SlideShare a Scribd company logo
MEANING:
 Biometrics (or biometric authentication)
refers to the identification of humans by
their characteristics or traits. Biometrics is
used in computer science as a form of
identification and access control.
BIOMETRIC HISTORY INDICATES THAT THE SCIENCE DID NOT
ORIGINATE AT A SINGLE PLACE. PEOPLE ALL OVER THE WORLD WERE
USING THE BASICS FOR MAINLY IDENTIFYING INDIVIDUALS FROM
EACH OTHER.
 14TH CENTURY- CHINESE PRACTICE
 1890’S- BERTILLON AGE
 BIOMETRIC HISTORY IN THE RECENT PAST (THREE DECADES) HAS
SEEN DRASTIC ADVANCEMENTS AND THE TECHNOLOGY HAS
MOVED FROM A SINGLE METHOD (FINGERPRINTING) TO MORE
THAN TEN PRUDENT METHODS.
Physiological Characteristics:
Examples:
fingerprint, face recognition, DNA, Palm print,
hand geometry, iris recognition, retina and
odor/scent
 Behavioural Characteristics:
Examples:
typing rhythm, gait, and voice
A BIOMETRIC SYSTEM CAN BE EITHER AN 'IDENTIFICATION'
SYSTEM OR A 'VERIFICATION' (AUTHENTICATION) SYSTEM:
 IDENTIFICATION - ONE TO MANY
 VERIFICATION - ONE TO ONE
BIOMETRIC TECHNOLOGY IS NOW BEING USED IN
ALMOST EVERY AREA.
 Biometric time and attendance systems
 Biometric safes and biometric locks
 biometrics technology in identifying DNA patterns
for identifying criminals
 E-government services
 National security
 Airports, banks
 Recently implemented in ATM’S, VOTING
MACHINES
 ADVANTAGES:
1. CONVENIENCE OF USING YOUR BODY OR A PERSONAL CHARACTERISTIC.
2. THERE IS NO NEED TO REMEMBER SPECIAL CODES/ PASSWORDS.
3. HARDER TO COUNTERFEIT PERSONAL DETAILS
4. ACCURACY
 DISADVANTAGES:
1. BIOMETRIC ELECTRONIC SECURITY SYSTEMS CANNOT BE RESET EASILY.
2. MAY INVADE AN INDIVIDUAL'S PRIVACY.
3. THE ELECTRONIC SECURITY SYSTEM MAY BE FLAWED AND SUDDENLY MAY
NOT RECOGNISE AN INDIVIDUAL.
4. CRIMINALS MAY USE THE INFORMATION STORED.
5. COSTLY
Biometrics

More Related Content

Similar to Biometrics

Anthropometry pps
Anthropometry ppsAnthropometry pps
Anthropometry pps
Dpt Memon
 
Biometrics.pptx
Biometrics.pptxBiometrics.pptx
Biometrics.pptx
BryCunal
 

Similar to Biometrics (8)

Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
 
seminar_report
seminar_reportseminar_report
seminar_report
 
Anthropometry pps
Anthropometry ppsAnthropometry pps
Anthropometry pps
 
Cam Assi Mahi
Cam Assi MahiCam Assi Mahi
Cam Assi Mahi
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics.pptx
Biometrics.pptxBiometrics.pptx
Biometrics.pptx
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 

Biometrics

  • 1.
  • 2. MEANING:  Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control.
  • 3. BIOMETRIC HISTORY INDICATES THAT THE SCIENCE DID NOT ORIGINATE AT A SINGLE PLACE. PEOPLE ALL OVER THE WORLD WERE USING THE BASICS FOR MAINLY IDENTIFYING INDIVIDUALS FROM EACH OTHER.  14TH CENTURY- CHINESE PRACTICE  1890’S- BERTILLON AGE  BIOMETRIC HISTORY IN THE RECENT PAST (THREE DECADES) HAS SEEN DRASTIC ADVANCEMENTS AND THE TECHNOLOGY HAS MOVED FROM A SINGLE METHOD (FINGERPRINTING) TO MORE THAN TEN PRUDENT METHODS.
  • 4. Physiological Characteristics: Examples: fingerprint, face recognition, DNA, Palm print, hand geometry, iris recognition, retina and odor/scent  Behavioural Characteristics: Examples: typing rhythm, gait, and voice
  • 5.
  • 6. A BIOMETRIC SYSTEM CAN BE EITHER AN 'IDENTIFICATION' SYSTEM OR A 'VERIFICATION' (AUTHENTICATION) SYSTEM:  IDENTIFICATION - ONE TO MANY  VERIFICATION - ONE TO ONE
  • 7.
  • 8. BIOMETRIC TECHNOLOGY IS NOW BEING USED IN ALMOST EVERY AREA.  Biometric time and attendance systems  Biometric safes and biometric locks  biometrics technology in identifying DNA patterns for identifying criminals  E-government services  National security  Airports, banks  Recently implemented in ATM’S, VOTING MACHINES
  • 9.
  • 10.  ADVANTAGES: 1. CONVENIENCE OF USING YOUR BODY OR A PERSONAL CHARACTERISTIC. 2. THERE IS NO NEED TO REMEMBER SPECIAL CODES/ PASSWORDS. 3. HARDER TO COUNTERFEIT PERSONAL DETAILS 4. ACCURACY  DISADVANTAGES: 1. BIOMETRIC ELECTRONIC SECURITY SYSTEMS CANNOT BE RESET EASILY. 2. MAY INVADE AN INDIVIDUAL'S PRIVACY. 3. THE ELECTRONIC SECURITY SYSTEM MAY BE FLAWED AND SUDDENLY MAY NOT RECOGNISE AN INDIVIDUAL. 4. CRIMINALS MAY USE THE INFORMATION STORED. 5. COSTLY