SlideShare a Scribd company logo
Presented by:- Group D
 Biometrics is defined as the unique physical/logical characteristics or
traits of human body.
 Any details of the human body which differs from one human to
other will be used as unique biometric data to serve as that person's
unique identification ,
 such as: retinal, iris, fingerprint, palm print and DNA.
 Biometric systems will collect and store this data in order to use it for
verifying personal identity.
 The combination of biometric data systems and biometrics
recognition/ identification technologies creates the biometric
security systems.
 The biometric security system is a lock and capture mechanism to
control access to specific data.
 Governments, businesses and organizations can use
biometric systems to get more information about individuals
or about a populace as a whole.
 Many biometric systems are developed for security
applications.
 An airport scanning device, a "bio-password" system, or an
internal data gathering protocol is an example of a biometric
system that uses identifying data for a security result.
Biometrics can be sorted into two classes:
 Physiological
Examples: face, fingerprint, hand geometry and iris
recognition
 Behavioural
Examples: signature and voice
 Common:
 Fingerprint Recognition
 Face Recognition
 Speaker Recognition
 Iris Recognition
 Hand Geometry
 Signature verification
 Others:
 DNA
 Retina recognition
 Thermo grams
 Gait
 Keystroke
 Ear recognition
 Skin reflection
 Lip motion
 Body odor
 Odors have been shown to
impact human performance
across a range of contexts.
 The focus of the current special
issue reflects incidental
industrial/environmental odor
exposure.
 If odor effects are secondary to
an odor-induced elevation in
mood, one might predict that
similar valance odors produce
qualitatively equivalent effects
on cognition and mood.
 Odor qualities have often been assessed by perception-based
ratings.
 Although they have been applied for more than 5 decades, these
psychological approaches have not yielded a comprehensive or
generally accepted classification system yet.
 By reviewed 28 perception-based classification
studies and found that their outcome has been
largely determined by 4 influencing factors:
1) inter individual differences in perceptual and
verbal abilities of subjects
2)stimuli characteristics
3)approaches of data collection
4)methods of data analysis.
 A facial recognition
system is a computer
application capable of
identifying or verifying
a person from a digital
image or a video frame
from a video source.
 One of the ways to do
this is by comparing
selected facial features
from the image and a
facial database.
 Some facial recognition
algorithms identify facial
features by extracting
landmarks, or features,
from an image of the
subject's face.
 For example,
an algorithm may
analyze the relative
position, size, and/or
shape of the eyes, nose,
cheekbones, and jaw.
 A newly emerging trend,
claimed to achieve
improved accuracies, is
three-dimensional face
recognition.
 This technique uses 3D
sensors to capture
information about the
shape of a face.
 This information is then
used to identify distinctive
features on the surface of a
face, such as the contour of
the eye sockets, nose, and
chin.
 digiKam (KDE)
 iPhoto (Apple)
 Lightroom (Adobe)
 OpenCV (Open
Source)
 OpenFace (Open
Source)
 Photos (Apple)
 Photoshop Elements
(Adobe Systems)
 Picasa (Google)
 Picture Motion
Browser (Sony)
 Windows Live Photo
Gallery (Microsoft)
 DeepFace (Facebook)
 visage SDK (Visage
Technologies)
 Ayonix face SDK
(Ayonix 3D face
technology)
 TrueKey (Intel)
 The cognitive performance of a group of patients with multiple
system atrophy (MSA) of striato-nigral predominance was
compared with that of age.
 IQ matched control subjects, using three tests sensitive to frontal
lobe dysfunction and a battery sensitive to memory and learning
deficits
 The MSA group showed no consistent evidence of intellectual
deterioration as assessed from their performance on subtests of the
Wechsler Adult Intelligence Scale (WAIS) and the National Adult
Reading Test (NART).
 Consideration of individual cases showed that there was some
heterogeneity in the pattern of deficits in the MSA group, with one
patient showing no impairment, even in the face of considerable
physical disability.
 Handwriting recognition is the ability of a computer to receive
and interpret intelligible handwritten input from sources such
as paper documents, photographs, touch-screens and other
devices.
 The image of the written text may be sensed "off line" from a
piece of paper by optical scanning or intelligent word
recognition.
 Alternatively, the movements of the pen tip may be sensed "on
line", for example by a pen-based computer screen surface, a
generally easier task as there are more clues available.
 Handwritten biometrics
can be split into two
main categories:
 Static: In this mode,
users writes on paper,
digitize it through an
optical scanner or a
camera, and the
biometric system
recognizes the text
analyzing its shape.
 Dynamic: In this mode,
users writes in a digitizing
tablet, which acquires the
text in real time.
 Another possibility is the
acquisition by means of
stylus-operated PDAs.
Dynamic information usually
consists of the following
information:
 spatial coordinate x(t)
 spatial coordinate y(t)
 pressure p(t)
 azimuth az(t)
 inclination in(t)
 Handwriting recognition
principally entails optical
character recognition.
 However, a complete
handwriting recognition
system also handles
formatting, performs
correct segmentation into
characters and finds the
most plausible words.
 Universality:
Each person should possess the biometric trait.
 Distinctiveness:
Each person should be sufficiently unique in terms of
their biometric traits.
 Permanence:
Biometric trait should be invariant over time. A
good biometric system should measure something
that changes slowly over time.
 Collectability:
Biometric trait should be measured quantitatively.
How easily the biometric can be measured can be
significantly important in some applications
 Biometric system are a relatively modern technology
 Accuracy:
The goal of biometrics is to provide fast, accurate
readings---preventing unauthorized access.
Biometrics allows for a greater security level than
would have otherwise been possible.
 Fast
Since biometrics performs scans, there is no need for security
codes or keys---this can create a faster and simpler system to gain
access to areas or information.
 Management
Biometrics currently serves a key role in management. Since systems
are electronic, they store data; therefore, it is very common for
employers to use biometric systems as time clocks, an automated
way of tracking employees accurately.
 Biometrics systems work by recording and comparing
biometric characteristics.
 In many cases, characteristics are recorded as images, but for
speaker recognition a waveform is recorded, and for
signature recognition, time series data.
 For efficiency reasons, rather than using recorded
characteristics directly, it is usual to extract identifying
features from the samples and encode these features in a
form that facilitates storage and comparison.
 Aadhaar
 Access control
 AFIS
 AssureSign
 BioAPI
 Biometric passport
 Biometrics in schools
 BioSlimDisk
 Facial recognition system
 Fingerprint recognition
 Fuzzy extractor
 Gait analysis
 Government database
 Hand geometry
 Handwritten biometric
recognition
 Identity Cards Act 2006
 International Identity
Federation
 Iris recognition
 Keystroke dynamics
 Private biometrics
 Retinal scan
 Signature recognition
 Smart city
 Speaker recognition
 Surveillance
 Vein matching
 Voice analysis
 A biometric passport: also known as an e-passport, ePassport or
a digital passport, is a combined paper and electronic passport
that contains biometric information that can be used to
authenticate the identity of travellers.
 Biometrics in schools have been used primarily in the UK and US
since the early first decade of the 21st century, with some use of
biometric technology in schools in Asia too.
 Biometric technology is used to address truancy, to replace
library cards, or to charge for meals.
 A government database collects information for various reasons,
including climate monitoring, securities law compliance,
geological surveys, patent applications and grants, surveillance,
national security, border control, law enforcement, public health,
voter registration, vehicle registration, social security, and
statistics.
 Hand geometry is a biometric that identifies users by the shape
of their hands. Hand geometry readers measure a user's hand
along many dimensions and compare those measurements to
measurements stored in a file.
 Iris recognition is an automated method of biometric
identification that uses mathematical pattern-recognition
techniques on video images of one or both of the irises of an
individual's eyes, whose complex patterns are unique, stable, and
can be seen from some distance.
 Vein matching, also called vascular technology, is a technique of
biometric identification through the analysis of the patterns of
blood vessels visible from the surface of the skin.
 Voice analysis is the study of speech sounds for purposes other
than linguistic content, such as in speech recognition.
 Such studies include mostly medical analysis of the voice
(phoniatrics), but also speaker identification.
 More controversially, some believe that the truthfulness or
emotional state of speakers can be determined using Voice Stress
Analysis or Layered Voice Analysis.
 Biometrics refers to metrics related to human
characteristics.
 Biometric is different from each and every
person.
 This is most secure from other security
system. Because others can’t hack this
system.
 So the biometric system is most secured
system in IT field and others.
 http://www.cse.wustl.edu/~jain/cse571-
11/ftp/biomet.pdf
 https://www.cse.unr.edu/~bebis/CS790Q/Lect/Chapters_
3_4.ppt
 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231408
/
 http://chemse.oxfordjournals.org/content/38/3/189.full
 http://brain.oxfordjournals.org/content/115/1/271.short
 https://en.wikipedia.org/wiki/Handwriting_recognition
 https://www.newera.com.na/2014/04/23/characteristics-
biometric-systems/
 http://www.ehow.com/facts_6087565_functions-
biometric-devices_.html
 https://en.wikipedia.org/wiki/Biometrics
Biometrics Security System

More Related Content

What's hot

Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
Rudra Prasad Maiti
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 

What's hot (20)

Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics
BiometricsBiometrics
Biometrics
 

Viewers also liked

Cultura Piemonte - relazione 2015
Cultura Piemonte - relazione 2015Cultura Piemonte - relazione 2015
Cultura Piemonte - relazione 2015
Quotidiano Piemontese
 
Kupowanie przez wyszukiwanie - Bluerank dla DOZ.pl
Kupowanie przez wyszukiwanie - Bluerank dla DOZ.plKupowanie przez wyszukiwanie - Bluerank dla DOZ.pl
Kupowanie przez wyszukiwanie - Bluerank dla DOZ.pl
Bluerank
 
OPERATIONAL MANAGEMENT(1)
OPERATIONAL MANAGEMENT(1)OPERATIONAL MANAGEMENT(1)
OPERATIONAL MANAGEMENT(1)Harishananda KP
 
North Light Solutions-brochure_compressed_20161024
North Light Solutions-brochure_compressed_20161024North Light Solutions-brochure_compressed_20161024
North Light Solutions-brochure_compressed_20161024Felix Spender
 
Healthy and Wealthy - Feature from The Economist Healthcare In Asia paper 2011
Healthy and Wealthy - Feature from The Economist Healthcare In Asia paper 2011Healthy and Wealthy - Feature from The Economist Healthcare In Asia paper 2011
Healthy and Wealthy - Feature from The Economist Healthcare In Asia paper 2011Wai Chiong Loke
 
Masterplan Cavallerizza Reale Torino
Masterplan Cavallerizza Reale TorinoMasterplan Cavallerizza Reale Torino
Masterplan Cavallerizza Reale Torino
Quotidiano Piemontese
 
10 - It3D Summit 2016 - vr technology - T.Riley - NVIDIA
10 - It3D Summit 2016 - vr technology - T.Riley - NVIDIA10 - It3D Summit 2016 - vr technology - T.Riley - NVIDIA
10 - It3D Summit 2016 - vr technology - T.Riley - NVIDIA
Virginia Grubert
 
Мастер-класс по эффективному привлечению клиентов с помощью Яндекс.Недвижимости
Мастер-класс по эффективному привлечению клиентов с помощью Яндекс.НедвижимостиМастер-класс по эффективному привлечению клиентов с помощью Яндекс.Недвижимости
Мастер-класс по эффективному привлечению клиентов с помощью Яндекс.Недвижимости
CoMagic
 
Sejarah dan perkembangan ekonomi syariah
Sejarah dan perkembangan ekonomi syariahSejarah dan perkembangan ekonomi syariah
Sejarah dan perkembangan ekonomi syariah
Sarah Mardiana
 
Яркие моменты CoMagic в 2016 году
Яркие моменты CoMagic в 2016 годуЯркие моменты CoMagic в 2016 году
Яркие моменты CoMagic в 2016 году
CoMagic
 
CKX: So That Didn't Work - Sharing and learning from failure
CKX: So That Didn't Work - Sharing and learning from failure CKX: So That Didn't Work - Sharing and learning from failure
CKX: So That Didn't Work - Sharing and learning from failure
Community Knowledge Exchange
 
Top 10 foods that cause body odour
Top 10 foods that cause body odourTop 10 foods that cause body odour
Top 10 foods that cause body odour
saikuppannagari
 
(MBASkills.IN) Learning From Failures
(MBASkills.IN) Learning From Failures(MBASkills.IN) Learning From Failures
(MBASkills.IN) Learning From Failures
Sameer Mathur
 
Learning from project failures
Learning from project failuresLearning from project failures
Learning from project failures
Ramanjit Dhillon
 
Learning From Failure Finish2
Learning From Failure Finish2Learning From Failure Finish2
Learning From Failure Finish2
aigleazure
 
Il consumatore tipo nell’acquisto di mobili e accessori online
Il consumatore tipo nell’acquisto di mobili e accessori onlineIl consumatore tipo nell’acquisto di mobili e accessori online
Il consumatore tipo nell’acquisto di mobili e accessori online
Doxa
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
Drishty Sharma
 
Promoting competition, protecting human rights – Jean-Pierre CHAUFFOUR – Worl...
Promoting competition, protecting human rights – Jean-Pierre CHAUFFOUR – Worl...Promoting competition, protecting human rights – Jean-Pierre CHAUFFOUR – Worl...
Promoting competition, protecting human rights – Jean-Pierre CHAUFFOUR – Worl...
OECD Directorate for Financial and Enterprise Affairs
 

Viewers also liked (20)

Cultura Piemonte - relazione 2015
Cultura Piemonte - relazione 2015Cultura Piemonte - relazione 2015
Cultura Piemonte - relazione 2015
 
Kupowanie przez wyszukiwanie - Bluerank dla DOZ.pl
Kupowanie przez wyszukiwanie - Bluerank dla DOZ.plKupowanie przez wyszukiwanie - Bluerank dla DOZ.pl
Kupowanie przez wyszukiwanie - Bluerank dla DOZ.pl
 
OPERATIONAL MANAGEMENT(1)
OPERATIONAL MANAGEMENT(1)OPERATIONAL MANAGEMENT(1)
OPERATIONAL MANAGEMENT(1)
 
North Light Solutions-brochure_compressed_20161024
North Light Solutions-brochure_compressed_20161024North Light Solutions-brochure_compressed_20161024
North Light Solutions-brochure_compressed_20161024
 
Healthy and Wealthy - Feature from The Economist Healthcare In Asia paper 2011
Healthy and Wealthy - Feature from The Economist Healthcare In Asia paper 2011Healthy and Wealthy - Feature from The Economist Healthcare In Asia paper 2011
Healthy and Wealthy - Feature from The Economist Healthcare In Asia paper 2011
 
Masterplan Cavallerizza Reale Torino
Masterplan Cavallerizza Reale TorinoMasterplan Cavallerizza Reale Torino
Masterplan Cavallerizza Reale Torino
 
10 - It3D Summit 2016 - vr technology - T.Riley - NVIDIA
10 - It3D Summit 2016 - vr technology - T.Riley - NVIDIA10 - It3D Summit 2016 - vr technology - T.Riley - NVIDIA
10 - It3D Summit 2016 - vr technology - T.Riley - NVIDIA
 
Мастер-класс по эффективному привлечению клиентов с помощью Яндекс.Недвижимости
Мастер-класс по эффективному привлечению клиентов с помощью Яндекс.НедвижимостиМастер-класс по эффективному привлечению клиентов с помощью Яндекс.Недвижимости
Мастер-класс по эффективному привлечению клиентов с помощью Яндекс.Недвижимости
 
Sejarah dan perkembangan ekonomi syariah
Sejarah dan perkembangan ekonomi syariahSejarah dan perkembangan ekonomi syariah
Sejarah dan perkembangan ekonomi syariah
 
Яркие моменты CoMagic в 2016 году
Яркие моменты CoMagic в 2016 годуЯркие моменты CoMagic в 2016 году
Яркие моменты CoMagic в 2016 году
 
CKX: So That Didn't Work - Sharing and learning from failure
CKX: So That Didn't Work - Sharing and learning from failure CKX: So That Didn't Work - Sharing and learning from failure
CKX: So That Didn't Work - Sharing and learning from failure
 
Top 10 foods that cause body odour
Top 10 foods that cause body odourTop 10 foods that cause body odour
Top 10 foods that cause body odour
 
(MBASkills.IN) Learning From Failures
(MBASkills.IN) Learning From Failures(MBASkills.IN) Learning From Failures
(MBASkills.IN) Learning From Failures
 
Learning from project failures
Learning from project failuresLearning from project failures
Learning from project failures
 
Learning From Failure Finish2
Learning From Failure Finish2Learning From Failure Finish2
Learning From Failure Finish2
 
Il consumatore tipo nell’acquisto di mobili e accessori online
Il consumatore tipo nell’acquisto di mobili e accessori onlineIl consumatore tipo nell’acquisto di mobili e accessori online
Il consumatore tipo nell’acquisto di mobili e accessori online
 
Ear Biometrics
Ear BiometricsEar Biometrics
Ear Biometrics
 
Retina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharmaRetina recognition biometrics drishtysharma
Retina recognition biometrics drishtysharma
 
Promoting competition, protecting human rights – Jean-Pierre CHAUFFOUR – Worl...
Promoting competition, protecting human rights – Jean-Pierre CHAUFFOUR – Worl...Promoting competition, protecting human rights – Jean-Pierre CHAUFFOUR – Worl...
Promoting competition, protecting human rights – Jean-Pierre CHAUFFOUR – Worl...
 
Biometrics system
Biometrics systemBiometrics system
Biometrics system
 

Similar to Biometrics Security System

4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Biometrics
BiometricsBiometrics
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
desire120
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
IOSR Journals
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
Biometrics
BiometricsBiometrics
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
Journal For Research
 

Similar to Biometrics Security System (20)

4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Biometrics
BiometricsBiometrics
Biometrics
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 

Biometrics Security System

  • 2.
  • 3.  Biometrics is defined as the unique physical/logical characteristics or traits of human body.  Any details of the human body which differs from one human to other will be used as unique biometric data to serve as that person's unique identification ,  such as: retinal, iris, fingerprint, palm print and DNA.
  • 4.  Biometric systems will collect and store this data in order to use it for verifying personal identity.  The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems.  The biometric security system is a lock and capture mechanism to control access to specific data.
  • 5.  Governments, businesses and organizations can use biometric systems to get more information about individuals or about a populace as a whole.  Many biometric systems are developed for security applications.  An airport scanning device, a "bio-password" system, or an internal data gathering protocol is an example of a biometric system that uses identifying data for a security result.
  • 6. Biometrics can be sorted into two classes:  Physiological Examples: face, fingerprint, hand geometry and iris recognition  Behavioural Examples: signature and voice
  • 7.  Common:  Fingerprint Recognition  Face Recognition  Speaker Recognition  Iris Recognition  Hand Geometry  Signature verification  Others:  DNA  Retina recognition  Thermo grams  Gait  Keystroke  Ear recognition  Skin reflection  Lip motion  Body odor
  • 8.
  • 9.  Odors have been shown to impact human performance across a range of contexts.  The focus of the current special issue reflects incidental industrial/environmental odor exposure.  If odor effects are secondary to an odor-induced elevation in mood, one might predict that similar valance odors produce qualitatively equivalent effects on cognition and mood.
  • 10.  Odor qualities have often been assessed by perception-based ratings.  Although they have been applied for more than 5 decades, these psychological approaches have not yielded a comprehensive or generally accepted classification system yet.
  • 11.  By reviewed 28 perception-based classification studies and found that their outcome has been largely determined by 4 influencing factors: 1) inter individual differences in perceptual and verbal abilities of subjects 2)stimuli characteristics 3)approaches of data collection 4)methods of data analysis.
  • 12.
  • 13.  A facial recognition system is a computer application capable of identifying or verifying a person from a digital image or a video frame from a video source.  One of the ways to do this is by comparing selected facial features from the image and a facial database.
  • 14.
  • 15.  Some facial recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face.  For example, an algorithm may analyze the relative position, size, and/or shape of the eyes, nose, cheekbones, and jaw.  A newly emerging trend, claimed to achieve improved accuracies, is three-dimensional face recognition.  This technique uses 3D sensors to capture information about the shape of a face.  This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin.
  • 16.  digiKam (KDE)  iPhoto (Apple)  Lightroom (Adobe)  OpenCV (Open Source)  OpenFace (Open Source)  Photos (Apple)  Photoshop Elements (Adobe Systems)  Picasa (Google)  Picture Motion Browser (Sony)  Windows Live Photo Gallery (Microsoft)  DeepFace (Facebook)  visage SDK (Visage Technologies)  Ayonix face SDK (Ayonix 3D face technology)  TrueKey (Intel)
  • 17.
  • 18.  The cognitive performance of a group of patients with multiple system atrophy (MSA) of striato-nigral predominance was compared with that of age.  IQ matched control subjects, using three tests sensitive to frontal lobe dysfunction and a battery sensitive to memory and learning deficits
  • 19.  The MSA group showed no consistent evidence of intellectual deterioration as assessed from their performance on subtests of the Wechsler Adult Intelligence Scale (WAIS) and the National Adult Reading Test (NART).  Consideration of individual cases showed that there was some heterogeneity in the pattern of deficits in the MSA group, with one patient showing no impairment, even in the face of considerable physical disability.
  • 20.
  • 21.  Handwriting recognition is the ability of a computer to receive and interpret intelligible handwritten input from sources such as paper documents, photographs, touch-screens and other devices.  The image of the written text may be sensed "off line" from a piece of paper by optical scanning or intelligent word recognition.  Alternatively, the movements of the pen tip may be sensed "on line", for example by a pen-based computer screen surface, a generally easier task as there are more clues available.
  • 22.  Handwritten biometrics can be split into two main categories:  Static: In this mode, users writes on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the text analyzing its shape.  Dynamic: In this mode, users writes in a digitizing tablet, which acquires the text in real time.  Another possibility is the acquisition by means of stylus-operated PDAs. Dynamic information usually consists of the following information:  spatial coordinate x(t)  spatial coordinate y(t)  pressure p(t)  azimuth az(t)  inclination in(t)
  • 23.  Handwriting recognition principally entails optical character recognition.  However, a complete handwriting recognition system also handles formatting, performs correct segmentation into characters and finds the most plausible words.
  • 24.
  • 25.  Universality: Each person should possess the biometric trait.  Distinctiveness: Each person should be sufficiently unique in terms of their biometric traits.
  • 26.  Permanence: Biometric trait should be invariant over time. A good biometric system should measure something that changes slowly over time.  Collectability: Biometric trait should be measured quantitatively. How easily the biometric can be measured can be significantly important in some applications
  • 27.
  • 28.  Biometric system are a relatively modern technology  Accuracy: The goal of biometrics is to provide fast, accurate readings---preventing unauthorized access. Biometrics allows for a greater security level than would have otherwise been possible.
  • 29.  Fast Since biometrics performs scans, there is no need for security codes or keys---this can create a faster and simpler system to gain access to areas or information.  Management Biometrics currently serves a key role in management. Since systems are electronic, they store data; therefore, it is very common for employers to use biometric systems as time clocks, an automated way of tracking employees accurately.
  • 30.
  • 31.  Biometrics systems work by recording and comparing biometric characteristics.  In many cases, characteristics are recorded as images, but for speaker recognition a waveform is recorded, and for signature recognition, time series data.  For efficiency reasons, rather than using recorded characteristics directly, it is usual to extract identifying features from the samples and encode these features in a form that facilitates storage and comparison.
  • 32.
  • 33.  Aadhaar  Access control  AFIS  AssureSign  BioAPI  Biometric passport  Biometrics in schools  BioSlimDisk  Facial recognition system  Fingerprint recognition  Fuzzy extractor  Gait analysis  Government database  Hand geometry  Handwritten biometric recognition  Identity Cards Act 2006  International Identity Federation  Iris recognition  Keystroke dynamics  Private biometrics  Retinal scan  Signature recognition  Smart city  Speaker recognition  Surveillance  Vein matching  Voice analysis
  • 34.  A biometric passport: also known as an e-passport, ePassport or a digital passport, is a combined paper and electronic passport that contains biometric information that can be used to authenticate the identity of travellers.  Biometrics in schools have been used primarily in the UK and US since the early first decade of the 21st century, with some use of biometric technology in schools in Asia too.  Biometric technology is used to address truancy, to replace library cards, or to charge for meals.
  • 35.  A government database collects information for various reasons, including climate monitoring, securities law compliance, geological surveys, patent applications and grants, surveillance, national security, border control, law enforcement, public health, voter registration, vehicle registration, social security, and statistics.  Hand geometry is a biometric that identifies users by the shape of their hands. Hand geometry readers measure a user's hand along many dimensions and compare those measurements to measurements stored in a file.
  • 36.  Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.
  • 37.  Vein matching, also called vascular technology, is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin.  Voice analysis is the study of speech sounds for purposes other than linguistic content, such as in speech recognition.  Such studies include mostly medical analysis of the voice (phoniatrics), but also speaker identification.  More controversially, some believe that the truthfulness or emotional state of speakers can be determined using Voice Stress Analysis or Layered Voice Analysis.
  • 38.  Biometrics refers to metrics related to human characteristics.  Biometric is different from each and every person.  This is most secure from other security system. Because others can’t hack this system.  So the biometric system is most secured system in IT field and others.
  • 39.  http://www.cse.wustl.edu/~jain/cse571- 11/ftp/biomet.pdf  https://www.cse.unr.edu/~bebis/CS790Q/Lect/Chapters_ 3_4.ppt  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3231408 /  http://chemse.oxfordjournals.org/content/38/3/189.full  http://brain.oxfordjournals.org/content/115/1/271.short  https://en.wikipedia.org/wiki/Handwriting_recognition  https://www.newera.com.na/2014/04/23/characteristics- biometric-systems/  http://www.ehow.com/facts_6087565_functions- biometric-devices_.html  https://en.wikipedia.org/wiki/Biometrics