SlideShare a Scribd company logo
1 of 36
presentation
on
“BIOMETRICS”
Presented By:
Jagmeet Singh
Jaspal Singh
Mandeep Kaur
Priyanka Sharma
Introduction:
Biometric is the science and technology of
measuring and analyzing the biological data.
It measures and analyze human body
characteristics such as fingerprints, DNA, eye
retinas and irises, voice patterns, facial patterns and
hands measurements for authentication purposes.
Biometric devices consist of:
 A reader or scanning device.
Software that converts the scanned information into
digital form and compares match points.
 A database that stores the biometric data for
comparison.
Biometrics can be sorted into two
classes:
 Physiological:
 Examples: Face recognition,
Fingerprints, Hand geometry,
Iris recognition and DNA.
 Behavioral :
 Examples: Signature and Voice.
Basic Characteristics of BIOMETRIC
Technologies:
Universality: Every person should have the
characteristic.
Uniqueness: Generally, no two people have
identical characteristics.
Permanence: The characteristics should not vary
with time.
Contd..
 Collectability:
 Performance:
 Acceptability:
History of Biometrics:
 The term "biometrics" is derived from the Greek
words bio (life) and metric (to measure).
 The first known example of biometrics in practice
was a form of finger printing being used in China in
the 14th century, as reported by explorer Joao de
Barros. He wrote that the Chinese merchants were
stamping children's palm prints and footprints on
paper with ink to distinguish the young children
from one another.
Working of Biometric System:
Biometrics systems work by recording and
comparing
biometric characteristics.
Biometric devices consist of a reader or scanning
device software that converts the gathered
information into digital form and a database that
stores the biometric data.
Contd..
 All biometric systems works in a four-stage process
that consists of the following steps:
1) Capture: A biometric system collects the sample of
biometric features like fingerprint, voice etc of the
person who wants to login to the system.
2) Extraction: The data extraction is done uniquely
from the sample and a template is created.
Contd..
3.) Comparison: The template is then compared with
a new sample.
4.) Match/non-match: The system then decides
whether
the features extracted from the new sample are a
match or a non-match with the template.
Biometric systems can seem complicated, but they
all use the same three steps:
Enrollment:
Storage:
Comparison:
Modes:
1) Enrollment Mode.
2) Verification Mode.
Biometric Modalities:
1) Fingerprint Recognition
2) Face Recognition
3) Iris Recognition
4) Voice Recognition
5) Smart Cards
6) Encryption Systems
7) Signature Verification
1)Fingerprint Recognition:
Fingerprint Recognition is one of the most used
and familiar biometric methods.
Contd..
 Fingerprint Recognition Technology has many
security application in the real world:
Examples:
 Network/PC Login Security
 Web Page Security
 Employee Recognition Systems
 Time and Attendance Systems
 Voting Solutions
2)Face Recognition:
Face Recognition is a biometric technique for
automatic identification or verification of a person from
a digital image or a video frame from a video source.
3)Iris Recognition:
Iris Recognition is another biometric authentication
method that uses pattern recognition techniques
based on high-resolution images of the irises of an
individual's eyes.
Iris recognition technology has become popular in
security applications because of its ease of use,
accuracy, and safety.
Contd..
 It is the colored area of the eye that surrounds the
pupil.
 It is a protected internal organ whose random
texture is stable throughout life.
 The iris patterns are obtained through a video-
based image acquisition system.
 Iris recognition technology is currently used at
physical access points demanding high
security, such as airports, government
buildings, and research laboratories.
4)Smart Cards:
 Smart Cards are digital security pocket-sized cards
with embedded integrated circuits which can
process data.
 Smart cards can be used for
identification, authentication, and data storage.
 It can also be used as a medium to provide a
means of effecting business transactions in a
flexible, secure, standard way with minimal human
intervention.
5)Encryption Systems:
 It is an encryption technique for transforming
information using an algorithm (called cipher) to
make it unreadable to anyone except those
possessing special knowledge, usually referred to as
a key.
 Encryption has long been used by militaries and
governments to facilitate secret communication.
Contd..
 Encryption Systems can be used to protect data in
transit, for example data being transferred via
networks (e.g. the Internet, e-commerce), mobile
telephones, wireless microphones, wireless
intercom systems, Bluetooth devices and bank
automatic teller machines.
6)Voice Recognition or Speaker
Recognition:
Voice Recognition or Speaker Recognition is a
biometric process of validating a user's claimed
identity using characteristics extracted from their
voices.
Thus voice recognition can be an effective technique
in user authentication and identification.
Popular and low-cost, but less accurate.
7) Signature Verification:
 Biometric signatures are based upon recording
various characteristics of one’s signing style to carry
out the process of identification in the future.
 Amount of pressure employed, angle of
writing, formation of letters and other traits, which
are categorized as behavioral biometrics, form the
basis of biometric signature recognition technology.
Contd…
 Biometric signatures are used in banking and
finance industry in order to restrict duplicate
signature frauds.
 Various government offices and defense
organizations make use of this technology to
prevent the unauthorized access to sensitive data
as well as for user identification.
 The main advantage of this technique is that no
forgery of biometric signatures is possible, as it
involves distinct writing styles of different
individuals.
Issues and Concerns:
 Privacy and Discrimination
 Cancelable Biometrics
 Danger to owners of secured items
 Soft Biometrics
Privacy and Discrimination:
It is possible that data obtained during biometric
enrollment may be used in ways for which the
enrolled individual has not consented.
Most of the people consider biometric devices to be
unsafe for human health.
Cancelable Biometrics:
 If a token or a password is lost or stolen, it can be
replaced by a newer version.
 This is not naturally available in biometrics.
Soft Biometrics:
 Soft biometrics traits are physical and behavioral
human characteristics, which have been derived
from the way human beings normally distinguish.
Danger to owners:
 When thieves cannot get access to secure
properties, there is chance that the thieves will stalk
the property owner to gain access.
 The damage to the owner could be irreversible.
Advantages:
 Increased Security
 Eliminate Problems with Passwords
 Reduce Administrator Costs
 Reduce Fraud
 Link Security to an Individual or Event
Increased Security:
 One of the main reasons for using biometrics is
the increased security it provides.
 This makes security more personal.
 This will eliminate fraud caused by lost or stolen
IDs.
Contd..
2)Eliminate password problems
3)Reduce frauds
4)Link security to an event
5)Reduce administrator costs
Disadvantages:
 The fingerprints of those people working in
Chemical industries are often affected.
 Voice changes.
 It can make mistakes with the dryness or dirty of
the finger’s skin,

More Related Content

What's hot

biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 

What's hot (20)

biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 

Viewers also liked

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowFaithCWorth
 

Viewers also liked (20)

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
biometrics
biometricsbiometrics
biometrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 

Similar to Biometrics

Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 

Similar to Biometrics (20)

Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
Biometric
Biometric Biometric
Biometric
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 

Recently uploaded

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Biometrics

  • 2. Introduction: Biometric is the science and technology of measuring and analyzing the biological data. It measures and analyze human body characteristics such as fingerprints, DNA, eye retinas and irises, voice patterns, facial patterns and hands measurements for authentication purposes.
  • 3. Biometric devices consist of:  A reader or scanning device. Software that converts the scanned information into digital form and compares match points.  A database that stores the biometric data for comparison.
  • 4. Biometrics can be sorted into two classes:  Physiological:  Examples: Face recognition, Fingerprints, Hand geometry, Iris recognition and DNA.  Behavioral :  Examples: Signature and Voice.
  • 5. Basic Characteristics of BIOMETRIC Technologies: Universality: Every person should have the characteristic. Uniqueness: Generally, no two people have identical characteristics. Permanence: The characteristics should not vary with time.
  • 7. History of Biometrics:  The term "biometrics" is derived from the Greek words bio (life) and metric (to measure).  The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century, as reported by explorer Joao de Barros. He wrote that the Chinese merchants were stamping children's palm prints and footprints on paper with ink to distinguish the young children from one another.
  • 8. Working of Biometric System: Biometrics systems work by recording and comparing biometric characteristics. Biometric devices consist of a reader or scanning device software that converts the gathered information into digital form and a database that stores the biometric data.
  • 9. Contd..  All biometric systems works in a four-stage process that consists of the following steps: 1) Capture: A biometric system collects the sample of biometric features like fingerprint, voice etc of the person who wants to login to the system. 2) Extraction: The data extraction is done uniquely from the sample and a template is created.
  • 10. Contd.. 3.) Comparison: The template is then compared with a new sample. 4.) Match/non-match: The system then decides whether the features extracted from the new sample are a match or a non-match with the template.
  • 11. Biometric systems can seem complicated, but they all use the same three steps: Enrollment: Storage: Comparison:
  • 12. Modes: 1) Enrollment Mode. 2) Verification Mode.
  • 13. Biometric Modalities: 1) Fingerprint Recognition 2) Face Recognition 3) Iris Recognition 4) Voice Recognition 5) Smart Cards 6) Encryption Systems 7) Signature Verification
  • 14. 1)Fingerprint Recognition: Fingerprint Recognition is one of the most used and familiar biometric methods.
  • 15.
  • 16. Contd..  Fingerprint Recognition Technology has many security application in the real world: Examples:  Network/PC Login Security  Web Page Security  Employee Recognition Systems  Time and Attendance Systems  Voting Solutions
  • 17. 2)Face Recognition: Face Recognition is a biometric technique for automatic identification or verification of a person from a digital image or a video frame from a video source.
  • 18.
  • 19. 3)Iris Recognition: Iris Recognition is another biometric authentication method that uses pattern recognition techniques based on high-resolution images of the irises of an individual's eyes. Iris recognition technology has become popular in security applications because of its ease of use, accuracy, and safety.
  • 20. Contd..  It is the colored area of the eye that surrounds the pupil.  It is a protected internal organ whose random texture is stable throughout life.  The iris patterns are obtained through a video- based image acquisition system.  Iris recognition technology is currently used at physical access points demanding high security, such as airports, government buildings, and research laboratories.
  • 21. 4)Smart Cards:  Smart Cards are digital security pocket-sized cards with embedded integrated circuits which can process data.  Smart cards can be used for identification, authentication, and data storage.  It can also be used as a medium to provide a means of effecting business transactions in a flexible, secure, standard way with minimal human intervention.
  • 22. 5)Encryption Systems:  It is an encryption technique for transforming information using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  Encryption has long been used by militaries and governments to facilitate secret communication.
  • 23. Contd..  Encryption Systems can be used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines.
  • 24. 6)Voice Recognition or Speaker Recognition: Voice Recognition or Speaker Recognition is a biometric process of validating a user's claimed identity using characteristics extracted from their voices. Thus voice recognition can be an effective technique in user authentication and identification. Popular and low-cost, but less accurate.
  • 25.
  • 26. 7) Signature Verification:  Biometric signatures are based upon recording various characteristics of one’s signing style to carry out the process of identification in the future.  Amount of pressure employed, angle of writing, formation of letters and other traits, which are categorized as behavioral biometrics, form the basis of biometric signature recognition technology.
  • 27. Contd…  Biometric signatures are used in banking and finance industry in order to restrict duplicate signature frauds.  Various government offices and defense organizations make use of this technology to prevent the unauthorized access to sensitive data as well as for user identification.  The main advantage of this technique is that no forgery of biometric signatures is possible, as it involves distinct writing styles of different individuals.
  • 28. Issues and Concerns:  Privacy and Discrimination  Cancelable Biometrics  Danger to owners of secured items  Soft Biometrics
  • 29. Privacy and Discrimination: It is possible that data obtained during biometric enrollment may be used in ways for which the enrolled individual has not consented. Most of the people consider biometric devices to be unsafe for human health.
  • 30. Cancelable Biometrics:  If a token or a password is lost or stolen, it can be replaced by a newer version.  This is not naturally available in biometrics.
  • 31. Soft Biometrics:  Soft biometrics traits are physical and behavioral human characteristics, which have been derived from the way human beings normally distinguish.
  • 32. Danger to owners:  When thieves cannot get access to secure properties, there is chance that the thieves will stalk the property owner to gain access.  The damage to the owner could be irreversible.
  • 33. Advantages:  Increased Security  Eliminate Problems with Passwords  Reduce Administrator Costs  Reduce Fraud  Link Security to an Individual or Event
  • 34. Increased Security:  One of the main reasons for using biometrics is the increased security it provides.  This makes security more personal.  This will eliminate fraud caused by lost or stolen IDs.
  • 35. Contd.. 2)Eliminate password problems 3)Reduce frauds 4)Link security to an event 5)Reduce administrator costs
  • 36. Disadvantages:  The fingerprints of those people working in Chemical industries are often affected.  Voice changes.  It can make mistakes with the dryness or dirty of the finger’s skin,