SlideShare a Scribd company logo
BIOMETRICS
CONTENTS
• Introduction.
• Security And Authentication.
• Methods Of Verification.
• Identification.
• Verification.
• Advantages.
• Limitations.
• Conclusion.
Introduction
“Biometrics” is an advances technology for
superb security and authentication.
The term “Bio” means biological study and
“metrics” means measurement.
There are Two security
methodologies In Biometrics.
• Token Based Security .
• Secret Based Security.
Security And Authentication
• Permissions.
• Permission Hierarchy.
Permission Hierarchy
System administrator
Database Owners
Database Object Owners
Database Users
Methods Of Verification
• PSYCHOLOGICAL VERIFICATION .
• BEHAVOURAL VERIFICATION.
Psychological Verification
• Psychological Verification involves in the
verification of the organs of the human
being, which will have unique identification
and does not match with others.
Types Of Psychological Verification
• Finger print.
• Hand Print.
• Face Measurement.
• Retinal Scan.
• DNA analysis.
Finger Print
It involves the user placing his
finger over a glass-plate,which
resides over a high resolution
camera ,which uses optical or
electromagnetic means to take its
snapshot.
Hand Print
It compares a 3D image of the
users hand to that present in the
system database.It is similar to
the finger print verification.
Face Measurement
This technique enables the
computer to use your face as your
password and matching these to
an existing database.
Retinal Scan
The retina is an internal part of the
eye located at the back of the eye
and is get of thin nerve which
sense the light coming through a
camera ,pupil eye lenses.
DNA analysis
It is used to identify people who
are died, to find out the
relationship like identifying child's
natural parents
Behavioral Verification
• This involves in oral thing done by the
individual .
• There are three types of behavioral
verification.
• Typing
• Signature
• Voice
Typing
Some systems measure things
you do in addition to the things
you are, you will notice that your
typing has a certain pattern. Some
letters follow others in quick
succession, while others take
longer.
Signature
Some qualities looked into include
acceleration rates, direction, and
pressure and stroke length. Here
mainly concentrate on pressures.
This pressure stored in back end
for future signification.
Voice
It involves in the recognition of the
voice of the individual.
Mixed form Biometrics
Some times use more than one
form biometrics. This mixed form
provide more security. Here
combine more than one type. Even
80% equals with database then
access provide to user.
Identification
It is a process of recognition and
involves taking the biometrics
data and searching for the match
in the database asking it a slow
process that it is more prone to
errors.
->Authentication
->FAR
->FRR
Advantages
• It provides good security mechanism than
other security methods.
• It never fails in security constraints.
• In public locations such as banks and
airports a large number of people transit
every day including known criminals. Face
recognition system attached to video
surveillance systems are supposed to help
catch them.
Limitations
• It needs high memory space in the back
end.
• Collect data for security is difficult.
• Some times fails the security with right
users.
• Any time data loose in database high
effect for security mechanisms.
• So many requirements are needed for
provide this technology
• it highly expensive.
Conclusion
Security is not just about putting
big locks on the front door; it also
involves making sure all the
windows are shut. Each one can
be individually fooled , but the
comparison makes the system
more secure as a whole.
Biometrics are have its own
advantages and disadvantages.it
high expensive but it provides
high security.

More Related Content

What's hot

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Biometric
Biometric Biometric
Biometric
Vinay Gupta
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
CTIN
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
Mayank Sachan
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
s-mueller
 
Biometrics
BiometricsBiometrics
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
newbie2019
 
Biometrics
BiometricsBiometrics
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structure
ijcsit
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
Zaid Shabbir
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
Shah Mohammad Miraz
 
Database Security
Database SecurityDatabase Security
Database Security
Ferdous Pathan
 
Database security
Database securityDatabase security
Database security
afzaalkhalid1
 
Threats
ThreatsThreats
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injection
A. Shamel
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
Information Technology
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
Health IT Conference – iHT2
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
AashishTanania
 

What's hot (20)

Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Biometric
Biometric Biometric
Biometric
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
 
Biometrics
BiometricsBiometrics
Biometrics
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Biometrics
BiometricsBiometrics
Biometrics
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structure
 
Biometrics
BiometricsBiometrics
Biometrics
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Database Security
Database SecurityDatabase Security
Database Security
 
Database security
Database securityDatabase security
Database security
 
Threats
ThreatsThreats
Threats
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injection
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 

Similar to Biometrics

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
shivagreenevv
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
Mayank Raiborde
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
Vignesh Ravichandran
 
Biometrics and Identity management
Biometrics and Identity managementBiometrics and Identity management
Biometrics and Identity management
MyAssignmenthelp.com
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
Importance of Biometrics data security.pdf
Importance of Biometrics data security.pdfImportance of Biometrics data security.pdf
Importance of Biometrics data security.pdf
SarahLee434084
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Seetu
SeetuSeetu
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Biometrics
BiometricsBiometrics
Biometrics
biometrics12
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
Arsalan Mohammad
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
 

Similar to Biometrics (20)

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Biometrics and Identity management
Biometrics and Identity managementBiometrics and Identity management
Biometrics and Identity management
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Importance of Biometrics data security.pdf
Importance of Biometrics data security.pdfImportance of Biometrics data security.pdf
Importance of Biometrics data security.pdf
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Seetu
SeetuSeetu
Seetu
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 

More from Raga Deepthi

Improving utilization of infrastructure clouds
Improving utilization of infrastructure cloudsImproving utilization of infrastructure clouds
Improving utilization of infrastructure clouds
Raga Deepthi
 
Group Discussions
Group DiscussionsGroup Discussions
Group Discussions
Raga Deepthi
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
Raga Deepthi
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Raga Deepthi
 
Image Processing
Image ProcessingImage Processing
Image Processing
Raga Deepthi
 
Image processing
Image processingImage processing
Image processing
Raga Deepthi
 
blue eye technology
blue eye technologyblue eye technology
blue eye technology
Raga Deepthi
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
Raga Deepthi
 
Humanoid robot
Humanoid robotHumanoid robot
Humanoid robot
Raga Deepthi
 
5pen pc Technology
5pen pc Technology5pen pc Technology
5pen pc Technology
Raga Deepthi
 
Artifial intelligence
Artifial intelligenceArtifial intelligence
Artifial intelligence
Raga Deepthi
 

More from Raga Deepthi (11)

Improving utilization of infrastructure clouds
Improving utilization of infrastructure cloudsImproving utilization of infrastructure clouds
Improving utilization of infrastructure clouds
 
Group Discussions
Group DiscussionsGroup Discussions
Group Discussions
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
Image processing
Image processingImage processing
Image processing
 
blue eye technology
blue eye technologyblue eye technology
blue eye technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Humanoid robot
Humanoid robotHumanoid robot
Humanoid robot
 
5pen pc Technology
5pen pc Technology5pen pc Technology
5pen pc Technology
 
Artifial intelligence
Artifial intelligenceArtifial intelligence
Artifial intelligence
 

Recently uploaded

Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 

Recently uploaded (20)

Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 

Biometrics

  • 2. CONTENTS • Introduction. • Security And Authentication. • Methods Of Verification. • Identification. • Verification. • Advantages. • Limitations. • Conclusion.
  • 3. Introduction “Biometrics” is an advances technology for superb security and authentication. The term “Bio” means biological study and “metrics” means measurement.
  • 4. There are Two security methodologies In Biometrics. • Token Based Security . • Secret Based Security.
  • 5. Security And Authentication • Permissions. • Permission Hierarchy.
  • 6. Permission Hierarchy System administrator Database Owners Database Object Owners Database Users
  • 7. Methods Of Verification • PSYCHOLOGICAL VERIFICATION . • BEHAVOURAL VERIFICATION.
  • 8. Psychological Verification • Psychological Verification involves in the verification of the organs of the human being, which will have unique identification and does not match with others.
  • 9. Types Of Psychological Verification • Finger print. • Hand Print. • Face Measurement. • Retinal Scan. • DNA analysis.
  • 10. Finger Print It involves the user placing his finger over a glass-plate,which resides over a high resolution camera ,which uses optical or electromagnetic means to take its snapshot.
  • 11.
  • 12. Hand Print It compares a 3D image of the users hand to that present in the system database.It is similar to the finger print verification.
  • 13. Face Measurement This technique enables the computer to use your face as your password and matching these to an existing database.
  • 14.
  • 15. Retinal Scan The retina is an internal part of the eye located at the back of the eye and is get of thin nerve which sense the light coming through a camera ,pupil eye lenses.
  • 16.
  • 17. DNA analysis It is used to identify people who are died, to find out the relationship like identifying child's natural parents
  • 18. Behavioral Verification • This involves in oral thing done by the individual . • There are three types of behavioral verification. • Typing • Signature • Voice
  • 19. Typing Some systems measure things you do in addition to the things you are, you will notice that your typing has a certain pattern. Some letters follow others in quick succession, while others take longer.
  • 20. Signature Some qualities looked into include acceleration rates, direction, and pressure and stroke length. Here mainly concentrate on pressures. This pressure stored in back end for future signification.
  • 21. Voice It involves in the recognition of the voice of the individual.
  • 22. Mixed form Biometrics Some times use more than one form biometrics. This mixed form provide more security. Here combine more than one type. Even 80% equals with database then access provide to user.
  • 23.
  • 24. Identification It is a process of recognition and involves taking the biometrics data and searching for the match in the database asking it a slow process that it is more prone to errors. ->Authentication ->FAR ->FRR
  • 25. Advantages • It provides good security mechanism than other security methods. • It never fails in security constraints. • In public locations such as banks and airports a large number of people transit every day including known criminals. Face recognition system attached to video surveillance systems are supposed to help catch them.
  • 26. Limitations • It needs high memory space in the back end. • Collect data for security is difficult. • Some times fails the security with right users. • Any time data loose in database high effect for security mechanisms. • So many requirements are needed for provide this technology • it highly expensive.
  • 27. Conclusion Security is not just about putting big locks on the front door; it also involves making sure all the windows are shut. Each one can be individually fooled , but the comparison makes the system more secure as a whole. Biometrics are have its own advantages and disadvantages.it high expensive but it provides high security.