SlideShare a Scribd company logo
BIOMETRICS
Mr. Mayank David Raiborde,
Assistant Professor,
Dept. of Forensic Science,
Kristu Jayanti College, Bengaluru
Overview
• What is Biometrics?
• Measures
• Biometric System
• Modes of Operation
• Modules
• Types of Biometric Recognition
• Applications
• Advantages/Disadvantages
What is Biometrics?
Methods of identifying a person based on
Physiological or Behavioral characteristic.
• Physiological- Hand or finger images, facial
characteristic, speak verification, iris recognition.
• Behavioral- Dynamic Signature Verification and
Keystroke Dynamics.
What Biological Measures Qualify to be a
Biometric
• Universality- Each person should have the characteristic.
• Distinctiveness- Two persons should be different in terms
of characteristics.
• Permanence- Characteristic should be invariant of time.
• Collectability- Characteristic should be measured
Quantitatively.
Biometric Systems
A biometric system is a pattern recognition system
that operates by
o Acquiring Biometric data from an Individual.
o Extracting Feature Set from the Data.
o Comparing the Feature Set with the Template in the
Database.
Operation Modes Of Biometrics
There are two modes of operation.
o Verification Mode
o Identification Mode.
• Depending on the Application Context, Biometric System
can work either on Verification Mode or in Identification
Mode.
Block Diagram of Enrollment, Verification, Identification Phase
INTRODUCTION TO BIOMETRIC RECOGNITION
k diagrams of enrollment, verification, and identification tasks are shown using the four main modules of a biometric system, i.e.,
tcher, and system database.
Operational Modes Contd.
• In Verification mode, the system validates the
person’s identity by comparing the captured
biometric data with the template stored in the
database. This template is stored in the
Enrollment phase.
• In Identification mode the system identifies
the person by searching the templates of all
users in the database for a match. One to
many Comparison.
Modules needed to build a Biometric System
• Sensor module
• Feature Extraction module
• Matcher Module
• System Database Module
1. Sensor Module- It captures the Biometric data of an
Individual. An example can be a Fingerprint Sensor.
2. Feature Extraction Module- Here the obtained biometric data
of an Individual is processed to extract features. Example can be
the Local ridge feature extraction from a Fingerprint.
3. Matcher Module- Here the features extracted during the above
phase are matched against the templates stored in the database.
4. System Database Module- Used to Store Biometric templates
of the users enrolled. The enrollment module is responsible for
Enrolling Individuals to the database.
Types of Biometric Recognition
Common Techniques
• Fingerprint Recognition
• Face Recognition
• Voice Recognition
• Iris Recognition
• Hand Geometry
• Signature Verification
Other Techniques
• Keystroke
• Ear Geometry
• Lip Motion
• Thermograms
• Retina Recognition
Fingerprint Recognition
• Taking an image of a person’s fingertips
and storing the characteristics.
• Includes pattern matching
o Ridges
o Whorls
o Arches
o Furrows
Iris Recognition
• Camera technology
• Infrared illumination
• Mathematical-pattern recognition
techniques
Facial Recognition
• Recording face images through a
digital video camera.
• Analyzing facial characteristics like the
distance between eyes, nose, mouth
and jaw edges.
Applications
• ATMs
• Computer Login
• Online Banking
• National Security
• Elections
• Criminal Investigation
• Identification of missing people
Advantages
• Easy to maintain
• More robust than ID Cards, Passwords, PIN numbers,
etc.
• Cannot be stolen or forgotten
• Single biometric protection for multiple logins
Disadvantages
• It can be very expensive
• The pattern matching might be inaccurate due to
environmental conditions
• The stored biometric data might be vulnerable to
malicious attacks
• Reproduction of biometric data by other people
THANK YOU!!!

More Related Content

Similar to Biometrics -Mayank.pptx

Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
aminpathan11
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Sonam1891
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
Arsalan Mohammad
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueSunil Kumar Chawla
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Biomatric
BiomatricBiomatric
Biomatric
NA000000
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
VamshiKaram
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
1A255Gauravwankar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
SARATHGOVINDKK
 
CYBER FORENSIC PPT
CYBER FORENSIC PPTCYBER FORENSIC PPT
CYBER FORENSIC PPT
adityapandit0010
 

Similar to Biometrics -Mayank.pptx (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometric
Biometric Biometric
Biometric
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biomatric
BiomatricBiomatric
Biomatric
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
CYBER FORENSIC PPT
CYBER FORENSIC PPTCYBER FORENSIC PPT
CYBER FORENSIC PPT
 

More from Mayank Raiborde

Introduction to Forensic Science: Medical Evidences
Introduction to Forensic Science: Medical EvidencesIntroduction to Forensic Science: Medical Evidences
Introduction to Forensic Science: Medical Evidences
Mayank Raiborde
 
Forensic Medicine: Introduction to Forensic Medicine
Forensic Medicine: Introduction to Forensic MedicineForensic Medicine: Introduction to Forensic Medicine
Forensic Medicine: Introduction to Forensic Medicine
Mayank Raiborde
 
Crime Scene Management: First Responding Officer
Crime Scene Management: First Responding OfficerCrime Scene Management: First Responding Officer
Crime Scene Management: First Responding Officer
Mayank Raiborde
 
Crime Scene Management: Introduction to Crime Scene
Crime Scene Management: Introduction to Crime SceneCrime Scene Management: Introduction to Crime Scene
Crime Scene Management: Introduction to Crime Scene
Mayank Raiborde
 
Confessions.pptx
Confessions.pptxConfessions.pptx
Confessions.pptx
Mayank Raiborde
 
Relevancy of Facts.pptx
Relevancy of Facts.pptxRelevancy of Facts.pptx
Relevancy of Facts.pptx
Mayank Raiborde
 
Dying declaration.pptx
Dying declaration.pptxDying declaration.pptx
Dying declaration.pptx
Mayank Raiborde
 
Death Investigation.pptx
Death Investigation.pptxDeath Investigation.pptx
Death Investigation.pptx
Mayank Raiborde
 
Basics of genetics.pptx
Basics of genetics.pptxBasics of genetics.pptx
Basics of genetics.pptx
Mayank Raiborde
 
DNA Typing - Unit 1.pptx
DNA Typing - Unit 1.pptxDNA Typing - Unit 1.pptx
DNA Typing - Unit 1.pptx
Mayank Raiborde
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
Mayank Raiborde
 
Hplc.pptx
Hplc.pptxHplc.pptx
Hplc.pptx
Mayank Raiborde
 
RIA.pptx
RIA.pptxRIA.pptx
RIA.pptx
Mayank Raiborde
 
Blood examination.pptx
Blood examination.pptxBlood examination.pptx
Blood examination.pptx
Mayank Raiborde
 
Importance of Genetic Markers in Forensics
Importance of Genetic Markers in ForensicsImportance of Genetic Markers in Forensics
Importance of Genetic Markers in Forensics
Mayank Raiborde
 

More from Mayank Raiborde (15)

Introduction to Forensic Science: Medical Evidences
Introduction to Forensic Science: Medical EvidencesIntroduction to Forensic Science: Medical Evidences
Introduction to Forensic Science: Medical Evidences
 
Forensic Medicine: Introduction to Forensic Medicine
Forensic Medicine: Introduction to Forensic MedicineForensic Medicine: Introduction to Forensic Medicine
Forensic Medicine: Introduction to Forensic Medicine
 
Crime Scene Management: First Responding Officer
Crime Scene Management: First Responding OfficerCrime Scene Management: First Responding Officer
Crime Scene Management: First Responding Officer
 
Crime Scene Management: Introduction to Crime Scene
Crime Scene Management: Introduction to Crime SceneCrime Scene Management: Introduction to Crime Scene
Crime Scene Management: Introduction to Crime Scene
 
Confessions.pptx
Confessions.pptxConfessions.pptx
Confessions.pptx
 
Relevancy of Facts.pptx
Relevancy of Facts.pptxRelevancy of Facts.pptx
Relevancy of Facts.pptx
 
Dying declaration.pptx
Dying declaration.pptxDying declaration.pptx
Dying declaration.pptx
 
Death Investigation.pptx
Death Investigation.pptxDeath Investigation.pptx
Death Investigation.pptx
 
Basics of genetics.pptx
Basics of genetics.pptxBasics of genetics.pptx
Basics of genetics.pptx
 
DNA Typing - Unit 1.pptx
DNA Typing - Unit 1.pptxDNA Typing - Unit 1.pptx
DNA Typing - Unit 1.pptx
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Hplc.pptx
Hplc.pptxHplc.pptx
Hplc.pptx
 
RIA.pptx
RIA.pptxRIA.pptx
RIA.pptx
 
Blood examination.pptx
Blood examination.pptxBlood examination.pptx
Blood examination.pptx
 
Importance of Genetic Markers in Forensics
Importance of Genetic Markers in ForensicsImportance of Genetic Markers in Forensics
Importance of Genetic Markers in Forensics
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Biometrics -Mayank.pptx

  • 1. BIOMETRICS Mr. Mayank David Raiborde, Assistant Professor, Dept. of Forensic Science, Kristu Jayanti College, Bengaluru
  • 2. Overview • What is Biometrics? • Measures • Biometric System • Modes of Operation • Modules • Types of Biometric Recognition • Applications • Advantages/Disadvantages
  • 3. What is Biometrics? Methods of identifying a person based on Physiological or Behavioral characteristic. • Physiological- Hand or finger images, facial characteristic, speak verification, iris recognition. • Behavioral- Dynamic Signature Verification and Keystroke Dynamics.
  • 4. What Biological Measures Qualify to be a Biometric • Universality- Each person should have the characteristic. • Distinctiveness- Two persons should be different in terms of characteristics. • Permanence- Characteristic should be invariant of time. • Collectability- Characteristic should be measured Quantitatively.
  • 5. Biometric Systems A biometric system is a pattern recognition system that operates by o Acquiring Biometric data from an Individual. o Extracting Feature Set from the Data. o Comparing the Feature Set with the Template in the Database.
  • 6. Operation Modes Of Biometrics There are two modes of operation. o Verification Mode o Identification Mode. • Depending on the Application Context, Biometric System can work either on Verification Mode or in Identification Mode.
  • 7. Block Diagram of Enrollment, Verification, Identification Phase INTRODUCTION TO BIOMETRIC RECOGNITION k diagrams of enrollment, verification, and identification tasks are shown using the four main modules of a biometric system, i.e., tcher, and system database.
  • 8. Operational Modes Contd. • In Verification mode, the system validates the person’s identity by comparing the captured biometric data with the template stored in the database. This template is stored in the Enrollment phase. • In Identification mode the system identifies the person by searching the templates of all users in the database for a match. One to many Comparison.
  • 9. Modules needed to build a Biometric System • Sensor module • Feature Extraction module • Matcher Module • System Database Module
  • 10. 1. Sensor Module- It captures the Biometric data of an Individual. An example can be a Fingerprint Sensor. 2. Feature Extraction Module- Here the obtained biometric data of an Individual is processed to extract features. Example can be the Local ridge feature extraction from a Fingerprint. 3. Matcher Module- Here the features extracted during the above phase are matched against the templates stored in the database. 4. System Database Module- Used to Store Biometric templates of the users enrolled. The enrollment module is responsible for Enrolling Individuals to the database.
  • 11. Types of Biometric Recognition Common Techniques • Fingerprint Recognition • Face Recognition • Voice Recognition • Iris Recognition • Hand Geometry • Signature Verification
  • 12. Other Techniques • Keystroke • Ear Geometry • Lip Motion • Thermograms • Retina Recognition
  • 13. Fingerprint Recognition • Taking an image of a person’s fingertips and storing the characteristics. • Includes pattern matching o Ridges o Whorls o Arches o Furrows
  • 14. Iris Recognition • Camera technology • Infrared illumination • Mathematical-pattern recognition techniques
  • 15. Facial Recognition • Recording face images through a digital video camera. • Analyzing facial characteristics like the distance between eyes, nose, mouth and jaw edges.
  • 16. Applications • ATMs • Computer Login • Online Banking • National Security • Elections • Criminal Investigation • Identification of missing people
  • 17. Advantages • Easy to maintain • More robust than ID Cards, Passwords, PIN numbers, etc. • Cannot be stolen or forgotten • Single biometric protection for multiple logins
  • 18. Disadvantages • It can be very expensive • The pattern matching might be inaccurate due to environmental conditions • The stored biometric data might be vulnerable to malicious attacks • Reproduction of biometric data by other people