SlideShare a Scribd company logo
WHAT IS BIOMETRICS
 BIOMETRICS REFERS TO THE AUTOMATIC
IDENTIFICATION OF A PERSON BASED ON
THEIR PHYSIOLOGICAL CHARACTERISTICS
PHYSIOLOGICAL are related to the shape of the
body . Finger print, Face recognition, DNA, Plam
print, Retina and Voice Recognition
Biometrics is the word derived from the Greek
word.
‘Bio’ means life and ‘metric’ means
measure.
Identity verification in computer system is PIN,
PASSWORD.
 In many cases KEYS, CHIP CARD, PIN,
PASSWORD are used for security verification.
 Things like keys, cards can be stolen and pins,
passwords to be forgotten or disclosed.
 To come over all these problems biometric security is
used.
Typesof Biometric SecurityTechnologies
 FINGERPRINT
 IRIS
 RETINA
 HANDGEOMETRY
 FACIALRECOGNITION
 SPEAKERVERIFICATION
 OTHERBIOMETRICTECHNOLOGIES LIKE HANDVIEN,PLAMPRINT,
DNA,EARSHAPE,bodyodor,fingernailbed e.t.c.
Fingerprint Technologies
It is the oldest of the all Biometric techniques.
In olden days they used PAPER-BASED
method.
Now, they are digitalized by using Optical,
Thermal, Ultrasonic principles.
Even twins have different fingerprints and no
two have the same fingerprint.
TYPES OF FINGERPRINT SENSORS
IRIS BIOMETRICS
Iris is the externally-visibly, colored ring around
the pupil.
The flowery pattern is unique for each
individual.
Even left and right eyes of any individual, have
unrelated IRIS pattern.
It is stable throughout the life.
Hand Geometry
 Hand geometry is a biometric that identifies users by
the shape of their hands.
 Dimensions and shape of the hand, fingers as well as
their relative locations
 While scanning two images are
taken one from the top and one
from the side
retina
Retina scan is the process of analyzing the
layer of blood vessels situated at the back of
the eye.
Retina scan machines are
fairly expensive.
It takes around 10 minutes to
scan retina.
Facial Recognition
It requires no physical interaction on behalf of
the user.
The system compares
1. Distance between eyes
2. Width of the nose
3. Depth of eye sockets
4. Length of jaw line
Speaker verification
 It’s a habitual speaking recognition.
 Voice recognition systems analyze differences such as
in pitch, tone.
 This biometric is also sensitive to environmental
Conditions such as
background noise .
Advantages of Biometrics
 Biometrics cannot be lost, stolen, forgotten. Biometrics
is consistent and permanent.
 It is also secure in that biometric itself cannot be
shared or used by others.
 There is no requirement to remember passwords, PINs.
 The biometric is always available to the individual
and unique.
Disadvantages of Biometric
 Face recognition system can’t tell the difference
between identical twins.
 Retinal scanning systems, are still uncomfortable for
the user.
 Peoples voice can change, background noises can
interfere.
 There are two types of errors-
a. FALSE REJECTION and
b. FALSE ACCEPTANCE
Conclusion
 BIOMETRICS play a major role in our daily life.
 But we should not depend totally on biometric
security.
 Even its unique for every one, it has many
disadvantages.
Biometric technology .pptx

More Related Content

What's hot

Biometrics
BiometricsBiometrics
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Biometrics
BiometricsBiometrics
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
Abdul Rehman
 
Biometrics
BiometricsBiometrics
Biometrics
Divya Shah
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
twuniversity
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
DrKRBadhiti
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
amee yaami
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 

Viewers also liked

Keigher AT&T Tech Videos cover
Keigher AT&T Tech Videos coverKeigher AT&T Tech Videos cover
Keigher AT&T Tech Videos coverSharon Keigher
 
Malcha july 2012 flier
Malcha july 2012 flierMalcha july 2012 flier
Malcha july 2012 flierweiss2001
 
Project
ProjectProject
Flooring Plan
Flooring PlanFlooring Plan
Flooring Plan
Rashmi Agrawal
 
Critical approaches (1)
Critical approaches (1)Critical approaches (1)
Critical approaches (1)
Rebecca Coughlin
 
Hfgjuytjhgjhjljkmhjlk
HfgjuytjhgjhjljkmhjlkHfgjuytjhgjhjljkmhjlk
Hfgjuytjhgjhjljkmhjlk
Sahira Murillo Diaz
 
2008-09-07 HK Faith Salon Talk
2008-09-07 HK Faith Salon Talk2008-09-07 HK Faith Salon Talk
2008-09-07 HK Faith Salon TalkLaura Sun
 
DoD BMET Diploma
DoD BMET DiplomaDoD BMET Diploma
DoD BMET DiplomaGreg Cowan
 
Planetas enanos y objetos menores 2016
Planetas enanos y objetos menores 2016Planetas enanos y objetos menores 2016
Planetas enanos y objetos menores 2016
Antonio González Atienza
 
Marco Polo Hotel GM Hong Kong
Marco Polo Hotel GM Hong KongMarco Polo Hotel GM Hong Kong
Marco Polo Hotel GM Hong KongMassimo Gavina
 
GM Presentation Flow
GM Presentation FlowGM Presentation Flow
GM Presentation Flow
Guido Magnago
 
El sistema financiero colombiano
El sistema financiero colombianoEl sistema financiero colombiano
El sistema financiero colombiano
Kharina Manjarres Palencia
 
El viaje
El viajeEl viaje
El viaje
arteriagrafica
 

Viewers also liked (17)

Ovee ui
Ovee uiOvee ui
Ovee ui
 
Keigher AT&T Tech Videos cover
Keigher AT&T Tech Videos coverKeigher AT&T Tech Videos cover
Keigher AT&T Tech Videos cover
 
Mario
MarioMario
Mario
 
Malcha july 2012 flier
Malcha july 2012 flierMalcha july 2012 flier
Malcha july 2012 flier
 
Project
ProjectProject
Project
 
Flooring Plan
Flooring PlanFlooring Plan
Flooring Plan
 
Sales Flyer
Sales FlyerSales Flyer
Sales Flyer
 
tadcaster reference
tadcaster referencetadcaster reference
tadcaster reference
 
Critical approaches (1)
Critical approaches (1)Critical approaches (1)
Critical approaches (1)
 
Hfgjuytjhgjhjljkmhjlk
HfgjuytjhgjhjljkmhjlkHfgjuytjhgjhjljkmhjlk
Hfgjuytjhgjhjljkmhjlk
 
2008-09-07 HK Faith Salon Talk
2008-09-07 HK Faith Salon Talk2008-09-07 HK Faith Salon Talk
2008-09-07 HK Faith Salon Talk
 
DoD BMET Diploma
DoD BMET DiplomaDoD BMET Diploma
DoD BMET Diploma
 
Planetas enanos y objetos menores 2016
Planetas enanos y objetos menores 2016Planetas enanos y objetos menores 2016
Planetas enanos y objetos menores 2016
 
Marco Polo Hotel GM Hong Kong
Marco Polo Hotel GM Hong KongMarco Polo Hotel GM Hong Kong
Marco Polo Hotel GM Hong Kong
 
GM Presentation Flow
GM Presentation FlowGM Presentation Flow
GM Presentation Flow
 
El sistema financiero colombiano
El sistema financiero colombianoEl sistema financiero colombiano
El sistema financiero colombiano
 
El viaje
El viajeEl viaje
El viaje
 

Similar to Biometric technology .pptx

Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Biometrics
BiometricsBiometrics
Biometrics
Rajan Kumar
 
Biometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptxBiometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptx
HabiburRahmanZihad20
 
Biometric System
Biometric SystemBiometric System
Biometric System
Imtiaz Siddique
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
Bio shiv
Bio shivBio shiv
Bio shiv
Shivank Garg
 
Biometrics
BiometricsBiometrics
Biometrics
NA000000
 
Biometrics
BiometricsBiometrics
Biometrics
Shivani Gautam
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Bio metrics
Bio metricsBio metrics
Bio metrics
The_Archer
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
Biometric
Biometric Biometric
Biometric
Vinay Gupta
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
'Femi Akin-Laguda
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
Ravi Kumar
 

Similar to Biometric technology .pptx (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptxBiometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptx
 
Biometric System
Biometric SystemBiometric System
Biometric System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 

Recently uploaded

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 

Recently uploaded (20)

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 

Biometric technology .pptx

  • 1.
  • 2. WHAT IS BIOMETRICS  BIOMETRICS REFERS TO THE AUTOMATIC IDENTIFICATION OF A PERSON BASED ON THEIR PHYSIOLOGICAL CHARACTERISTICS PHYSIOLOGICAL are related to the shape of the body . Finger print, Face recognition, DNA, Plam print, Retina and Voice Recognition
  • 3. Biometrics is the word derived from the Greek word. ‘Bio’ means life and ‘metric’ means measure.
  • 4. Identity verification in computer system is PIN, PASSWORD.  In many cases KEYS, CHIP CARD, PIN, PASSWORD are used for security verification.  Things like keys, cards can be stolen and pins, passwords to be forgotten or disclosed.  To come over all these problems biometric security is used.
  • 5. Typesof Biometric SecurityTechnologies  FINGERPRINT  IRIS  RETINA  HANDGEOMETRY  FACIALRECOGNITION  SPEAKERVERIFICATION  OTHERBIOMETRICTECHNOLOGIES LIKE HANDVIEN,PLAMPRINT, DNA,EARSHAPE,bodyodor,fingernailbed e.t.c.
  • 6.
  • 7. Fingerprint Technologies It is the oldest of the all Biometric techniques. In olden days they used PAPER-BASED method. Now, they are digitalized by using Optical, Thermal, Ultrasonic principles. Even twins have different fingerprints and no two have the same fingerprint.
  • 9.
  • 10. IRIS BIOMETRICS Iris is the externally-visibly, colored ring around the pupil. The flowery pattern is unique for each individual. Even left and right eyes of any individual, have unrelated IRIS pattern. It is stable throughout the life.
  • 11.
  • 12. Hand Geometry  Hand geometry is a biometric that identifies users by the shape of their hands.  Dimensions and shape of the hand, fingers as well as their relative locations  While scanning two images are taken one from the top and one from the side
  • 13. retina Retina scan is the process of analyzing the layer of blood vessels situated at the back of the eye. Retina scan machines are fairly expensive. It takes around 10 minutes to scan retina.
  • 14. Facial Recognition It requires no physical interaction on behalf of the user. The system compares 1. Distance between eyes 2. Width of the nose 3. Depth of eye sockets 4. Length of jaw line
  • 15. Speaker verification  It’s a habitual speaking recognition.  Voice recognition systems analyze differences such as in pitch, tone.  This biometric is also sensitive to environmental Conditions such as background noise .
  • 16. Advantages of Biometrics  Biometrics cannot be lost, stolen, forgotten. Biometrics is consistent and permanent.  It is also secure in that biometric itself cannot be shared or used by others.  There is no requirement to remember passwords, PINs.  The biometric is always available to the individual and unique.
  • 17. Disadvantages of Biometric  Face recognition system can’t tell the difference between identical twins.  Retinal scanning systems, are still uncomfortable for the user.  Peoples voice can change, background noises can interfere.  There are two types of errors- a. FALSE REJECTION and b. FALSE ACCEPTANCE
  • 18. Conclusion  BIOMETRICS play a major role in our daily life.  But we should not depend totally on biometric security.  Even its unique for every one, it has many disadvantages.