SlideShare a Scribd company logo
BIOMETRICS
PRESENTED BY
VISHWAJEET & ADOTHU RAMBABU
ROLL NO – 467/11 & 537/11
NATIONAL INSTITUTE OF TECHNOLOGY
JAMSHEDPUR, INDIA – 831014
INTRODUCTION
 Biometrics refers to the automatic identification of a
person based on his or her physiological or behavioral
characteristics.
 Biometrics is an accurate method of authentication that
uses the physiological and biological traits of a person to
verify and establish their identity.
PHYSIOLOGICAL AND/OR BEHAVIORAL
CHARACTERISTICS
 Behavioral:
 Voice
 Keystroke
 Signature
 Physiological:
 Fingerprint
 Hand
 Eyes (Iris , Retina)
 DNA
 Face
BIOMETRICS
BIOMETRICS: WHY?
 Eliminate memorization –
◦ Users don’t have to memorize features of their voice, face, eyes, or fingerprints
 Eliminate misplaced tokens –
◦ Users won’t forget to bring fingerprints to work
 Can’t be delegated –
◦ Users can’t lend fingers or faces to someone else
 Often unique –
◦ Save money and maintain database integrity by eliminating duplicate enrollments
WORKING OF BIOMETRICS TECHNOLOGY
ALL BIOMETRIC SYSTEMS WORKS IN A FOUR-STAGE PROCESS THAT CONSISTS OF
THE FOLLOWING STEPS:
• CAPTURE : A Biometric system collects the sample of biometric features like
fingerprint, voice etc of the person who wants to login to the system.
• EXTRACTION: The data extraction is done uniquely from the sample and a template is
created. Unique features are then extracted by the system and converted into a digital
biometric code. This sample is then stored as the biometric template for that individual.
• COMPARISON: The template is then compared with a new sample. The biometric data
are then stored as the biometric template or template or reference template for that
person.
• MATCH/NON-MATCH: The system then decides whether the features extracted from the
new sample are a match or a non-match with the template.
SIGNATURE SCAN
 Measures speed, pressure, stroke order an image of signature.
 Non-repudiation
 Mainly used for verification
# PROBLEMS:
 Forgers could reproduce
VOICE VERIFICATION
Measures the sound waves of human speech.
 pitch, intensity, quality and duration.
 user talks to a microphone a passphrase.
 voice print is compare to a previous one.
#PROBLEMS:
 include background noise
KEYSTROKE SCAN
Measures the time between strokes and duration of key pressed.
 Most commonly used in systems where
keyboard is already being used.
FINGER PRINT RECOGNITION
Fingerprint verify the authenticity of the individual.
Among all the biometric techniques, fingerprint-based identification is the oldest
method that has been successfully used in numerous applications.
Everyone is known to have unique, immutable
fingerprints. A fingerprint is made of a series of
ridges and furrows on the surface of the finger.
# Advantage:
Low storage space required compared to
other ones.
RETINA RECOGNITION
 Scan the retina to authenticate the identity of a person.
 Unique to each person.
 Unique to each eye.
 Highly reliable because no two people have
the same retinal pattern.
# Problems:
1. It has extremely low acceptance rate .
2. Measurement accuracy can be affected by a disease
3. Not very user friendly
FACIAL RECOGNITION
 Location and position of facial features.
 Distance between the eyes.
 Distance between the eyes and nose ridge.
 Angle of a cheek.
 Slope of the nose.
 Facial temperatures.
HAND SCAN
Typical systems measure 90 different features:
 Overall hand and finger width
 Distance between joints
 Bone structure
Primarily for access control:
 Machine rooms
 Olympics
Strengths:
 No negative connotations – non-intrusive
 Reasonably robust systems
Weaknesses:
 Accuracy is limited; can only be used for 1-to-1 verification
 Bulky scanner
TEMPLATE SIZE
Biometric Approx. Template Size
Voice 70k – 80k
Face 84 bytes – 2k
Signature 500 bytes – 1000 bytes
Fingerprint 256 bytes – 1.2k
Hand Geometry 9 bytes
Iris 256 bytes – 512 bytes
Retina 96 bytes
Advantages :
 Biometric attributes are unique and these can’t be faked or interchanged so,
this uniqueness imparts a high level security to these systems.
 There is no need for remembering passwords, pin’s etc.
Disadvantages :
 Biometric template data consume more space than the conventional user
id/password combinations.
Advantages & Disadvantages
APPLICATIONS
Commercial
 Computer login
 Electronic payment
 ATMS
Government
 Passport control
Forensic
 Missing persons
 Criminal investigations
BIOMETRIC MARKET SHARE
References
 Biometrics.gov.
http://www.biometrics.gov/ReferenceRoom/Introduction.aspx
 Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition."
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1
(2004): 4-20. IEEE Xplore.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027
 Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer.
http://libcat.clemson.edu/record=b2478857
 Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction
Evaluating Biometric Systems." Computer 33.2 (2000): 56-63. IEEE Xplore.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=820040
 http://bprl.cs.clemson.edu/about.html
 http://bprl.cs.clemson.edu/projects.html
Thank you

More Related Content

What's hot

Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
parmsidhu
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
amee yaami
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
Amit Pandey
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
Ritesh Kumar Bhanu
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
Ravi Kumar
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
Chill Chaithanya
 
Biometrics
BiometricsBiometrics
Biometrics
Rameesha Sadaqat
 
Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
 
Biometrics
BiometricsBiometrics
Biometrics
anoop80686
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
Leonardo Antichi
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
ajith chandran
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
Abhishek Mishra
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
sachin yadav
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
Tony Adjuder, C.P.S.
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 

What's hot (20)

Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 

Similar to Biometrics

Biometrics
BiometricsBiometrics
Biometrics
Shivani Gautam
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptxBiometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptx
HabiburRahmanZihad20
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Biometric
Biometric Biometric
Biometric
Vinay Gupta
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Bio shiv
Bio shivBio shiv
Bio shiv
Shivank Garg
 
Access Control
Access ControlAccess Control
Access Control
Waseem Hamid Hussain
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
Mewar University
 
Biometrics
BiometricsBiometrics
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
SureshKumarMaurya5
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
AashishTanania
 
biometrics
biometricsbiometrics
biometrics
Akhil Kumar
 

Similar to Biometrics (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptxBiometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Access Control
Access ControlAccess Control
Access Control
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
biometrics
biometricsbiometrics
biometrics
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

Biometrics

  • 1. BIOMETRICS PRESENTED BY VISHWAJEET & ADOTHU RAMBABU ROLL NO – 467/11 & 537/11 NATIONAL INSTITUTE OF TECHNOLOGY JAMSHEDPUR, INDIA – 831014
  • 2. INTRODUCTION  Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics.  Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity.
  • 3. PHYSIOLOGICAL AND/OR BEHAVIORAL CHARACTERISTICS  Behavioral:  Voice  Keystroke  Signature  Physiological:  Fingerprint  Hand  Eyes (Iris , Retina)  DNA  Face
  • 5. BIOMETRICS: WHY?  Eliminate memorization – ◦ Users don’t have to memorize features of their voice, face, eyes, or fingerprints  Eliminate misplaced tokens – ◦ Users won’t forget to bring fingerprints to work  Can’t be delegated – ◦ Users can’t lend fingers or faces to someone else  Often unique – ◦ Save money and maintain database integrity by eliminating duplicate enrollments
  • 6. WORKING OF BIOMETRICS TECHNOLOGY ALL BIOMETRIC SYSTEMS WORKS IN A FOUR-STAGE PROCESS THAT CONSISTS OF THE FOLLOWING STEPS: • CAPTURE : A Biometric system collects the sample of biometric features like fingerprint, voice etc of the person who wants to login to the system. • EXTRACTION: The data extraction is done uniquely from the sample and a template is created. Unique features are then extracted by the system and converted into a digital biometric code. This sample is then stored as the biometric template for that individual. • COMPARISON: The template is then compared with a new sample. The biometric data are then stored as the biometric template or template or reference template for that person. • MATCH/NON-MATCH: The system then decides whether the features extracted from the new sample are a match or a non-match with the template.
  • 7. SIGNATURE SCAN  Measures speed, pressure, stroke order an image of signature.  Non-repudiation  Mainly used for verification # PROBLEMS:  Forgers could reproduce
  • 8. VOICE VERIFICATION Measures the sound waves of human speech.  pitch, intensity, quality and duration.  user talks to a microphone a passphrase.  voice print is compare to a previous one. #PROBLEMS:  include background noise
  • 9. KEYSTROKE SCAN Measures the time between strokes and duration of key pressed.  Most commonly used in systems where keyboard is already being used.
  • 10. FINGER PRINT RECOGNITION Fingerprint verify the authenticity of the individual. Among all the biometric techniques, fingerprint-based identification is the oldest method that has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. # Advantage: Low storage space required compared to other ones.
  • 11. RETINA RECOGNITION  Scan the retina to authenticate the identity of a person.  Unique to each person.  Unique to each eye.  Highly reliable because no two people have the same retinal pattern. # Problems: 1. It has extremely low acceptance rate . 2. Measurement accuracy can be affected by a disease 3. Not very user friendly
  • 12. FACIAL RECOGNITION  Location and position of facial features.  Distance between the eyes.  Distance between the eyes and nose ridge.  Angle of a cheek.  Slope of the nose.  Facial temperatures.
  • 13. HAND SCAN Typical systems measure 90 different features:  Overall hand and finger width  Distance between joints  Bone structure Primarily for access control:  Machine rooms  Olympics Strengths:  No negative connotations – non-intrusive  Reasonably robust systems Weaknesses:  Accuracy is limited; can only be used for 1-to-1 verification  Bulky scanner
  • 14. TEMPLATE SIZE Biometric Approx. Template Size Voice 70k – 80k Face 84 bytes – 2k Signature 500 bytes – 1000 bytes Fingerprint 256 bytes – 1.2k Hand Geometry 9 bytes Iris 256 bytes – 512 bytes Retina 96 bytes
  • 15. Advantages :  Biometric attributes are unique and these can’t be faked or interchanged so, this uniqueness imparts a high level security to these systems.  There is no need for remembering passwords, pin’s etc. Disadvantages :  Biometric template data consume more space than the conventional user id/password combinations. Advantages & Disadvantages
  • 16. APPLICATIONS Commercial  Computer login  Electronic payment  ATMS Government  Passport control Forensic  Missing persons  Criminal investigations
  • 18. References  Biometrics.gov. http://www.biometrics.gov/ReferenceRoom/Introduction.aspx  Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition." IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1 (2004): 4-20. IEEE Xplore. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027  Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer. http://libcat.clemson.edu/record=b2478857  Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction Evaluating Biometric Systems." Computer 33.2 (2000): 56-63. IEEE Xplore. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=820040  http://bprl.cs.clemson.edu/about.html  http://bprl.cs.clemson.edu/projects.html