SlideShare a Scribd company logo
“BIOMETRICS”
Introduction
   Biometrics is the science and technology of measuring
    and analyzing biological data.

   It measure and analyze human body characteristics,
    such as DNA, fingerprints, eye retinas and irises, voice
    patterns, facial patterns and hand measurements,
    for authentication purposes.
Biometric devices consist of:
 A reader or scanning device
 Software that converts the scanned
  information into digital form and
  compares match points
 A database that stores the biometric
  data for comparison
Biometrics can be sorted into
two classes:
 Categories of BIOMETRICS
 Physiological
 Examples- face, fingerprints, hand
  geometry and iris Recognition, DNA.
 Behavioral
 Examples-signature and voice.
Basic characteristics of
BIOMETRIC Technologies:
   Universality: Every person should have the
    characteristic. People who are mute or without
    a fingerprint will need to be accommodated in
    some way.

   Uniqueness: Generally, no two people have
    identical characteristics. However, identical
    twins are hard to distinguish.

   Permanence: The characteristics should not
    vary with time. A person's face, for example,
    may change with age.
   Collectibility: The characteristics must be easily
    collectible and measurable.

   Performance: The method must deliver accurate
    results under varied environmental circumstances.

   Acceptability: The general public must accept the
    sample collection routines. Nonintrusive methods are
    more acceptable.

   Circumvention: The technology should be difficult to
    deceive
Working principle:
   Biometric devices consist of a reader or
    scanning device software that converts
    the gathered information into digital
    form, and a database that stores the
    biometric data with comparison with
    existing records.
Modes
   Enrollment Mode.
   Verification Mode.

   Enrollment Mode:
    A sample of the biometric trait is
    captured, processed by a computer, and
    stored for later comparison.

   Verification Mode:
    In this mode biometric system authenticates a
    person’s claimed identity from their previously
    enrolled pattern.
Biometric Modalities:
Fingerprint Recognition:

   For fingerprint Recognition look at:
   Friction ridges
   Core
   Crossover
   Delta
   Island
   Ridge Ending
   Pore
Face Recognition
 It involves recognizing people by there:
 Facial features.
 Face geometry.


   Principle:
    Analysis of unique shape, pattern and
    positioning of facial features.
Voice Recognition:
 Voice recognition is not the same as
  speech recognition, it is speaker
  recognition.
 Considered both physiological and
  behavioral.
 Popular and low-cost, but less accurate
  and sometimes lengthy enrollment.
Styles of spoken input:
 These system have three styles of
  spoken inputs:
 Text Dependent
 Text prompted
 Text Independent
Iris Recognition:
 It is the colored area of the eye that
  surrounds the pupil.
 It is a protected internal organ whose
  random texture is stable throughout life.
 The iris patterns are obtained through a
  video-based image acquisition system .
Iris Images:
Signature Verification:
   Static/Off-line: the conventional way.

   Dynamic/On-line: using electronically
    instrumented device.

   Principle:
    The movement of the pen during the signing
    process rather than the static image of the
    signature. Many aspects of the signature in
    motion can be studied, such as pen pressure,
    the sound the pen makes.
Smart Cards:
   These are digital security pocket-sized cards
    with embedded integrated circuits which can
    process data.

   It can be used for identification,authentication,
    and data storage.

   It can also be used as a medium to provide a
    means of effecting business transactions in a
    flexible, secure, standard way with minimal
    human intervention.
Encryption Systems :
   Transforming information using an
    algorithm to make it unreadable to
    anyone except those possessing special
    knowledge, usually referred to as a key.

   Encryption has long been used by
    militaries and governments to facilitate
    secret communication.
Performance of BIOMETRICS
:
   False accept rate or false match rate (FAR
    or FMR)

   False reject rate or false non-match rate
    (FRR or FNMR)

   Relative operating characteristic (ROC)

   Equal error rate or crossover error rate
    (EER or CER)
Advantages of
Biometrics:
   Biometric identification can provide extremely
    accurate, secured access to information;
    fingerprints, retinal and iris scans produce absolutely
    unique data sets when done properly.

   Current methods like password verification have
    many problems (people write them down, they forget
    them, they make up easy-to-hack passwords) .

   Automated biometric identification can be done very
    rapidly and uniformly, with a minimum of training .

   Your identity can be verified without resort to
    documents that may be stolen, lost or altered.
Disadvantages of
BIOMETRICS:
   The finger print of those people working in Chemical
    industries are often affected. Therefore these companies
    should not use the finger print mode of authentication.

   It is found that with age, the voice of a person differs. Also
    when the person has flu or throat infection the voice
    changes or if there there are too much noise in the
    environment this method maynot authenticate correctly.
    Therefore this method of verification is not workable all
    the time

   For people affected with diabetes, the eyes get affected
    resulting in differences.

   Biometrics is an expensive security solution.
BIOMETRICS SECURITY:
   Security personnel look for biometric
    data that does not change over the
    course of your life; that is, they look for
    physical   characteristics      that  stay
    constant and that are difficult to fake or
    change on purpose
THANK YOU

More Related Content

What's hot

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics
BiometricsBiometrics
Biometrics
senejug
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
Abdul Rehman
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
Rudra Prasad Maiti
 
biometric technology
biometric technologybiometric technology
biometric technology
RAHUL SRIVASTAVA
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
esther_sonu
 
Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 

What's hot (20)

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
biometrics
biometricsbiometrics
biometrics
 

Viewers also liked

Input devices
Input devicesInput devices
Input devicesFRK NIAZI
 
Using Headers and Footers in Word
Using Headers and Footers in WordUsing Headers and Footers in Word
Using Headers and Footers in Word
AngelaMcGaffin
 
Microsoft Word - Paging, Headers, Footers
Microsoft Word - Paging, Headers, FootersMicrosoft Word - Paging, Headers, Footers
Microsoft Word - Paging, Headers, FootersLisa Hartman
 
Ms Access
Ms AccessMs Access
Ms Access
Swati Sinha
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer networkAmit Shaw
 
Worksheet Basics & Navigation - Excel 2013 Tutorial
Worksheet Basics & Navigation - Excel 2013 TutorialWorksheet Basics & Navigation - Excel 2013 Tutorial
Worksheet Basics & Navigation - Excel 2013 Tutorial
SpreadsheetTrainer
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Ms access
Ms accessMs access
Presentation printer
Presentation printerPresentation printer
Presentation printer
Dhruv Vyas
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Creech R Resume 101610
Creech R Resume 101610Creech R Resume 101610
Creech R Resume 101610
Bob Creech
 
2007-2008 Student Awards
2007-2008 Student Awards2007-2008 Student Awards
2007-2008 Student AwardsDaniel Gold
 
Why NextCMS: Layout Editor
Why NextCMS: Layout EditorWhy NextCMS: Layout Editor
Why NextCMS: Layout Editor
Phuoc Nguyen Huu
 
мр нравственное воспитание
мр нравственное воспитаниемр нравственное воспитание
мр нравственное воспитание
Demanessa
 
Wireframes filmographic
Wireframes filmographicWireframes filmographic
Wireframes filmographicDantesAsaf
 
Plain Language Legal Information
Plain Language Legal InformationPlain Language Legal Information
Plain Language Legal Information
Annick Gariépy
 
η παναγία η παρηγορήτισσα
η παναγία η παρηγορήτισσα η παναγία η παρηγορήτισσα
η παναγία η παρηγορήτισσα
paraskevit
 
Tesolcollaborativesitesimages -
Tesolcollaborativesitesimages -Tesolcollaborativesitesimages -
Tesolcollaborativesitesimages -
Brahim Montasir
 

Viewers also liked (20)

Input devices
Input devicesInput devices
Input devices
 
Using Headers and Footers in Word
Using Headers and Footers in WordUsing Headers and Footers in Word
Using Headers and Footers in Word
 
Microsoft Word - Paging, Headers, Footers
Microsoft Word - Paging, Headers, FootersMicrosoft Word - Paging, Headers, Footers
Microsoft Word - Paging, Headers, Footers
 
Ms Access
Ms AccessMs Access
Ms Access
 
Types of computer network
Types of computer networkTypes of computer network
Types of computer network
 
Worksheet Basics & Navigation - Excel 2013 Tutorial
Worksheet Basics & Navigation - Excel 2013 TutorialWorksheet Basics & Navigation - Excel 2013 Tutorial
Worksheet Basics & Navigation - Excel 2013 Tutorial
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Ms access
Ms accessMs access
Ms access
 
Presentation printer
Presentation printerPresentation printer
Presentation printer
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Creech R Resume 101610
Creech R Resume 101610Creech R Resume 101610
Creech R Resume 101610
 
Disease
DiseaseDisease
Disease
 
2007-2008 Student Awards
2007-2008 Student Awards2007-2008 Student Awards
2007-2008 Student Awards
 
Why NextCMS: Layout Editor
Why NextCMS: Layout EditorWhy NextCMS: Layout Editor
Why NextCMS: Layout Editor
 
мр нравственное воспитание
мр нравственное воспитаниемр нравственное воспитание
мр нравственное воспитание
 
Wireframes filmographic
Wireframes filmographicWireframes filmographic
Wireframes filmographic
 
Plain Language Legal Information
Plain Language Legal InformationPlain Language Legal Information
Plain Language Legal Information
 
η παναγία η παρηγορήτισσα
η παναγία η παρηγορήτισσα η παναγία η παρηγορήτισσα
η παναγία η παρηγορήτισσα
 
Elements of a short story
Elements of a short storyElements of a short story
Elements of a short story
 
Tesolcollaborativesitesimages -
Tesolcollaborativesitesimages -Tesolcollaborativesitesimages -
Tesolcollaborativesitesimages -
 

Similar to Biometrics

Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Biometrics
BiometricsBiometrics
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
amee yaami
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Biometrics
BiometricsBiometrics
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
Manoj Kumar
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
AashishTanania
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 

Similar to Biometrics (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 

More from shweta-sharma99 (13)

Biometrics
BiometricsBiometrics
Biometrics
 
Testing
TestingTesting
Testing
 
Sql commands
Sql commandsSql commands
Sql commands
 
Rep on grid computing
Rep on grid computingRep on grid computing
Rep on grid computing
 
Java practical
Java practicalJava practical
Java practical
 
Graphics file
Graphics fileGraphics file
Graphics file
 
Vbreport
VbreportVbreport
Vbreport
 
Software re engineering
Software re engineeringSoftware re engineering
Software re engineering
 
Simplex
SimplexSimplex
Simplex
 
Grid computing
Grid computingGrid computing
Grid computing
 
Cyborg
CyborgCyborg
Cyborg
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Instruction cycle
Instruction cycleInstruction cycle
Instruction cycle
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Biometrics

  • 2. Introduction  Biometrics is the science and technology of measuring and analyzing biological data.  It measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
  • 3. Biometric devices consist of:  A reader or scanning device  Software that converts the scanned information into digital form and compares match points  A database that stores the biometric data for comparison
  • 4. Biometrics can be sorted into two classes:  Categories of BIOMETRICS  Physiological  Examples- face, fingerprints, hand geometry and iris Recognition, DNA.  Behavioral  Examples-signature and voice.
  • 5. Basic characteristics of BIOMETRIC Technologies:  Universality: Every person should have the characteristic. People who are mute or without a fingerprint will need to be accommodated in some way.  Uniqueness: Generally, no two people have identical characteristics. However, identical twins are hard to distinguish.  Permanence: The characteristics should not vary with time. A person's face, for example, may change with age.
  • 6. Collectibility: The characteristics must be easily collectible and measurable.  Performance: The method must deliver accurate results under varied environmental circumstances.  Acceptability: The general public must accept the sample collection routines. Nonintrusive methods are more acceptable.  Circumvention: The technology should be difficult to deceive
  • 7.
  • 8. Working principle:  Biometric devices consist of a reader or scanning device software that converts the gathered information into digital form, and a database that stores the biometric data with comparison with existing records.
  • 9. Modes  Enrollment Mode.  Verification Mode.  Enrollment Mode: A sample of the biometric trait is captured, processed by a computer, and stored for later comparison.  Verification Mode: In this mode biometric system authenticates a person’s claimed identity from their previously enrolled pattern.
  • 10. Biometric Modalities: Fingerprint Recognition:  For fingerprint Recognition look at:  Friction ridges  Core  Crossover  Delta  Island  Ridge Ending  Pore
  • 11.
  • 12.
  • 13. Face Recognition It involves recognizing people by there:  Facial features.  Face geometry.  Principle: Analysis of unique shape, pattern and positioning of facial features.
  • 14.
  • 15. Voice Recognition:  Voice recognition is not the same as speech recognition, it is speaker recognition.  Considered both physiological and behavioral.  Popular and low-cost, but less accurate and sometimes lengthy enrollment.
  • 16.
  • 17. Styles of spoken input: These system have three styles of spoken inputs:  Text Dependent  Text prompted  Text Independent
  • 18. Iris Recognition:  It is the colored area of the eye that surrounds the pupil.  It is a protected internal organ whose random texture is stable throughout life.  The iris patterns are obtained through a video-based image acquisition system .
  • 20. Signature Verification:  Static/Off-line: the conventional way.  Dynamic/On-line: using electronically instrumented device.  Principle: The movement of the pen during the signing process rather than the static image of the signature. Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes.
  • 21. Smart Cards:  These are digital security pocket-sized cards with embedded integrated circuits which can process data.  It can be used for identification,authentication, and data storage.  It can also be used as a medium to provide a means of effecting business transactions in a flexible, secure, standard way with minimal human intervention.
  • 22. Encryption Systems :  Transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  Encryption has long been used by militaries and governments to facilitate secret communication.
  • 23. Performance of BIOMETRICS :  False accept rate or false match rate (FAR or FMR)  False reject rate or false non-match rate (FRR or FNMR)  Relative operating characteristic (ROC)  Equal error rate or crossover error rate (EER or CER)
  • 24. Advantages of Biometrics:  Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly.  Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords) .  Automated biometric identification can be done very rapidly and uniformly, with a minimum of training .  Your identity can be verified without resort to documents that may be stolen, lost or altered.
  • 25. Disadvantages of BIOMETRICS:  The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.  It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time  For people affected with diabetes, the eyes get affected resulting in differences.  Biometrics is an expensive security solution.
  • 26. BIOMETRICS SECURITY:  Security personnel look for biometric data that does not change over the course of your life; that is, they look for physical characteristics that stay constant and that are difficult to fake or change on purpose