SlideShare a Scribd company logo
BIOMETRICS
CONTENTS
ABSTRACT
1. INTRODUCTION
2. BASIC ARCHITECTURE OF BIOMETRIC SYSTEM
3. DIFFERENT BIOMETRIC TECHNOLOGIES
4. APPLICATIONS
5. PROS AND CONS
6. CONCLUSION
7. REFERENCES
BIOMETRICS
ABSTRACT:
Biometrics is the development of statistical and mathematical methods applicable
to data analysis problems in the biological sciences. It is a new method of verifying
authenticity. Biometrics uses biological traits or behavioral characteristics to identify an
individual. A Biometrics system is actually a pattern recognition system that utilizes
various patterns like iris patterns, retina patterns and biological traits like fingerprints,
facial geometry, voice recognition and hand recognition etc. What makes Biometrics
really attractive is the fact that the various security codes like the passwords and the PIN
can be interchanged between people but the physiological traits can’t be.
The current applications of Biometric authentication are
Entry control, ATMs and Government programs. The most obvious use of biometrics for
network security is for secure workstation logons for a workstation connected to a
network. The main use of Biometric network security will be to replace the current
password system. The most popular biometric authentication scheme employed for the
last few years has been Iris Recognition. Many companies are adding biometric
authentication features to their products for e.g. Key ware Technologies LBV (Layered
biometrics verification) Internet toolkit provides high-level security to e-commerce
applications. This toolkit finds use in the area of Internet Banking.
1.INTRODUCTION
The meaning of Biometrics comes from the Greeks. The Greek hybrid of
the words is bio meaning life and metry meaning to measure. The webster’s definition is
the statistical measurement and analysis of biological observations and phenomena. In a
more simpler terms biometrics means using the body as a password.
Now-a-days, Security is no longer a secure word, because of the recent evolutions
in the IT field such as e-commerce, Internet etc., gone are the days where passwords,
authentication were considered as measures for security. To help the security on the Net,
there comes a new era of security namely BIOMETRICS.
Biometric identification is, simply, the technique of verifying a person by a physical
characteristic or personal characteristics.
SIMPLY SPEAKING
Biometrics is personal identification based on
“who are you”
rather than
“ what you have “ or
“ what you know “
2. BASIC ARCHITECTURE OF BIOMETRIC SYSTEM
The working procedure of any biometric system includes the following
three phases.
ENROLLMENT
 Capturing biometric trait using sensor device
 Extracting relevant features to generate template
 Store template in database
VERIFICATION
 Generate template as in enrollment
 Match the template against a specific template
“one-to-one”search(1:1)
 Used for physical or computer access
IDENTIFICATION
 Match done against a set of templates
“one-to-many”search(1:N)
 Used in identifying criminals
3.DIFFERENT BIOMETRIC TECHNOLOGIES
There are a variety of Biometric systems available in the market and each one of them
has its own advantages and disadvantages. The most commonly used Biometric systems
are:
 Fingerprint readers.
 Hand scans.
 Voice authentication system.
 Retina Scans
 Iris scans
 Facial scans
4.APPLICATIONS
Applications that currently uses keys, ID cards, ATM cards, or passwords for verification
purposes has the potential to be converted to a biometrics application. Also, in an age
where highly sensitive personal information can be accessed through several different
remote channels, the need for more accurate and fraud-proof verification methods
becomes large. Below are some of the potential and commercial applications of
biometrics:
 Some of the biggest potential applications include word or PIN, a biometric trait
cannot be lost, stolen, or recreated. This makes biometrics an obvious antidote to
identity theft, a problem that is mushrooming alongside databases of personal
information.
 Banks and others who have tested biometric-based security on their clientele,
however, say consumers overwhelmingly have a pragmatic response to the
technology. Anything that saves the information-overloaded citizen from having
to remember another password or personal identification number comes as a
welcome respite.
 There are also commercial applications for computer access control, access to
web site servers, access through firewalls, and physical access control to protect
sensitive information.
 Finger scan has the world's largest application of biometrics in the servicing of
automated teller machines. There are many law enforcement applications, mostly
for fingerprint recognition, at the Federal, State, and local levels.
The future applications of biometrics are very promising. Biometrics will play a
crucial role in serving the identification needs of our future. Listed below are some
potential future verification applications of biometrics:
 Voter Registration-verify identity at the polls to prevent fraudulent voting.
 In-store and Online purchases- eliminate the need for credit cards to make in-store
purchases.
5.PROS AND CONS
PROS:
1.Biometric attributes are unique and these can’t be faked or interchanged so, this
uniqueness imparts a high level security to these systems. Using an inherent trait of the
individual ensures that the person is who he claims to be he is.
2. There is no need for remembering passwords, PIN’s etc and this convenience gives an
edge to Biometrics. Thus, biometric logins ensure that the person who has logged on is
not assuming a fake identity.
3. Though someone else’s user ID and password can be stolen, his unique biological
attributes can’t be and this gives an extra boost to this new technique.
4.This reduces the problems of the IT helpdesk at many workstations because passwords
can be done without and these are the ones that overburden the helpdesk with work.
CONS:
Biometric systems are very expensive because, not only the costs for the acqusition of the
software and hardware costly but the integration of these in the networks are even more
costly. These high costs are coupled with the fact that the returns aren’t highly
encouraging. So, people are not ready to pool in so much money to utilize the latest
technology that is available in the market.
 It is an “ all or none “ technology, i.e. we set up biometric authentication features
etc but if we permit the person for a remote login then there is no use
incorporating this technology in the network.
 Like every new technology, Biometrics has a low user acceptance rate.
 People consider it to be an invasion of their privacy and thus, it hasn’t been
exploited to its full potential. They don’t realize the fact that a Biometric system
does not copy their fingerprints or any other attributes but goes for a mathematical
representation of these attributes that are unique to each person.
 Even though full secrecy is maintained regarding these attributes, even if they get
leaked out once, they can be used in exploiting various other areas, like to get
credit card and medical information, in banking security systems etc. Even
though different biometric systems are highly incompatible with each other, their
exploitation may ruin the life of the person who trusted this technology.
 Sometimes, a genuine person maybe restricted access to the network and this is
very commonly seen in voice recognition patterns where something as small as
cold could have the person’s access rejected.
 Like all systems, even a Biometric system is not foolproof and has its own flaws
and can sometimes allow a person who has assumed a fake identity into the
network.
Biometric template data consume more space than the conventional user ID/password
combinations.
6.CONCLUSION
Just like every other technology, Biometrics will take some time to be
incorporated into networks all over but first, the flaws that it has got ought to be corrected
so as to make this technology useful and available to all. The massive disadvantages like
pricing, lower acceptance rate etc should be corrected and this would lead to more use of
this system to impart high-level security to the network. If all these things are worked
upon, then Biometrics could be exploited completely. It will take some time for it to
catch up with the customers but as they say. EVERY GOOD THING HAS A LONG
GESTATION PERIOD. We only have to wait and watch.
7.REFERENCES
 www.zdnet.com
 www.iscit.surfnet.nl
 www.iriscan.com
 www.biometric.cse.msu.edu
 www.biometrics.org
 www.sciencedaily.com

More Related Content

What's hot

Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
Tanvir Ahmed
 
Privacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsPrivacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric Systems
Francesco Bonadiman
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
Jorge Sebastiao
 
Ai
AiAi
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
Ping Identity
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
proma_goswami
 
Hazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in PracticeHazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in Practice
ITIIIndustries
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
Siddharth Kishan
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
IJNSA Journal
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
Cigniti Technologies Ltd
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
vishal dineshkumar soni
 
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final versionIJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final versionHagai Aronowitz
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
ijtsrd
 

What's hot (18)

Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
 
Privacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsPrivacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric Systems
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Ai
AiAi
Ai
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
Hazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in PracticeHazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in Practice
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final versionIJCB2014 Multi Modal Biometrics for Mobile Authentication final version
IJCB2014 Multi Modal Biometrics for Mobile Authentication final version
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 

Similar to Biometrics

Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 
What Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfWhat Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdf
Bahaa Abdulhadi
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
Bahaa Abdulhadi
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
Waseelsultan
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
Bahaa Abdulhadi
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
Kayla Perry
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Harikrishna Patel
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
danas19
 
Final report
Final reportFinal report
Final report
Pranjul Mishra
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
Bahaa Abdulhadi
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
Tony Adjuder, C.P.S.
 
Biometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaBiometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaPauline Wamere
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
Enterprise Wired
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
Abduhalim Beknazarov
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
ijtsrd
 

Similar to Biometrics (20)

Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
 
What Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdfWhat Are Biometric Cryptosystems.pdf
What Are Biometric Cryptosystems.pdf
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Final report
Final reportFinal report
Final report
 
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdfThe Rise of Behavioral Biometrics and Its Potential Applications.pdf
The Rise of Behavioral Biometrics and Its Potential Applications.pdf
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaBiometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in Kenya
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Biometrics

  • 2. CONTENTS ABSTRACT 1. INTRODUCTION 2. BASIC ARCHITECTURE OF BIOMETRIC SYSTEM 3. DIFFERENT BIOMETRIC TECHNOLOGIES 4. APPLICATIONS 5. PROS AND CONS 6. CONCLUSION 7. REFERENCES
  • 3. BIOMETRICS ABSTRACT: Biometrics is the development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. It is a new method of verifying authenticity. Biometrics uses biological traits or behavioral characteristics to identify an individual. A Biometrics system is actually a pattern recognition system that utilizes various patterns like iris patterns, retina patterns and biological traits like fingerprints, facial geometry, voice recognition and hand recognition etc. What makes Biometrics really attractive is the fact that the various security codes like the passwords and the PIN can be interchanged between people but the physiological traits can’t be. The current applications of Biometric authentication are Entry control, ATMs and Government programs. The most obvious use of biometrics for network security is for secure workstation logons for a workstation connected to a network. The main use of Biometric network security will be to replace the current password system. The most popular biometric authentication scheme employed for the last few years has been Iris Recognition. Many companies are adding biometric authentication features to their products for e.g. Key ware Technologies LBV (Layered biometrics verification) Internet toolkit provides high-level security to e-commerce applications. This toolkit finds use in the area of Internet Banking.
  • 4. 1.INTRODUCTION The meaning of Biometrics comes from the Greeks. The Greek hybrid of the words is bio meaning life and metry meaning to measure. The webster’s definition is the statistical measurement and analysis of biological observations and phenomena. In a more simpler terms biometrics means using the body as a password. Now-a-days, Security is no longer a secure word, because of the recent evolutions in the IT field such as e-commerce, Internet etc., gone are the days where passwords, authentication were considered as measures for security. To help the security on the Net, there comes a new era of security namely BIOMETRICS. Biometric identification is, simply, the technique of verifying a person by a physical characteristic or personal characteristics. SIMPLY SPEAKING Biometrics is personal identification based on “who are you” rather than “ what you have “ or “ what you know “
  • 5. 2. BASIC ARCHITECTURE OF BIOMETRIC SYSTEM The working procedure of any biometric system includes the following three phases. ENROLLMENT  Capturing biometric trait using sensor device  Extracting relevant features to generate template  Store template in database VERIFICATION  Generate template as in enrollment  Match the template against a specific template “one-to-one”search(1:1)  Used for physical or computer access
  • 6. IDENTIFICATION  Match done against a set of templates “one-to-many”search(1:N)  Used in identifying criminals
  • 7. 3.DIFFERENT BIOMETRIC TECHNOLOGIES There are a variety of Biometric systems available in the market and each one of them has its own advantages and disadvantages. The most commonly used Biometric systems are:  Fingerprint readers.  Hand scans.  Voice authentication system.  Retina Scans  Iris scans  Facial scans
  • 8. 4.APPLICATIONS Applications that currently uses keys, ID cards, ATM cards, or passwords for verification purposes has the potential to be converted to a biometrics application. Also, in an age where highly sensitive personal information can be accessed through several different remote channels, the need for more accurate and fraud-proof verification methods becomes large. Below are some of the potential and commercial applications of biometrics:  Some of the biggest potential applications include word or PIN, a biometric trait cannot be lost, stolen, or recreated. This makes biometrics an obvious antidote to identity theft, a problem that is mushrooming alongside databases of personal information.  Banks and others who have tested biometric-based security on their clientele, however, say consumers overwhelmingly have a pragmatic response to the technology. Anything that saves the information-overloaded citizen from having to remember another password or personal identification number comes as a welcome respite.  There are also commercial applications for computer access control, access to web site servers, access through firewalls, and physical access control to protect sensitive information.  Finger scan has the world's largest application of biometrics in the servicing of automated teller machines. There are many law enforcement applications, mostly for fingerprint recognition, at the Federal, State, and local levels. The future applications of biometrics are very promising. Biometrics will play a crucial role in serving the identification needs of our future. Listed below are some potential future verification applications of biometrics:  Voter Registration-verify identity at the polls to prevent fraudulent voting.  In-store and Online purchases- eliminate the need for credit cards to make in-store purchases.
  • 9. 5.PROS AND CONS PROS: 1.Biometric attributes are unique and these can’t be faked or interchanged so, this uniqueness imparts a high level security to these systems. Using an inherent trait of the individual ensures that the person is who he claims to be he is. 2. There is no need for remembering passwords, PIN’s etc and this convenience gives an edge to Biometrics. Thus, biometric logins ensure that the person who has logged on is not assuming a fake identity. 3. Though someone else’s user ID and password can be stolen, his unique biological attributes can’t be and this gives an extra boost to this new technique. 4.This reduces the problems of the IT helpdesk at many workstations because passwords can be done without and these are the ones that overburden the helpdesk with work. CONS: Biometric systems are very expensive because, not only the costs for the acqusition of the software and hardware costly but the integration of these in the networks are even more costly. These high costs are coupled with the fact that the returns aren’t highly encouraging. So, people are not ready to pool in so much money to utilize the latest technology that is available in the market.  It is an “ all or none “ technology, i.e. we set up biometric authentication features etc but if we permit the person for a remote login then there is no use incorporating this technology in the network.
  • 10.  Like every new technology, Biometrics has a low user acceptance rate.  People consider it to be an invasion of their privacy and thus, it hasn’t been exploited to its full potential. They don’t realize the fact that a Biometric system does not copy their fingerprints or any other attributes but goes for a mathematical representation of these attributes that are unique to each person.  Even though full secrecy is maintained regarding these attributes, even if they get leaked out once, they can be used in exploiting various other areas, like to get credit card and medical information, in banking security systems etc. Even though different biometric systems are highly incompatible with each other, their exploitation may ruin the life of the person who trusted this technology.  Sometimes, a genuine person maybe restricted access to the network and this is very commonly seen in voice recognition patterns where something as small as cold could have the person’s access rejected.  Like all systems, even a Biometric system is not foolproof and has its own flaws and can sometimes allow a person who has assumed a fake identity into the network. Biometric template data consume more space than the conventional user ID/password combinations.
  • 11. 6.CONCLUSION Just like every other technology, Biometrics will take some time to be incorporated into networks all over but first, the flaws that it has got ought to be corrected so as to make this technology useful and available to all. The massive disadvantages like pricing, lower acceptance rate etc should be corrected and this would lead to more use of this system to impart high-level security to the network. If all these things are worked upon, then Biometrics could be exploited completely. It will take some time for it to catch up with the customers but as they say. EVERY GOOD THING HAS A LONG GESTATION PERIOD. We only have to wait and watch. 7.REFERENCES  www.zdnet.com  www.iscit.surfnet.nl  www.iriscan.com  www.biometric.cse.msu.edu  www.biometrics.org  www.sciencedaily.com