SlideShare a Scribd company logo
BIOMETRICS TECHNOLOGY
Name :- Ketan Bhagawat Sawakare
Department :- Electrical Engineering
Subject :- Seminar
Roll No. :- 63
Seminar Guide :- P. P. Mahajan
OUTLINE OF PRESENTATION
 Introduction
 History Of Biometrics
 Different Types Of Biometrics
 Working Of Biometrics System
 In Detail Classification Of Biometrics Technology
 Advantages And Disadvantages
 Applications Of Biometrics
 Future Scope
 Conclusion
 Reference
WHAT IS BIOMETRICS?
 Biometrics are physical or behavioural
human characteristics that can be used to
digitally identify a person to grant access
to systems, devices or data.
 The word Biometrics comes from the
Greek words “bios” (life) and “metron”
(measure).
NEED OF BIOMETRICS
 Main purpose is security
 Can not be stolen, forgotten or lost.
 High secure than passcode and pin
 Easy and requires less time
 Fake person can be identified
HISTORY OF BIOMETRICS
 Discovered by Joao de Barros(European explorer)
 14th century used by china for children
identification.
 In the 1960s and ‘70s signature biometric
authentication developed.
 military and security agencies researched and
developed biometric technology
BIOMETRICS SYSTEM WORKING
TYPES OF BIOMETRICS
BIOMETRICS
PHYSICAL
FINGERPRINT
RECOGNITION
FACIAL
RECOGNITION
HAND
GEOMETRY/
PALM
IRIS
SCANNING
BEHAVIORAL
VOICE
RECOGNITION
SIGNATURE
RECOGNITION
GESTURE
RECOGNITION
FINGERPRINT
Sensor
module
Ink+ paper
+ scanner
Optical Capacitive Ultrasound
FACIAL RECOGNITION
Main focuses on key features of the face
Facial Features are Unique
Already Widespread
Inexpensive
IRIS SCANNING
Coloured ring that surrounds the pupil
Unique
Most secure method
VOICE RECOGNITION
Every person has different pitch
Focuses on vocal characteristics
Some types:
 Fixed text method
 Text dependent
 Text independent
ADVANTAGES
o Uniqueness
o Universality
o Permanence
o Measurability
o User friendliness
o Accuracy
o Comfort
DISADVANTAGES
o costly.
o Missing body part problem.
o False acceptances and rejections
o The scanning of eye is fearful
o The nervousness that people feel about
the scanners identification.
o If a person’s biometric data is stolen, it is
not possible to replace it
Application of biometrics
 Immigration Control
 Transactional Authentication
 Computer Security
 Mobile device
 Smart Doors
 Time and Attendance
 Prisons
FUTURE SCOPE
Some of the emerging biometrics technologies in the near
future are:
 Ear shape identification.
 Body odour identification.
 Body salinity identification.
 EEG Fingerprint
 DNA matching
CONCLUSION
 Biometrics is an emerging area with many opportunities for
growth
 Applications of biometrics are increasing
 Not perfect yet
 Accuracy is high but matching performance is unsatisfactory.
 Decreasing costs and increasing convenience
 User friendliness.
Reference
 Marcos Faundez-Zanuy Escola Universitaria Politècnica de Mataró Avda. Puig I Cadafalch 101-111
08303 MATARO (BARCELONA) SPAIN December 30, 2019
 Biometric Authentication: A Review Article in International Journal of u- and e- Service Science and
Technology · September 2018 Source: DOAJ
 Jain, A. K.; Ross, A. & Pankanti, S., “Biometrics: A Tool for Information Security”, IEEE
Transactions on Information Forensics And Security, Volume 1, issue 2, Jun. 2006, pp 125 – 144.
 Security and Accuracy of Fingerprint-Based Biometrics: A Review 2 December 2018; Accepted: 23 January
2019; Published: 28 January 2019
 Biometrics and Face Recognition Techniques Renu Bhatia Department of Computer Science and
Applications Kurukshetra University, Kurukshetra Haryana, INDIA 14 January 2013
 https://www.howstuffworks.com/search.php?terms=Biometrics
Any Questions ?
Thank you

More Related Content

What's hot

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
Shalika Dissanayaka
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometrics
BiometricsBiometrics
Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
Shreyans Jain
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
Abdul Rehman
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
esther_sonu
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
Biometrics
BiometricsBiometrics
Biometrics
Divya Shah
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
Mahesh Shitole
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
ajith chandran
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics
BiometricsBiometrics
Biometrics
Rajan Kumar
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 

What's hot (20)

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 

Similar to Biometrics technology

Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
Lanate Drummond
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
Ritesh Kumar Bhanu
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometrics
BiometricsBiometrics
Biometrics
biometrics12
 
Farheen123
Farheen123Farheen123
Farheen123
farheentaj9
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
palsantosh
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
IVR Technology Group
 
Biometrics
BiometricsBiometrics
Biometrics
Priyanka Sharma
 
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
ijcisjournal
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
Waseelsultan
 
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de  Reconnaissance faciale - eigenfaces, fisherfaces et lbphApplication de  Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Sarra ERRREGUI
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
ijait
 
Biometrics
BiometricsBiometrics
Biometrics
Satish Chandra
 
Bio shiv
Bio shivBio shiv
Bio shiv
Shivank Garg
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Ai
AiAi

Similar to Biometrics technology (20)

Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Farheen123
Farheen123Farheen123
Farheen123
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de  Reconnaissance faciale - eigenfaces, fisherfaces et lbphApplication de  Reconnaissance faciale - eigenfaces, fisherfaces et lbph
Application de Reconnaissance faciale - eigenfaces, fisherfaces et lbph
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Ai
AiAi
Ai
 

Recently uploaded

Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 

Recently uploaded (20)

Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 

Biometrics technology

  • 1. BIOMETRICS TECHNOLOGY Name :- Ketan Bhagawat Sawakare Department :- Electrical Engineering Subject :- Seminar Roll No. :- 63 Seminar Guide :- P. P. Mahajan
  • 2. OUTLINE OF PRESENTATION  Introduction  History Of Biometrics  Different Types Of Biometrics  Working Of Biometrics System  In Detail Classification Of Biometrics Technology  Advantages And Disadvantages  Applications Of Biometrics  Future Scope  Conclusion  Reference
  • 3. WHAT IS BIOMETRICS?  Biometrics are physical or behavioural human characteristics that can be used to digitally identify a person to grant access to systems, devices or data.  The word Biometrics comes from the Greek words “bios” (life) and “metron” (measure).
  • 4. NEED OF BIOMETRICS  Main purpose is security  Can not be stolen, forgotten or lost.  High secure than passcode and pin  Easy and requires less time  Fake person can be identified
  • 5. HISTORY OF BIOMETRICS  Discovered by Joao de Barros(European explorer)  14th century used by china for children identification.  In the 1960s and ‘70s signature biometric authentication developed.  military and security agencies researched and developed biometric technology
  • 9.
  • 10. FACIAL RECOGNITION Main focuses on key features of the face Facial Features are Unique Already Widespread Inexpensive
  • 11. IRIS SCANNING Coloured ring that surrounds the pupil Unique Most secure method
  • 12. VOICE RECOGNITION Every person has different pitch Focuses on vocal characteristics Some types:  Fixed text method  Text dependent  Text independent
  • 13. ADVANTAGES o Uniqueness o Universality o Permanence o Measurability o User friendliness o Accuracy o Comfort DISADVANTAGES o costly. o Missing body part problem. o False acceptances and rejections o The scanning of eye is fearful o The nervousness that people feel about the scanners identification. o If a person’s biometric data is stolen, it is not possible to replace it
  • 14. Application of biometrics  Immigration Control  Transactional Authentication  Computer Security  Mobile device  Smart Doors  Time and Attendance  Prisons
  • 15. FUTURE SCOPE Some of the emerging biometrics technologies in the near future are:  Ear shape identification.  Body odour identification.  Body salinity identification.  EEG Fingerprint  DNA matching
  • 16. CONCLUSION  Biometrics is an emerging area with many opportunities for growth  Applications of biometrics are increasing  Not perfect yet  Accuracy is high but matching performance is unsatisfactory.  Decreasing costs and increasing convenience  User friendliness.
  • 17. Reference  Marcos Faundez-Zanuy Escola Universitaria Politècnica de Mataró Avda. Puig I Cadafalch 101-111 08303 MATARO (BARCELONA) SPAIN December 30, 2019  Biometric Authentication: A Review Article in International Journal of u- and e- Service Science and Technology · September 2018 Source: DOAJ  Jain, A. K.; Ross, A. & Pankanti, S., “Biometrics: A Tool for Information Security”, IEEE Transactions on Information Forensics And Security, Volume 1, issue 2, Jun. 2006, pp 125 – 144.  Security and Accuracy of Fingerprint-Based Biometrics: A Review 2 December 2018; Accepted: 23 January 2019; Published: 28 January 2019  Biometrics and Face Recognition Techniques Renu Bhatia Department of Computer Science and Applications Kurukshetra University, Kurukshetra Haryana, INDIA 14 January 2013  https://www.howstuffworks.com/search.php?terms=Biometrics