biometric technique
Fingerprint technology:
īąIt is the oldest and most widely used method.
īąIt needs a fingerprint reader.
īąRegistered points are located and compared.
īąOptical sensors are used for scanning purpose.
īąIt can be used for many applications like pc login
security, voting system,
attendance system etc.
Contd..
ī‚— Uses the ridge endings and bifurcation's on a persons
finger to plot points known as Minutiae
ī‚— The number and locations of the minutiae vary from
finger to finger in any particular person, and from
person to person for any particular finger
Finger Image + MinutiaeFinger Image Minutiae
Face recognition technology
īą Face Recognition is a biometric technique for
automatic identification or verification of a person from
a digital image.
īą These include the position/size/shape of the eyes,
nose, cheekbones and jaw line.
Facial Recognition
1. Capture image
2. Find face in image
3. Extract features
(store template)
4. Compare templates
5. Declare matches
Iris Recognition Technology
ī‚— It measures the iris pattern of the eye i.e. the
colored part of the eye that surrounds the pupil.
ī‚— The iris canner analyzes features like rings,
furrows, and freckles existing in the colored
tissue surrounding the pupil.
ī‚— Iris pattern is not changed over
years or by glasses, contact lens
Iris recognition
Iris scanning measures the iris
pattern in the colored part of the
eye,
Retina recognition
Images back of the eye
and compares blood
vessels with existing data
Hand Geometry Technology
īąThis method uses hand images for person
identification or verification.
īąPerson identification using hand geometry
utilizes hand images to extract a number of
features such as finger length, width,
thickness, finger area etc.
īąMeasures the digits of the hand and
compares to those collected at the time of
enrollment.
Contd..
īąPlaces hand on the system, which takes
the three dimensional image of the
hand.
Speaker recognition technology
ī‚— Voice Recognition or Speaker Recognition is a
biometric process of validating a user's claimed identity
using characteristics extracted from their voices.
It uses the pitch, pattern, tone, frequency, rhythm of
speech for identification purposes.
A telephone or microphone can act as a sensor.
Contd..
ī‚¨ During the enrollment phase, the spoken words are
converted from analog to digital format, and the
distinctive vocal characteristics such as pitch, frequency,
and tone, are extracted, and a speaker model is
established.
ī‚¨ A template is then generated and stored for future
comparisons.
ī‚¨ Speaker recognition is often used where voice is the only
available biometric identifier, such as telephone.
Keystroke dynamics
Keystroke dynamics is an automated method of examining an
individual’s keystrokes on a keyboard.
This technology examines such dynamics
as speed and pressure, the total time taken to type particular
words, and the time elapsed between hitting certain keys.
Comparison Between Different Technique
ī‚— Biometrics cannot be lost, stolen or forgotten. Barring
disease or serious physical injury, the biometric is
consistent and permanent.
ī‚— It is also secure in that the biometric itself cannot be
socially engineered, shared or used by others.
ī‚— There is no requirement to remember passwords, or PINs,
thus eliminating an overhead cost. The biometric is always
available to the individual;
ī‚— Coupled with a smart card, biometrics provide strong
security for any credentials on the smart card.
ī‚— Biometric system provide a high degree of confidence in
user identity.
ī‚— Organizations can implement recognition systems to
obviate the need to log onto a system manually.
advantage of biometrics
īƒŧ Lack of standardization
īƒŧ While the reliability and the accuracy of biometric
devices continues to improve.
īƒŧ Biometric systems must be able to accommodate
changes to the biometric over time which may be
caused by ageing, illness or injury.
ī‚— The effectiveness of the sample collection process
is strongly influenced by environmental
conditions, user training and usability. For
example, lighting, facial orientations, expression,
image resolution and the wearing of hats can affect
the quality of the sample.
disadvantages
Applications of Biometric
presently using
ī‚— Vertical markets that are using
biometrics:
Government—Passports, national
identification (ID) cards, voter cards,
driver’s licenses, social services,
and so on
ī‚— ✓ Transportation—Airport security,
boarding passes, and commercial
driver’s licenses
ī‚— ✓ Healthcare—Medical insurance
cards, patient/employee identity
cards
ī‚— ✓ Financial—Bankcards, ATM
cards, credit cards, and debit cards
ī‚— ✓ Security—Access control and
identity verifications, including time
and attendance
ī‚— ✓ Education—Student/teacher
identity verification and access
control. Biometrics are now being
implemented in large-scale ID
systems around the globe.
Future using and existing
ī‚— Biometrics is a rapidly evolving
technology that is being widely
used in forensics, such as criminal
identification and prison security,
and that has the potential to be
used in a large range of civilian
application areas.
ī‚— Biometrics can be used to prevent
unauthorized access to ATMs,
cellular phones, smart cards,
desktop PCs, workstations, and
computer networks.
ī‚— It can be used during transactions
conducted by telephone and
Internet (electronic commerce and
electronic banking).
ī‚— In automobiles, biometrics can
replace keys with keyless entry
devices.
conclusion
The upcoming lead in technology
Biometric technology

More Related Content

What's hot

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Biometrics
BiometricsBiometrics
Biometricsanoop80686
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
biometrics
biometricsbiometrics
biometricsAkhil Kumar
 
Biometrics
BiometricsBiometrics
Biometrics
senejug
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
Abdul Rehman
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
Prabh Jeet
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 
Biometricsppt
BiometricspptBiometricsppt
BiometricspptDrKRBadhiti
 

What's hot (20)

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 

Viewers also liked

biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
biometric technology
biometric technologybiometric technology
biometric technology
RAHUL SRIVASTAVA
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
twuniversity
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
AKS Solutions (Pvt) Ltd.
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
esther_sonu
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
Star Link Communication Pvt Ltd
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
FaithCWorth
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 

Viewers also liked (20)

biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 

Similar to Biometric technology

A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security SystemShalika Dissanayaka
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
desire120
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
Biometric
Biometric Biometric
Biometric Vinay Gupta
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometrics
BiometricsBiometrics
Biometrics
Alan Leewllyn Bivera
 
Biometric
 Biometric Biometric
Biometricapekdm_91
 
Biometric
 Biometric Biometric
Biometricapekdm_91
 
Biometrics
BiometricsBiometrics
BiometricsRajan Kumar
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 

Similar to Biometric technology (20)

A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
 Biometric Biometric
Biometric
 
Biometric
 Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 

More from Madugula Kumar

Arduino
ArduinoArduino
Arduino
Madugula Kumar
 
Multiple access communication
Multiple access communicationMultiple access communication
Multiple access communication
Madugula Kumar
 
aritifiacal intelligence
aritifiacal intelligencearitifiacal intelligence
aritifiacal intelligence
Madugula Kumar
 
Women empowerment
Women empowermentWomen empowerment
Women empowerment
Madugula Kumar
 
Technology modified
Technology modifiedTechnology modified
Technology modified
Madugula Kumar
 
My electronic gadget
My electronic gadgetMy electronic gadget
My electronic gadget
Madugula Kumar
 
Disaster management modified
Disaster management modifiedDisaster management modified
Disaster management modified
Madugula Kumar
 
Dc motors
Dc motorsDc motors
Dc motors
Madugula Kumar
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Madugula Kumar
 
3 d holography
3 d holography3 d holography
3 d holography
Madugula Kumar
 
Robotics
RoboticsRobotics
Robotics
Madugula Kumar
 
wireless technology
wireless technologywireless technology
wireless technology
Madugula Kumar
 

More from Madugula Kumar (13)

Arduino
ArduinoArduino
Arduino
 
Multiple access communication
Multiple access communicationMultiple access communication
Multiple access communication
 
aritifiacal intelligence
aritifiacal intelligencearitifiacal intelligence
aritifiacal intelligence
 
robotics
roboticsrobotics
robotics
 
Women empowerment
Women empowermentWomen empowerment
Women empowerment
 
Technology modified
Technology modifiedTechnology modified
Technology modified
 
My electronic gadget
My electronic gadgetMy electronic gadget
My electronic gadget
 
Disaster management modified
Disaster management modifiedDisaster management modified
Disaster management modified
 
Dc motors
Dc motorsDc motors
Dc motors
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
3 d holography
3 d holography3 d holography
3 d holography
 
Robotics
RoboticsRobotics
Robotics
 
wireless technology
wireless technologywireless technology
wireless technology
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Biometric technology

  • 2. Objectives 1) What is a Biometric ? 2) Various Types of Biometric 3) History of Biometric 4) Working & Authentication process 5) Advantages and Disadvantages 6) Applications 7) Conclusion
  • 3. What is a Biometric ??? Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, DNA, and signatures.
  • 4.
  • 5. History of Biometric Technology ī‚— The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure). ī‚— Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical characteristics. 1858 – First systematic capture of hand images for identification purposes is recorded by Sir William Herschel William Herschel 1936 – Concept of using the iris pattern for identification is proposed frank
  • 6. What is Authentication ??? ī‚— Authentication is the act of confirming something what it claims to be. ī‚— It is the process of giving someone identity so that he or she can access that particular application or data. ī‚— For e.g.: giving identity-card to a student of an institute. Authentication
  • 7. Main Types of Authentication ī‚— By using passwords, PIN ī‚— By using smart card or swipe card ī‚— By using Biometric
  • 8. Mode of Biometric System Identification īą One-to-many comparison īą It search for a sample against a database of templates īą It identifies an unknown individual. īą For e.g.: who is “x”? Verification īą One-to-one comparison īą It compares a sample against a single stored template īą It verifies that the individual is who he claims to be īą For e.g.: is this “x”?
  • 9. Working of biometric system Steps: īƒŧ Capturing īƒŧ Pre-processing īƒŧ Feature extraction īƒŧ Template matching īƒŧ Matcher/Comparison īƒŧ Application Device
  • 10. Working process ī‚— Enrollment: In this stage, the information captured from the subject by the sensing device is stored in a database for later comparison. When someone uses biometric for the first time then the stage is called enrollment.
  • 11. Contdâ€Ļ ī‚— Authentication: In this stage, the registered biometric sample during the enrollment process are matched against newly capturing biometric sample.
  • 12. Biometric devices consist of ī‚— A scanning device ī‚— A software which converts scanned information into digital forms and compares on some matching points ī‚— A database that stores biometric features for further comparison
  • 13. Different biometric technique Fingerprint technology: īąIt is the oldest and most widely used method. īąIt needs a fingerprint reader. īąRegistered points are located and compared. īąOptical sensors are used for scanning purpose. īąIt can be used for many applications like pc login security, voting system, attendance system etc.
  • 14. Contd.. ī‚— Uses the ridge endings and bifurcation's on a persons finger to plot points known as Minutiae ī‚— The number and locations of the minutiae vary from finger to finger in any particular person, and from person to person for any particular finger Finger Image + MinutiaeFinger Image Minutiae
  • 15. Face recognition technology īą Face Recognition is a biometric technique for automatic identification or verification of a person from a digital image. īą These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
  • 16. Facial Recognition 1. Capture image 2. Find face in image 3. Extract features (store template) 4. Compare templates 5. Declare matches
  • 17. Iris Recognition Technology ī‚— It measures the iris pattern of the eye i.e. the colored part of the eye that surrounds the pupil. ī‚— The iris canner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil. ī‚— Iris pattern is not changed over years or by glasses, contact lens
  • 18. Iris recognition Iris scanning measures the iris pattern in the colored part of the eye,
  • 19. Retina recognition Images back of the eye and compares blood vessels with existing data
  • 20. Hand Geometry Technology īąThis method uses hand images for person identification or verification. īąPerson identification using hand geometry utilizes hand images to extract a number of features such as finger length, width, thickness, finger area etc. īąMeasures the digits of the hand and compares to those collected at the time of enrollment.
  • 21. Contd.. īąPlaces hand on the system, which takes the three dimensional image of the hand.
  • 22. Speaker recognition technology ī‚— Voice Recognition or Speaker Recognition is a biometric process of validating a user's claimed identity using characteristics extracted from their voices. It uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes. A telephone or microphone can act as a sensor.
  • 23. Contd.. ī‚¨ During the enrollment phase, the spoken words are converted from analog to digital format, and the distinctive vocal characteristics such as pitch, frequency, and tone, are extracted, and a speaker model is established. ī‚¨ A template is then generated and stored for future comparisons. ī‚¨ Speaker recognition is often used where voice is the only available biometric identifier, such as telephone.
  • 24. Keystroke dynamics Keystroke dynamics is an automated method of examining an individual’s keystrokes on a keyboard. This technology examines such dynamics as speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys.
  • 26. ī‚— Biometrics cannot be lost, stolen or forgotten. Barring disease or serious physical injury, the biometric is consistent and permanent. ī‚— It is also secure in that the biometric itself cannot be socially engineered, shared or used by others. ī‚— There is no requirement to remember passwords, or PINs, thus eliminating an overhead cost. The biometric is always available to the individual; ī‚— Coupled with a smart card, biometrics provide strong security for any credentials on the smart card. ī‚— Biometric system provide a high degree of confidence in user identity. ī‚— Organizations can implement recognition systems to obviate the need to log onto a system manually. advantage of biometrics
  • 27. īƒŧ Lack of standardization īƒŧ While the reliability and the accuracy of biometric devices continues to improve. īƒŧ Biometric systems must be able to accommodate changes to the biometric over time which may be caused by ageing, illness or injury. ī‚— The effectiveness of the sample collection process is strongly influenced by environmental conditions, user training and usability. For example, lighting, facial orientations, expression, image resolution and the wearing of hats can affect the quality of the sample. disadvantages
  • 28. Applications of Biometric presently using ī‚— Vertical markets that are using biometrics: Government—Passports, national identification (ID) cards, voter cards, driver’s licenses, social services, and so on ī‚— ✓ Transportation—Airport security, boarding passes, and commercial driver’s licenses ī‚— ✓ Healthcare—Medical insurance cards, patient/employee identity cards ī‚— ✓ Financial—Bankcards, ATM cards, credit cards, and debit cards ī‚— ✓ Security—Access control and identity verifications, including time and attendance ī‚— ✓ Education—Student/teacher identity verification and access control. Biometrics are now being implemented in large-scale ID systems around the globe. Future using and existing ī‚— Biometrics is a rapidly evolving technology that is being widely used in forensics, such as criminal identification and prison security, and that has the potential to be used in a large range of civilian application areas. ī‚— Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. ī‚— It can be used during transactions conducted by telephone and Internet (electronic commerce and electronic banking). ī‚— In automobiles, biometrics can replace keys with keyless entry devices.

Editor's Notes

  1. Depending on application it can operate on two modes.