SlideShare a Scribd company logo
1 of 33
BIOMETRICS




PRESENTED BY:
RACHIT SRIVASTAVA
WHAT IS BIOMETRICS?

 The term 'biometrics' refers strictly speaking to a science
  involving the statistical analysis of biological
  characteristics .



 A biometric is a unique, measurable characteristic or trait
  of a human being for automatically recognizing or
  verifying identity."
FEATURES :-

 Automated method


 Pattern recognition system


 Specific physiological or behavioral characteristics
WHY BIOMETRICS?
 To prevent stealing of possessions that mark the
 authorised person's identity e.g. security badges, licenses,
 or properties

 To prevent fraudulent acts like faking ID badges or
 licenses.

 To ensure safety and security, thus decrease crime rates
BIOMETRIC SYSTEM
  Data Collection

  Transmission

  Signal Processing

  Data Storage

  Decision
BIOMETRIC MODEL :-
HOW BIOMETRIC WORKS

 The hardware captures the salient human
 characteristic

 The software interprets the resulting data and
 determines acceptability.
CHARACTERISTICS USED
 • Fingerprints
 • Voiceprints
 • Facial features
 • Writing patterns
 • Iris patterns
 • Hand geometry
FINGERPRINT
 Traditional finger scanning technique analysis of
  small unique marks of the finger image known as
  minutiae. The relative position of minutiae is used
  for comparison, because no fingers have identical
  prints, even from the same person or identical
  twins .
 Fingerprint matching techniques can be placed
  into two categories:
 a) minutiae based       b) correlation based
FINGERPRINT
   Finger-scan biometrics is based on the distinctive
    characteristics of the human fingerprint

   A fingerprint image is read from a capture device

   Features are extracted from the image

   A template is created for comparison
PROCESS


INPUT     DECODING

                     DECISION
STAGES
 Fingerprint Scanning


 Fingerprint Matching


 Identification
FINGERPRINT SCANNING

   It’s the acquisition and recognition of a
     person’s fingerprint characteristics for
     identification purposes
FINGERPRINT
FINGERPRINT EXTRACTION AND MATCHING
IRIS SCAN :-
EYE
 internal parts of human eye are very well protected the sight
 being the most important sensor, the biometric data is also
 safe and immune to degradation in normal life on the
 contrary to more external parts like fingertips .



 They can be divided in two specific technologies:
 examination of iris and retina patterns.
IRIS
 Visually examined iris is the colored ring of textured
 tissue that surrounds the pupil of the eye as shown.
  The iris consists largely of a system of muscle that expand
 and contract the pupil in response to changing lighting
 conditions. After taking a picture of the eye, the system
 samples the radial and angular variations of each
 individual iris to form an Iris Code, a digital file that
 serves as a reference in database.
IRIS RECOGNITION

     Pattern recognition technique

      Identification by mathematical analysis of the
    random patterns.

     Based upon the qualities of the Iris

   No two iris are same.
IRIS SYTEM
                                              Uniform
                                              distributio          Stored
                                              n                   templates



                                                                         Reject
                  Pre            Feature-         Identificatio
                  processing     extraction       n
                                                  Verification
Iris scan image                                                         Accept
                  Iris           Iris code
capture                                           comparison
                  localization
IRIS CODE
 Localization of inner and outer boundaries


 Pattern of 512 bytes


 Complete and Compact description


 More complete than features of DNA
IRIS SCAN
   Camera at close proximity

   Captures photograph

   Uses Infra red light to illuminate

   High resolution photograph
IRIS SCAN IMAGE
AVIATION – IRIS DEVICES
FACE :-
 Face recognition technologies analyze the unique
  shape, pattern and positioning of facial features
 Face recognition is very complex technology and
  largely software based. Artificial intelligence is used to
  simulate human interpretation of faces. The problem
  with human face is that people do change over time;
  wrinkles, beard, glasses and position of the head can
  affect the performance considerably.
 There are essentially two methods of capture: using
  video or thermal imaging.
HAND GEOMETRY :-
 When measuring hand geometry biometrics, three-
  dimensional image of the hand is taken and the shape
  and length of fingers and knuckles are measured.
 The technology does not achieve the highest levels of
  accuracy but it is convenient and fast to use. On the
  capture process a user places a hand on the reader,
  aligning fingers with specially positioned guides.
COMPARISON
Biometric Type   Accuracy   Ease of Use   User Acceptance

Fingerprint      High       Medium        Low

Hand Geometry    Medium     High          Medium

Voice            Medium     High          High

Retina           High       Low           Low

Iris             Medium     Medium        Medium

Signature        Medium     Medium        High

Face             Low        High          High
APPLICATIONS :-
 CYBER SECURITY –
                    Cyber security has been built- in
  signature security management features of Adobe
  Acrobat software. This software enables the
  handwritten signature to be included as an electronic
  signature in any Acrobat portable document format
  (PDF) file on the web .
 BIOMETRIC SMART CARD –
                    The information stored in the card is
  protected by circuits inside the card that perform
  encryption/decryption of the data in the card.
BIOMETRIC CELLULARS –
                         Fujistu microelectronics has
developed an innovative fingerprint identification
system that combines sweep sensor technology with
advanced algorithms to provide a powerful,
dependable, easy-to-use authentication for PDAs, cell
phones, and other mobile devices. The sensor measure
just 1.28x0.20cm and is powered by sophisticated
algorithms that generate unique minutiae templates
that correspond to specific fingerprint features. A
single fingerprint sweep across the sensor capture
fingerprint feature to rapidly authenticate user of cell
phones and PDAs.
FUTURE BIOMETRICS :-
 a) DNA SCANNING


 b) EAR SHAPE


 c) KEYSTROKE DYNAMIC SCANNING


 d) VEINCHECK
REFERENCES
    www.biometix.com
    www.biomet.org
    www.owlinvestigation.com
    www.ddl.ision.co.uk
    www.zdnetindia.com/techzone/resources
    www.biodata.com.au
THANK YOU

More Related Content

What's hot

Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! finalARUNASUJITHA
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4sakshi_20
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognitionAhmed Tememe
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTAjay K
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION Ankit Kumar
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification Being Topper
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System Sadan Khan
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
IRIS Scaner
 IRIS Scaner IRIS Scaner
IRIS Scaner
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Dh24703708
Dh24703708Dh24703708
Dh24703708
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Final iris recognition
Final iris recognitionFinal iris recognition
Final iris recognition
 
IRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPTIRIS &RETINAL SCANNING PPT
IRIS &RETINAL SCANNING PPT
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Biometrics
BiometricsBiometrics
Biometrics
 

Viewers also liked

Садовый измельчитель веток Bosch AXT 25 D
Садовый измельчитель веток Bosch AXT 25 DСадовый измельчитель веток Bosch AXT 25 D
Садовый измельчитель веток Bosch AXT 25 DAl Maks
 
Formúlario datos del paciente
Formúlario datos del pacienteFormúlario datos del paciente
Formúlario datos del pacientekode99
 
Formulario de identificaciòn
Formulario de identificaciònFormulario de identificaciòn
Formulario de identificaciònkode99
 
Resumen Ranking Master 2011 a.c.a.m
Resumen Ranking Master 2011 a.c.a.mResumen Ranking Master 2011 a.c.a.m
Resumen Ranking Master 2011 a.c.a.mACAM ATLETISMO
 
Садовый измельчитель веток Bosch AXT 25 TC
Садовый измельчитель веток Bosch AXT 25 TCСадовый измельчитель веток Bosch AXT 25 TC
Садовый измельчитель веток Bosch AXT 25 TCAl Maks
 
Módulo3 actividad 1- la didáctica
Módulo3 actividad 1- la didácticaMódulo3 actividad 1- la didáctica
Módulo3 actividad 1- la didácticafranco-grimaldi
 
老師的啟示
老師的啟示老師的啟示
老師的啟示teehooisim
 
We bill demo instructions
We bill demo instructionsWe bill demo instructions
We bill demo instructionsAmberBaylor
 
Jx webinar csr-materiality-brand-v1-condensed
Jx webinar csr-materiality-brand-v1-condensedJx webinar csr-materiality-brand-v1-condensed
Jx webinar csr-materiality-brand-v1-condensedAdam Garfunkel
 
Everything You Need to Know About Health Care Reform (But Are Afraid to Ask)
Everything You Need to Know About Health Care Reform (But Are Afraid to Ask)Everything You Need to Know About Health Care Reform (But Are Afraid to Ask)
Everything You Need to Know About Health Care Reform (But Are Afraid to Ask)Barry_Rosen
 
Maialen
MaialenMaialen
Maialengazadi
 

Viewers also liked (20)

Brigadoon Program
Brigadoon ProgramBrigadoon Program
Brigadoon Program
 
Садовый измельчитель веток Bosch AXT 25 D
Садовый измельчитель веток Bosch AXT 25 DСадовый измельчитель веток Bosch AXT 25 D
Садовый измельчитель веток Bosch AXT 25 D
 
Events
EventsEvents
Events
 
Formúlario datos del paciente
Formúlario datos del pacienteFormúlario datos del paciente
Formúlario datos del paciente
 
Chapter2 13pages
Chapter2 13pagesChapter2 13pages
Chapter2 13pages
 
Formulario de identificaciòn
Formulario de identificaciònFormulario de identificaciòn
Formulario de identificaciòn
 
Resumen Ranking Master 2011 a.c.a.m
Resumen Ranking Master 2011 a.c.a.mResumen Ranking Master 2011 a.c.a.m
Resumen Ranking Master 2011 a.c.a.m
 
Садовый измельчитель веток Bosch AXT 25 TC
Садовый измельчитель веток Bosch AXT 25 TCСадовый измельчитель веток Bosch AXT 25 TC
Садовый измельчитель веток Bosch AXT 25 TC
 
Módulo3 actividad 1- la didáctica
Módulo3 actividad 1- la didácticaMódulo3 actividad 1- la didáctica
Módulo3 actividad 1- la didáctica
 
2008 election in mongolia
2008 election in mongolia2008 election in mongolia
2008 election in mongolia
 
老師的啟示
老師的啟示老師的啟示
老師的啟示
 
We bill demo instructions
We bill demo instructionsWe bill demo instructions
We bill demo instructions
 
Lugo
LugoLugo
Lugo
 
Mn219
Mn219Mn219
Mn219
 
Baum2
Baum2Baum2
Baum2
 
Jx webinar csr-materiality-brand-v1-condensed
Jx webinar csr-materiality-brand-v1-condensedJx webinar csr-materiality-brand-v1-condensed
Jx webinar csr-materiality-brand-v1-condensed
 
Cl@sse 2 marcello
Cl@sse 2 marcelloCl@sse 2 marcello
Cl@sse 2 marcello
 
females and hcv
females and hcvfemales and hcv
females and hcv
 
Everything You Need to Know About Health Care Reform (But Are Afraid to Ask)
Everything You Need to Know About Health Care Reform (But Are Afraid to Ask)Everything You Need to Know About Health Care Reform (But Are Afraid to Ask)
Everything You Need to Know About Health Care Reform (But Are Afraid to Ask)
 
Maialen
MaialenMaialen
Maialen
 

Similar to BIOMETRICS

Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika Krishna
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.pptAdityaTakePatil
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Iris scanning
Iris scanningIris scanning
Iris scanningNikithaME
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 

Similar to BIOMETRICS (20)

Biometric unit 1.pptx
Biometric unit 1.pptxBiometric unit 1.pptx
Biometric unit 1.pptx
 
Karthika krishna ethical hacking slides
Karthika krishna ethical hacking slidesKarthika krishna ethical hacking slides
Karthika krishna ethical hacking slides
 
biometrics-ppt pdf
biometrics-ppt pdfbiometrics-ppt pdf
biometrics-ppt pdf
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt49559880-IRIS-SCANNING1.ppt
49559880-IRIS-SCANNING1.ppt
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
I017335457
I017335457I017335457
I017335457
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 

BIOMETRICS

  • 2. WHAT IS BIOMETRICS?  The term 'biometrics' refers strictly speaking to a science involving the statistical analysis of biological characteristics .  A biometric is a unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity."
  • 3. FEATURES :-  Automated method  Pattern recognition system  Specific physiological or behavioral characteristics
  • 4. WHY BIOMETRICS?  To prevent stealing of possessions that mark the authorised person's identity e.g. security badges, licenses, or properties  To prevent fraudulent acts like faking ID badges or licenses.  To ensure safety and security, thus decrease crime rates
  • 5. BIOMETRIC SYSTEM  Data Collection  Transmission  Signal Processing  Data Storage  Decision
  • 7.
  • 8. HOW BIOMETRIC WORKS  The hardware captures the salient human characteristic  The software interprets the resulting data and determines acceptability.
  • 9. CHARACTERISTICS USED • Fingerprints • Voiceprints • Facial features • Writing patterns • Iris patterns • Hand geometry
  • 10. FINGERPRINT  Traditional finger scanning technique analysis of small unique marks of the finger image known as minutiae. The relative position of minutiae is used for comparison, because no fingers have identical prints, even from the same person or identical twins .  Fingerprint matching techniques can be placed into two categories:  a) minutiae based b) correlation based
  • 11. FINGERPRINT  Finger-scan biometrics is based on the distinctive characteristics of the human fingerprint  A fingerprint image is read from a capture device  Features are extracted from the image  A template is created for comparison
  • 12. PROCESS INPUT DECODING DECISION
  • 13. STAGES  Fingerprint Scanning  Fingerprint Matching  Identification
  • 14. FINGERPRINT SCANNING  It’s the acquisition and recognition of a person’s fingerprint characteristics for identification purposes
  • 17. IRIS SCAN :- EYE  internal parts of human eye are very well protected the sight being the most important sensor, the biometric data is also safe and immune to degradation in normal life on the contrary to more external parts like fingertips .  They can be divided in two specific technologies: examination of iris and retina patterns.
  • 18. IRIS Visually examined iris is the colored ring of textured tissue that surrounds the pupil of the eye as shown. The iris consists largely of a system of muscle that expand and contract the pupil in response to changing lighting conditions. After taking a picture of the eye, the system samples the radial and angular variations of each individual iris to form an Iris Code, a digital file that serves as a reference in database.
  • 19. IRIS RECOGNITION  Pattern recognition technique  Identification by mathematical analysis of the random patterns.  Based upon the qualities of the Iris  No two iris are same.
  • 20. IRIS SYTEM Uniform distributio Stored n templates Reject Pre Feature- Identificatio processing extraction n Verification Iris scan image Accept Iris Iris code capture comparison localization
  • 21. IRIS CODE  Localization of inner and outer boundaries  Pattern of 512 bytes  Complete and Compact description  More complete than features of DNA
  • 22. IRIS SCAN  Camera at close proximity  Captures photograph  Uses Infra red light to illuminate  High resolution photograph
  • 24. AVIATION – IRIS DEVICES
  • 25. FACE :-  Face recognition technologies analyze the unique shape, pattern and positioning of facial features  Face recognition is very complex technology and largely software based. Artificial intelligence is used to simulate human interpretation of faces. The problem with human face is that people do change over time; wrinkles, beard, glasses and position of the head can affect the performance considerably.  There are essentially two methods of capture: using video or thermal imaging.
  • 26.
  • 27. HAND GEOMETRY :-  When measuring hand geometry biometrics, three- dimensional image of the hand is taken and the shape and length of fingers and knuckles are measured.  The technology does not achieve the highest levels of accuracy but it is convenient and fast to use. On the capture process a user places a hand on the reader, aligning fingers with specially positioned guides.
  • 28. COMPARISON Biometric Type Accuracy Ease of Use User Acceptance Fingerprint High Medium Low Hand Geometry Medium High Medium Voice Medium High High Retina High Low Low Iris Medium Medium Medium Signature Medium Medium High Face Low High High
  • 29. APPLICATIONS :-  CYBER SECURITY – Cyber security has been built- in signature security management features of Adobe Acrobat software. This software enables the handwritten signature to be included as an electronic signature in any Acrobat portable document format (PDF) file on the web .  BIOMETRIC SMART CARD – The information stored in the card is protected by circuits inside the card that perform encryption/decryption of the data in the card.
  • 30. BIOMETRIC CELLULARS – Fujistu microelectronics has developed an innovative fingerprint identification system that combines sweep sensor technology with advanced algorithms to provide a powerful, dependable, easy-to-use authentication for PDAs, cell phones, and other mobile devices. The sensor measure just 1.28x0.20cm and is powered by sophisticated algorithms that generate unique minutiae templates that correspond to specific fingerprint features. A single fingerprint sweep across the sensor capture fingerprint feature to rapidly authenticate user of cell phones and PDAs.
  • 31. FUTURE BIOMETRICS :-  a) DNA SCANNING  b) EAR SHAPE  c) KEYSTROKE DYNAMIC SCANNING  d) VEINCHECK
  • 32. REFERENCES  www.biometix.com  www.biomet.org  www.owlinvestigation.com  www.ddl.ision.co.uk  www.zdnetindia.com/techzone/resources  www.biodata.com.au