SlideShare a Scribd company logo
Submitted By:
NAME - PREETI
Roll No -1219531098
BRANCH - ELECTRONICS AND
COMMUNICATION & ENGG.
March 27, 2015
1
GUIDED BY:
VIPIN KUMAR & SUNIL TIWARI.
CONTENT
Definiton of biometrics
Terms of biometrics
History of biometrics
Biometrics characteristics
Biometrics recognition techniques
Applications
Advantages & Disadvantages
conclusion
References
March27,2015
2
Biometrics refers to the automatic identification
of a person based on his or her physiological or
behavioral characteristics .
WhaT Is BIOMETRICs ?
INTODUCTION
March 27, 2015 3
Why BIOMETRICs ?
March 27, 2015 4
Level of Security
hIsTORy
March 27, 2015 5
The ancient Egyptians and the Chinese played
a large role in biometrics history.
Biometrics in practice was a form of finger
printing being used in china in the 14th
century.
Bertillon developed a technique of multiple
body measurements .
A system called “Indentimat” which measured
shape of the hand and length of fingers was
introduced in 1970s.
ChaRaCTERsTICs Of
BIOMETRICs
 Any human characteristic can qualify as a
biometric characteristic as long as it satisfies the
following requirements:-
Universality
Distinctiveness
Permanence
Collectability
hOW BIOMETRICs WORks ?
March 27, 2015 7
No
Yes
Biometric
Data Collection
Transmission
Quality
Sufficient?
Ye
s
Template Match
Signal Processing,
Feature Extraction,
Representation
Database
Generate Template
Decision
Confidence?
new biometric sample is
requested. No
All biometric systems
works in a four-stage
process:
Capture
Extraction
Comparison
Match/Non-match
A biometric system cAn operAte
in two modes
1.Identification: A one to many comparison of the captured
biometric against a biometric database in attempt to identify
an unknown individual.
2.Verification: A one to one comparison of a captured
biometric with a stored template to verify that the individual
is who he claims to be.
March 27, 2015 8
types of biometrics
 Physiological
 Face
 Fingerprint
 Hand geometry
 Retina
 Iris recognition
 Behavioral
 Signature
 Voice
March 27, 2015 9
fingerprint recognition
 A live acquisition of a person’s fingerprint.
 Dots (very small ridges),
 Space between two divergent ridges,
 Spurs (a notch protruding from a ridge),
 Bridges (small ridges joining two longer
adjacent ridges), crossovers (two ridges
that cross each other).
 One of the largest fingerprint recognization
system is integrated automated fingerprint
identification system, maintained by FBI in
the US since 1999.
March 27, 2015 10
fAce recognition:
• Face recognition uses the visible
physical structure of the face and
analyses the spatial geometry of
distinguishing features in it to identify
an individual.
March 27, 2015 11
Database
Input face image Extraction of
face image
Extraction of
face features
Positive
Negative
Hand or finger geometry is an automated
measurement of many dimensions of the hand and
fingers.
HAnd geometry
March 27, 2015 12
March 27, 2015 13
Based on a number of measurements taken from
the human hand.
The technique is very simple, relatively easy to use,
and inexpensive.
The physical size of a hand geometry-based system
is large.
iris recognition
March 27, 2015 14
Database
Input of face
image
Detection of
eye regions
Put iris in focus
Recognition of
iris pattern
accept
reject
•Iris scanning measures the iris pattern in the colored part of the
eye.
•Iris recognition uses camera technology with subtle infrared
illumination to acquire images of the detail-rich, intricate structures
of the iris.
Retina Recognition
• It analyzing the layer of blood vessels situated at the back of
the eye.
• The machine takes around ten seconds to shine a “low
intensity coherent light source” onto the retina to illuminate
the blood vessels.
• Once the machine has a copy of the scan, it compares the
picture to all the different scans on file, looks for a match, and
identifies the individual.
• Retina scan machines are fairly expensive.
March 27, 2015 15
SpeakeR / Voice Recognition
Voice or speaker recognition uses vocal characteristics
to identify individuals using a pass-phrase.
A telephone or microphone can serve as a sensor,
March 27, 2015 16
SignatuRe VeRification
Signature identification: is the analyses of the way a user signs
his or her name.
This technology examines :
• speed.
• direction .
• pressure of writing.
• the angle at which the pen is held.
• the number of times the pen is lifted.
• the time it takes to write the entire signature.
The process used by a biometric system to verify a signature is
called dynamic signature verification (DSV).
March 27, 2015 17
March 27, 2015 18
compaRiSon of BiometRicS
technology
futuRe pRoSpectS
Biometry is one of the most promising and life-altering
technologies in existence today. It is all set to change the way
we live in the future. Some of the emerging biometrics
technologies in the near future are:
1. Ear shape identification.
2. Body odor identification.
3. Body salinity identification.
4. EEG Fingerprint
5. DNA matching
March 27, 2015 20
Prevent unauthorized access to ATMs, Cellular phones
Desktop PCs
Criminal identification
In automobiles biometrics can replace keys with keyless
entry devices
Airport security
applicationS
March 27, 2015 21
March 27, 2015 22
Eliminate problems caused by lost IDs or forgotten
passwords.
Reduce password administration costs.
Make it possible, automatically, to know WHO did WHAT,
WHERE and WHEN?
Replace hard-to-remember passwords which may be shared
or observed.
AdvAntAges of biometrics
Increase security.
multimodAl biometrics
system
It utilize more than one physiological or
behavioral characteristic for enrollment,
verification or identification.
This system takes advantage of the
capabilities of each individual biometric.
It can be used to overcome some of
the limitations of a single biometrics.
disAdvAntAges of biometrics
1. costly.
2. Facial imaging can also hinder
accurate identification.
3. The scanning of eye is fearful.
4. Missing body part problem.
5. False acceptances and rejections.
6. The nervousness that people feel about the scanners
identification.March 27, 2015 24
conclusion
Biometric is an emerging area with many
opportunities for growth.
Decreasing costs and increasing convenience.
Increasing both privacy and identity security.
Possibly in the near future, you will not have to
remember PINs and passwords and keys in your bags
or pockets will be things of the past.
March 27, 2015 25
references
•www.biometrics.com
•www.google.com
•www.facerecognization.com
•www.fingerprintscanner.com
•www.irisrecognization.com
March 27, 2015 26
March 27, 2015 27
March 27, 2015 28
Any Questions

More Related Content

What's hot

Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
Abdul Rehman
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
Ausaf khan
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
shahab islam
 
Ppt wearable computer
Ppt wearable computerPpt wearable computer
Ppt wearable computer
Nitesh Nayal
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
Rudra Prasad Maiti
 

What's hot (20)

Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Ppt wearable computer
Ppt wearable computerPpt wearable computer
Ppt wearable computer
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 

Viewers also liked

Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
AKS Solutions (Pvt) Ltd.
 
biometric technology
biometric technologybiometric technology
biometric technology
RAHUL SRIVASTAVA
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
Star Link Communication Pvt Ltd
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
esther_sonu
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
FaithCWorth
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication'Atikah Khalil
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measuressyamil91
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics
 

Viewers also liked (19)

Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 

Similar to Biometrics Technology Intresting PPT

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
Tejasvi Bhatia
 
Biometrics
BiometricsBiometrics
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
Lanate Drummond
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 

Similar to Biometrics Technology Intresting PPT (20)

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometric
Biometric Biometric
Biometric
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 

Recently uploaded (20)

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 

Biometrics Technology Intresting PPT

  • 1. Submitted By: NAME - PREETI Roll No -1219531098 BRANCH - ELECTRONICS AND COMMUNICATION & ENGG. March 27, 2015 1 GUIDED BY: VIPIN KUMAR & SUNIL TIWARI.
  • 2. CONTENT Definiton of biometrics Terms of biometrics History of biometrics Biometrics characteristics Biometrics recognition techniques Applications Advantages & Disadvantages conclusion References March27,2015 2
  • 3. Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics . WhaT Is BIOMETRICs ? INTODUCTION March 27, 2015 3
  • 4. Why BIOMETRICs ? March 27, 2015 4 Level of Security
  • 5. hIsTORy March 27, 2015 5 The ancient Egyptians and the Chinese played a large role in biometrics history. Biometrics in practice was a form of finger printing being used in china in the 14th century. Bertillon developed a technique of multiple body measurements . A system called “Indentimat” which measured shape of the hand and length of fingers was introduced in 1970s.
  • 6. ChaRaCTERsTICs Of BIOMETRICs  Any human characteristic can qualify as a biometric characteristic as long as it satisfies the following requirements:- Universality Distinctiveness Permanence Collectability
  • 7. hOW BIOMETRICs WORks ? March 27, 2015 7 No Yes Biometric Data Collection Transmission Quality Sufficient? Ye s Template Match Signal Processing, Feature Extraction, Representation Database Generate Template Decision Confidence? new biometric sample is requested. No All biometric systems works in a four-stage process: Capture Extraction Comparison Match/Non-match
  • 8. A biometric system cAn operAte in two modes 1.Identification: A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. 2.Verification: A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. March 27, 2015 8
  • 9. types of biometrics  Physiological  Face  Fingerprint  Hand geometry  Retina  Iris recognition  Behavioral  Signature  Voice March 27, 2015 9
  • 10. fingerprint recognition  A live acquisition of a person’s fingerprint.  Dots (very small ridges),  Space between two divergent ridges,  Spurs (a notch protruding from a ridge),  Bridges (small ridges joining two longer adjacent ridges), crossovers (two ridges that cross each other).  One of the largest fingerprint recognization system is integrated automated fingerprint identification system, maintained by FBI in the US since 1999. March 27, 2015 10
  • 11. fAce recognition: • Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual. March 27, 2015 11 Database Input face image Extraction of face image Extraction of face features Positive Negative
  • 12. Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers. HAnd geometry March 27, 2015 12
  • 13. March 27, 2015 13 Based on a number of measurements taken from the human hand. The technique is very simple, relatively easy to use, and inexpensive. The physical size of a hand geometry-based system is large.
  • 14. iris recognition March 27, 2015 14 Database Input of face image Detection of eye regions Put iris in focus Recognition of iris pattern accept reject •Iris scanning measures the iris pattern in the colored part of the eye. •Iris recognition uses camera technology with subtle infrared illumination to acquire images of the detail-rich, intricate structures of the iris.
  • 15. Retina Recognition • It analyzing the layer of blood vessels situated at the back of the eye. • The machine takes around ten seconds to shine a “low intensity coherent light source” onto the retina to illuminate the blood vessels. • Once the machine has a copy of the scan, it compares the picture to all the different scans on file, looks for a match, and identifies the individual. • Retina scan machines are fairly expensive. March 27, 2015 15
  • 16. SpeakeR / Voice Recognition Voice or speaker recognition uses vocal characteristics to identify individuals using a pass-phrase. A telephone or microphone can serve as a sensor, March 27, 2015 16
  • 17. SignatuRe VeRification Signature identification: is the analyses of the way a user signs his or her name. This technology examines : • speed. • direction . • pressure of writing. • the angle at which the pen is held. • the number of times the pen is lifted. • the time it takes to write the entire signature. The process used by a biometric system to verify a signature is called dynamic signature verification (DSV). March 27, 2015 17
  • 20. futuRe pRoSpectS Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are: 1. Ear shape identification. 2. Body odor identification. 3. Body salinity identification. 4. EEG Fingerprint 5. DNA matching March 27, 2015 20
  • 21. Prevent unauthorized access to ATMs, Cellular phones Desktop PCs Criminal identification In automobiles biometrics can replace keys with keyless entry devices Airport security applicationS March 27, 2015 21
  • 22. March 27, 2015 22 Eliminate problems caused by lost IDs or forgotten passwords. Reduce password administration costs. Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN? Replace hard-to-remember passwords which may be shared or observed. AdvAntAges of biometrics Increase security.
  • 23. multimodAl biometrics system It utilize more than one physiological or behavioral characteristic for enrollment, verification or identification. This system takes advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics.
  • 24. disAdvAntAges of biometrics 1. costly. 2. Facial imaging can also hinder accurate identification. 3. The scanning of eye is fearful. 4. Missing body part problem. 5. False acceptances and rejections. 6. The nervousness that people feel about the scanners identification.March 27, 2015 24
  • 25. conclusion Biometric is an emerging area with many opportunities for growth. Decreasing costs and increasing convenience. Increasing both privacy and identity security. Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past. March 27, 2015 25
  • 28. March 27, 2015 28 Any Questions

Editor's Notes

  1. http://www.hhsc.state.tx.us/Consolidation/Consl_home.html. www.rediris.es/cert/doc/ unixsec/node14.html