This document outlines a presentation on biometric authentication. It discusses authentication and its types, biometrics and why they are used, the characteristics and modes of biometric systems, different biometric techniques including fingerprint, face, iris, hand geometry and voice recognition, a comparison of techniques, applications and limitations. The working process of a biometric system including enrollment, authentication, capturing, pre-processing, feature extraction and matching is also summarized.
Star Link Communication Pvt. Ltd., India's leading manufacturer of biometric attendance system and access control system, brings you this slideshow about biometrics and how the technology works.
In this presentation, we have covered all the key aspects of biometrics like what is biometrics, different concepts related to biometrics, different biometrics technology like working of fingerprint scanning, facial recognition, hand geometry, iris scanning, etc. the presentation mainly focuses on the biometric and what biometric term actually means
I am Adoitya Kaila .a student of management.here I am presnting a presentation on biometric technology which is considered the most reliable source of security in todays time.i have tried to make it simple for each and everyone .
Star Link Communication Pvt. Ltd., India's leading manufacturer of biometric attendance system and access control system, brings you this slideshow about biometrics and how the technology works.
In this presentation, we have covered all the key aspects of biometrics like what is biometrics, different concepts related to biometrics, different biometrics technology like working of fingerprint scanning, facial recognition, hand geometry, iris scanning, etc. the presentation mainly focuses on the biometric and what biometric term actually means
I am Adoitya Kaila .a student of management.here I am presnting a presentation on biometric technology which is considered the most reliable source of security in todays time.i have tried to make it simple for each and everyone .
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals. In this paper we will be discussing about biometrics and its types and the threats and security issues which is not talked about usually. The different technologies evolved and had contributed to biometrics in long run and their effects. Sushmita Raulo | Saurabh Gawade "Security Issues Related to Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44951.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/44951/security-issues-related-to-biometrics/sushmita-raulo
BSI Biometrics Standards Presentation.
View BSI’s presentation about biometric standards, and get an overview of biometrics and identity management, and standards development for biometrics.
In the age of Biometric Security taking over the traditional security features, this is a small intro to the Biometric features one can use to enhance the security. The various modalities have been explained.
Biometrics is the most secure and suitable authentication tool. It is the automated method of recognizing a person based on a physiological or behavioral characteristic. Biometric authentication is used in computer Science for verifying human identity.
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
The Artificial Intelligence approach is used for Iris recognition by understanding the distinctive and measurable characteristics of the human body such as a person’s face, iris, DNA, fingerprints, etc. AI methods analyzed the attributes like iris images. Privacy and Security being a major concern nowadays, Recognition Technique can find numerous applications.
Similar to Biometrics Based Authentication AKASH (20)
2. Presentation Outlines
Authentication & Its types
Biometric & Why use it ?
Characteristics & Modes
Working of Biometric System
Different Techniques
Comparison b/w Different techniques
Application of Biometric Authentication
Limitations
Conclusion
References
3. Authentication
Act of confirming something or giving
privileges to access something.
Process of giving someone identity-he or she
can access that particular application or data.
For e.g. : Giving identity-card to a student of
an institute.
5. Biometric
“ something that you are ”
Two Greek words Bio(Life) and Metric(To Measure).
Measures and Analyzes - biological traits - human being.
Automated recognition of an individual - behavioral or
physical characteristics.
Provides privacy to personal data & high security to
confidential, financial transactions.
6. Why Biometric ?
Identity theft is not possible
Password remembrance problem does not exist
Cannot be predicted or hacked
Cannot be shared
Perceived as more secure
Accuracy
7. Characteristics of a Biometric
Recognizing an individual based on two main characteristics :
Physical characteristics are related to physical shape of the
body. For e.g. Fingerprint, face, hand geometry, iris etc.
Behavioral characteristics are related to the behavior of a
person. For e.g. Voice pitch, speaking style, typing rhythm,
signature etc.
8. Modes of Biometric System
Identification
One-to-many comparison.
It search for a sample against a database of templates.
It identifies an unknown individual.
For e.g. Who is “x” ?
Verification
One-to-one comparison.
It compares a sample against a single stored template.
It verifies the individual’s identity.
For e.g. Is this “x” ?
9. Working process
Enrollment : In this stage, Information captured-sensing
device-stored in database for later comparison. When someone
uses biometric for the first time then the stage is called
enrollment.
Authentication : Registered biometric sample during the
enrollment process are matched against newly capturing
biometric sample.
10. Working of Biometric System
Steps :
Capturing
Pre-processing
Feature Extraction
Template Creation
Matcher/Comparison
Application Device
11. Different biometric technique
Fingerprint technology :
Oldest and most widely used.
Registered points are located and compared.
Optical sensors are used for scanning purpose.
Affects by impression angle, pressure, dirt, moisture etc.
It can be used for many applications like pc login security,
voting system, attendance system etc.
12. Face Recognition Technology :
For automatic identification or verification of a person from a
digital image.
These include the position/size/shape of the eyes, nose,
cheekbones and jaw line.
13. Iris Recognition Technology :
It measures the iris pattern of the eye i.e. the colored part of
the eye that surrounds the pupil.
The iris scanner analyzes features like rings, furrows, and
freckles existing in the colored tissue surrounding pupil.
Iris pattern is not changed over years or by glasses, contact
lenses.
14. Hand Geometry Technology :
Uses hand images for identification or verification.
Person identification utilizes hand images to extract a number
of features such as length, width, thickness, finger area etc.
Measures the digits of the hand and compares to those
collected at the time of enrollment.
Places hand on the system which takes the three dimensional
image of the hand.
15. Voice Recognition Technology :
Validate user’s claimed identity using
their voice.
It uses the pitch, pattern, tone,
frequency, rhythm of speech for
identification purposes.
A telephone or microphone can act as a
sensor.
17. Applications Limitations
Criminal identification
Internet Banking
Attendance system
Airport, Bank security
PC login security
Prevents unauthorized access to
private data.
Presence of noise in the sensed
data.
Variations in the enrolled data
i.e. change in age, disease,
environment etc.
Non-universality
It is an expensive security
solution.
18. Conclusion
Security of e-commerce or e-government sites -
Enhanced
The Greatest strength of the biometric system is that
they does not change over time so it is much more
efficient than other traditional security mechanism.
Accuracy, performance, effectiveness & suitability of
the security systems can be increased.