SlideShare a Scribd company logo
Biometrics
Contents
Types5
6
behavioral7
Application8
Introduction 1
Characteristics 2
Working 3
Modes 4
physiological
What is biometrics ?
Biometrics refers to the automatic
identification of a person based on his or her
physiological or behavioral characteristics
Characteristics of biometrics
Any human characteristic can qualify as a
biometric characteristic as long as it satisfies
the following requirements:
• Universality
• Distinctiveness
• Permanence
• Collectability
How biometrics works ?
A biometric system can operate in
two modes
1. Identification: A one to many comparison of the
captured biometric against a biometric database
in attempt to identify an unknown individual.
2. Verification: A one to one comparison of a
captured biometric with a stored template to
verify that the individual is who he claims to be
Types of biometrics
Physiological
Face recognition:
➢ • Face recognition uses the visible physical structure of
the face and analyses the spatial geometry of
distinguishing features in it to identify an individual.
fingerprint recognition
➢ A live acquisition of a person’s fingerprint.
➢ Dots (very small ridges),
➢ Space between two divergent ridges,
➢ Spurs (a notch protruding from a ridge),
➢ Bridges (small ridges joining two longer adjacent ridges),
crossovers (two ridges that cross each other).
One of the largest fingerprint recognization system is integrated
automated fingerprint identification system, maintained by FBI in
the US since 1999.
Fingerprint recognition
Hand geometry
➢ Hand or finger geometry is an automated measurement of many
dimensions of the hand and fingers.
➢ Based on a number of measurements taken from the human hand.
➢ The technique is very simple, relatively easy to use, and inexpensive.
➢ The physical size of a hand geometry-based system is large.
Behavioral
Voice Recognition
➢ Voice or speaker recognition uses vocal characteristics to identify
individuals using a pass-phrase.
➢ A telephone or microphone can serve as a sensor,
Signature verification
➢ Signature identification: is the analyses of the way a user signs
his or her name.
➢ This technology examines :
• speed.
• direction .
• pressure of writing.
• the angle at which the pen is held.
• the number of times the pen is lifted.
• the time it takes to write the entire
signature.
➢ The process used by a biometric system to verify a signature is
called dynamic signature verification (DSV).
Application
➢ Prevent unauthorized access to ATMs, Cellular phones Desktop
PCs
➢ Criminal identification
➢ In automobiles biometrics can replace keys with keyless entry
devices
➢ Airport security
Thank you

More Related Content

What's hot

Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
varsha mohite
 
Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
biometric technology
biometric technologybiometric technology
biometric technology
RAHUL SRIVASTAVA
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
twuniversity
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
Mukta Gupta
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
scg121433
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
Usman Siddique
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
ajith chandran
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 

What's hot (20)

Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition
Face recognition Face recognition
Face recognition
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 

Similar to Biometrics - automatic identification of individuals

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
RahulSagar79
 
Biomatric
BiomatricBiomatric
Biomatric
NA000000
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
esther_sonu
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
 
biometricsppt-170117131041.pdf
biometricsppt-170117131041.pdfbiometricsppt-170117131041.pdf
biometricsppt-170117131041.pdf
Lohit4
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 
Biometrics
BiometricsBiometrics
Biometrics
Rameesha Sadaqat
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
NareshKireedula
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
aminpathan11
 

Similar to Biometrics - automatic identification of individuals (20)

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics
Biometrics Biometrics
Biometrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
biometricsppt-170117131041.pdf
biometricsppt-170117131041.pdfbiometricsppt-170117131041.pdf
biometricsppt-170117131041.pdf
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Biometrics - automatic identification of individuals

  • 3. What is biometrics ? Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics
  • 4. Characteristics of biometrics Any human characteristic can qualify as a biometric characteristic as long as it satisfies the following requirements: • Universality • Distinctiveness • Permanence • Collectability
  • 6. A biometric system can operate in two modes 1. Identification: A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. 2. Verification: A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be
  • 9. Face recognition: ➢ • Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual.
  • 10. fingerprint recognition ➢ A live acquisition of a person’s fingerprint. ➢ Dots (very small ridges), ➢ Space between two divergent ridges, ➢ Spurs (a notch protruding from a ridge), ➢ Bridges (small ridges joining two longer adjacent ridges), crossovers (two ridges that cross each other). One of the largest fingerprint recognization system is integrated automated fingerprint identification system, maintained by FBI in the US since 1999.
  • 12. Hand geometry ➢ Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers. ➢ Based on a number of measurements taken from the human hand. ➢ The technique is very simple, relatively easy to use, and inexpensive. ➢ The physical size of a hand geometry-based system is large.
  • 14. Voice Recognition ➢ Voice or speaker recognition uses vocal characteristics to identify individuals using a pass-phrase. ➢ A telephone or microphone can serve as a sensor,
  • 15. Signature verification ➢ Signature identification: is the analyses of the way a user signs his or her name. ➢ This technology examines : • speed. • direction . • pressure of writing. • the angle at which the pen is held. • the number of times the pen is lifted. • the time it takes to write the entire signature. ➢ The process used by a biometric system to verify a signature is called dynamic signature verification (DSV).
  • 16. Application ➢ Prevent unauthorized access to ATMs, Cellular phones Desktop PCs ➢ Criminal identification ➢ In automobiles biometrics can replace keys with keyless entry devices ➢ Airport security