SlideShare a Scribd company logo
BIOMETRICS
Table of Content
 Introduction
 History
 Importance of Biometrics
 Characteristics
 Biometrics Process
 Application of Biometrics
 Advantages & Disadvantages
 Future Prospects
 Conclusion
Introduction
 Biometrics is the science of technology of measuring and analyzing biological
data.
 Biometrics are automated methods of recognizing a person based on
physiological behavioral characteristics.
 As the level of security decreases and transaction fraud increases, the need for
highly secure identification and personal verification technologies is more.
 Biometrics-based solutions are able to provide for confidential financial
transactions and personal data privacy.
History
 The term “Biometrics” is derived from the Greek words bio (life) and metric(to
measure).
 The first known example of biometrics in practice was a form of finger printing
being used in China in the 14th century by “joao de barros”.
 In the 1890’s, “Bertillonage” a method of bodily measurement was used by police
authorities.
 The police then used finger printing, which was developed by Richard Edward
Henry of Scotland yard.
Importance of Biometrics
 The security is needed in every place.
 Reduce the existing problems, like those which can be taken, stolen, borrowed are
even forgotten.
 Improves convenience, security and privacy.
 The first and most critical link in the security chain.
 Presented to counteract security threats.
Characteristics
There are two characteristics of biometrics.
 Physical
 Behavioral
The common physical characteristics are:
 Finger Print
 Face
 Retina
 Iris
 Hand Geometry
Characteristics
The Behavioral characteristics are:
 Voice
 Keystroke Dynamics
 Signature Dynamics
Physical Biometrics
Finger Print
A fingerprint in its narrow sense is an
impression left by the friction ridges of a
human finger.
Fingerprint recognization is possible using
the finger scanner.
A fingerprint scanner has two basic
jobs.(get an image, matches pattern of
prescanned images)
Face
The identification of a person by their
facial image characteristics.
Matching algorithm uses the location and
shape of facial attributes.
Retina
Every eye has its own totally unique
pattern of blood vessels.
Retina scan machines are fairly
expensive.
Physical Characteristics
Iris
The iris is the colored ring of textured
tissue that surrounds the pupil of the
eyes.
Iris identification uses the unique
pattern of its texture to recognize an
individual.
Hand Geometry
This method uses hand images for
person identification.
Person using identification hand
geometry utilizes hand images to
extract a number of features such as
finger length, width, thickness and
finger area etc.
Behavioral Characteristics
Voice
Voice recognition is the
identification using the acoustic
features of speech that have been
found to differ between individuals.
Keystroke Dynamics
It is a method of verifying the
identity of an individual by their
typing rhythm which can cope
with trained typists.
Verify the user with the stored
template.
Signature Dynamics
The analysis of how an individual
signatures.
The process used by a biometric
system to verify a signature is called
dynamic signature verification.
Comparison of Biometric Type
Biometric Type Accuracy Easy to Use User Acceptance
Fingerprint High Medium Low
Hand Geometry Medium High Medium
Voice Medium High High
Retina High Low Low
Iris Medium Medium Medium
Signature Medium Medium High
Face Low High High
Transmission
Signal Processing
Feature
extractions
representations
Quality
Sufficient
Generate Template
Template Match
Decision
Confidence
Database
Biometric data
collection
Biometric Process
Application of Biometrics
Security:
• Government agencies
• Banks: facial recognition system equipped ATM machines.
• Airports: Heathrow airport had Iris recognition Immigration system facilitate
frequent travelers.
Time and Attendance Management
• Hospitals
• Banks
Access Control
• Personal computers, phone
Advantages of Biometrics
 Uniqueness
 Universality
 Permanence
 Measurability
 User Friendliness
 Accuracy
 Comfort
Disadvantages of Biometrics
 Costly
 Facial imagining can also hinder accurate identifications.
 Missing body part problem.
 False acceptances and rejections.
 The scanning of eye is fearful.
 The nervousness that people feel about the scanners identification.
Future Prospects
Biometry is one of the most promising and life-altering technologies in existence
today. It is all set to change the way we live in the future. Some of the emerging
biometrics technologies in the near future are:
 Ear shape identification.
 Body odor identification.
 Body salinity identification.
 EEG fingerprint.
 DNA matching
Conclusion
 Not perfect yet.
 Successful applications.
 Decreasing cost and increasing convenience.
 Increasing both privacy and identity security.
 The field of biometrics is evolving.
 Benefit from this technology.

More Related Content

What's hot

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
Abdul Rehman
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
Rudra Prasad Maiti
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 

What's hot (20)

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 

Viewers also liked

biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
jackofhearty1
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
Rupinder Saini
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
vineeth chepuri
 
Biometric
Biometric Biometric
Biometric
Pratish Sardar
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
xiaomi5
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 

Viewers also liked (13)

biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric
Biometric Biometric
Biometric
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
3d internet
3d internet3d internet
3d internet
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 

Similar to Biometrics

Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
Ravi Kumar
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
SajidHussain340
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Ai
AiAi
Biomatric
BiomatricBiomatric
Biomatric
NA000000
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)
kalyanAdduri
 
Biometric
BiometricBiometric
Biometric
NikhilKumar1203
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
amee yaami
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
Tejasvi Bhatia
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
Biometrics
BiometricsBiometrics

Similar to Biometrics (20)

Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
biometrics
biometricsbiometrics
biometrics
 
Ai
AiAi
Ai
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)
 
Biometric
BiometricBiometric
Biometric
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Biometrics

  • 2. Table of Content  Introduction  History  Importance of Biometrics  Characteristics  Biometrics Process  Application of Biometrics  Advantages & Disadvantages  Future Prospects  Conclusion
  • 3. Introduction  Biometrics is the science of technology of measuring and analyzing biological data.  Biometrics are automated methods of recognizing a person based on physiological behavioral characteristics.  As the level of security decreases and transaction fraud increases, the need for highly secure identification and personal verification technologies is more.  Biometrics-based solutions are able to provide for confidential financial transactions and personal data privacy.
  • 4. History  The term “Biometrics” is derived from the Greek words bio (life) and metric(to measure).  The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century by “joao de barros”.  In the 1890’s, “Bertillonage” a method of bodily measurement was used by police authorities.  The police then used finger printing, which was developed by Richard Edward Henry of Scotland yard.
  • 5. Importance of Biometrics  The security is needed in every place.  Reduce the existing problems, like those which can be taken, stolen, borrowed are even forgotten.  Improves convenience, security and privacy.  The first and most critical link in the security chain.  Presented to counteract security threats.
  • 6. Characteristics There are two characteristics of biometrics.  Physical  Behavioral The common physical characteristics are:  Finger Print  Face  Retina  Iris  Hand Geometry
  • 7. Characteristics The Behavioral characteristics are:  Voice  Keystroke Dynamics  Signature Dynamics
  • 8. Physical Biometrics Finger Print A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. Fingerprint recognization is possible using the finger scanner. A fingerprint scanner has two basic jobs.(get an image, matches pattern of prescanned images) Face The identification of a person by their facial image characteristics. Matching algorithm uses the location and shape of facial attributes. Retina Every eye has its own totally unique pattern of blood vessels. Retina scan machines are fairly expensive.
  • 9. Physical Characteristics Iris The iris is the colored ring of textured tissue that surrounds the pupil of the eyes. Iris identification uses the unique pattern of its texture to recognize an individual. Hand Geometry This method uses hand images for person identification. Person using identification hand geometry utilizes hand images to extract a number of features such as finger length, width, thickness and finger area etc.
  • 10. Behavioral Characteristics Voice Voice recognition is the identification using the acoustic features of speech that have been found to differ between individuals. Keystroke Dynamics It is a method of verifying the identity of an individual by their typing rhythm which can cope with trained typists. Verify the user with the stored template. Signature Dynamics The analysis of how an individual signatures. The process used by a biometric system to verify a signature is called dynamic signature verification.
  • 11. Comparison of Biometric Type Biometric Type Accuracy Easy to Use User Acceptance Fingerprint High Medium Low Hand Geometry Medium High Medium Voice Medium High High Retina High Low Low Iris Medium Medium Medium Signature Medium Medium High Face Low High High
  • 12. Transmission Signal Processing Feature extractions representations Quality Sufficient Generate Template Template Match Decision Confidence Database Biometric data collection Biometric Process
  • 13. Application of Biometrics Security: • Government agencies • Banks: facial recognition system equipped ATM machines. • Airports: Heathrow airport had Iris recognition Immigration system facilitate frequent travelers. Time and Attendance Management • Hospitals • Banks Access Control • Personal computers, phone
  • 14. Advantages of Biometrics  Uniqueness  Universality  Permanence  Measurability  User Friendliness  Accuracy  Comfort
  • 15. Disadvantages of Biometrics  Costly  Facial imagining can also hinder accurate identifications.  Missing body part problem.  False acceptances and rejections.  The scanning of eye is fearful.  The nervousness that people feel about the scanners identification.
  • 16. Future Prospects Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are:  Ear shape identification.  Body odor identification.  Body salinity identification.  EEG fingerprint.  DNA matching
  • 17. Conclusion  Not perfect yet.  Successful applications.  Decreasing cost and increasing convenience.  Increasing both privacy and identity security.  The field of biometrics is evolving.  Benefit from this technology.