SlideShare a Scribd company logo
1 of 12
Download to read offline
UNIT 2
BIOMETRICS
Aparna Ajayan
Asst Prof
Forensic science and
criminology Department
RVS COLLEGE
Multimodal Biometrics
• Multimodal biometrics involve using multiple sources of data, like
fingerprints, facial features, iris scans, voice recognition, etc., to
enhance security and accuracy in identity verification.
• This approach is more reliable than using a single biometric modality,
as it combines different traits to reduce the risk of false positives or
negatives.
• Multimodal biometric authentication combines two or more
identifiers, such as fingerprint, face, or iris, to either enhance the user-
experience or boost the security (or both!) of user authentication.
• A multi-modal system combining fingerprint and finger vein
characteristics for biometric recognition would be considered a “multi-
modal” system regardless of whether fingerprint and finger vein
images were captured by different or the same biometric devices.
Characteristics of multimodal biometrics
• Enhanced Accuracy: Multimodal biometrics leverages the strengths of multiple
biometric modalities, reducing the risk of false acceptances or rejections and
increasing overall accuracy.
• Robustness: Combining different biometric traits compensates for individual
variations, environmental factors, and changes over time, leading to more reliable
identification.
• Security: The fusion of multiple biometric traits makes it significantly harder for
impostors to mimic or spoof the system, enhancing overall security.
• Privacy: Unlike unimodal biometrics, which might require the collection of a
single sensitive biometric, multimodal systems can be designed to use non-
sensitive traits, preserving user privacy
• .Flexibility: Multimodal systems can adapt to various scenarios and user
preferences, allowing for a tailored and user-friendly experience
• Integration: These systems can be integrated with existing security
systems or databases, making them suitable for a wide range of
applications, from access control to digital payments.
• Challenges: Implementing multimodal biometrics requires addressing
challenges like data fusion techniques, interoperability, and hardware
compatibility.
• Performance Trade-offs: While offering enhanced accuracy,
multimodal systems may involve increased computational complexity
and cost due to the need for multiple sensors or data processing
methods.
• Continuous Authentication: Multimodal systems can provide
continuous authentication by constantly monitoring and validating
multiple biometric traits, enhancing security in real-time.
• Adaptability: Multimodal systems can adapt to changing conditions
or injuries that might affect one biometric modality, ensuring reliable
identification.
• Usability: Users might find multimodal biometrics more convenient
as they can choose from multiple methods based on context or
preference.
• Ethical Considerations: Implementing multimodal biometrics
requires addressing potential ethical concerns related to privacy,
consent, and potential misuse of sensitive data.
Advantage
• Enhanced Accuracy: Combining multiple biometric modalities improves the
accuracy of identification and reduces the likelihood of false positives and false
negatives.
• Increased Security: Multimodal biometrics provide a higher level of security by
making it difficult for attackers to simultaneously spoof multiple biometric traits.
• Robustness: The system remains reliable even in situations where one biometric
modality might fail due to injuries, changes over time, or environmental
conditions.
• Reduced Vulnerability to Spoofing: It becomes more challenging for attackers to
successfully mimic or spoof multiple biometric traits, enhancing overall system
security.
• User-Friendly: Users have the flexibility to choose the biometric modality that
suits their preferences, making the system more user-friendly. Privacy:
Multimodal systems can be designed to use non-sensitive biometric traits,
preserving user privacy while still maintaining security.
Disadvantage
• Complexity and Cost: Implementing multimodal biometrics can be
more complex and costly due to the need for multiple sensors,
hardware, and data processing techniques.
• Integration Challenges: Integrating multiple biometric modalities
into existing systems might require additional effort and resources.
• Performance Trade-offs: The enhanced accuracy comes at the cost of
increased computational complexity, potentially leading to slower
response times.
• Ethical Concerns: Collecting and storing multiple biometric traits
raises ethical concerns related to user consent, privacy, and potential
misuse of sensitive data.
• User Acceptance: Some users might find the use of multiple biometric
modalities cumbersome or overwhelming, impacting user acceptance.
• Data Storage and Management: Storing and managing data from
multiple biometric traits requires effective data security measures to
prevent breaches.
• Error Propagation: If one of the biometric modalities has errors or
inaccuracies, they can potentially affect the overall accuracy of the
system.
Key Biometric Process
Refer unit 1
Positive And Negative Identification
Positive Identification:
• Positive identification, also known as one-to-one identification or verification, is
the process of confirming the identity of an individual by comparing their biometric
data with a previously enrolled template.
• In positive identification, a person claims an identity (provides an ID, username,
etc.), and their biometric data is compared against a stored template associated with
that identity.
• If the biometric data matches the template within an acceptable margin of error, the
individual's identity is verified positively.
• This process is commonly used in applications like unlocking smartphones or
accessing secure systems using fingerprint, facial recognition, or other biometric
data.
Negative Identification
• Negative identification, also referred to as one-to-many identification
or identification searching, involves searching a biometric database to
determine if an individual's biometric data matches any of the
templates stored in the database.
• Unlike positive identification, where the person provides their identity
and the system verifies it, negative identification is used when the
identity is unknown, and the goal is to find a match within a database
of templates.
• This is commonly used in law enforcement scenarios where a forensic
sample (like a fingerprint left at a crime scene) is compared against a
database to identify potential suspects.

More Related Content

Similar to BIOMETRY - MULTIMODAL BIOMETRICS AND ITS CHARACTERISTICS , POSITIVE AND NEGATIVE IDENTIFICATION

An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsOuzza Brahim
 
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdfintroductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdfJohnLagman3
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
Introduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxIntroduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxJohnLagman3
 
Importance of Biometrics data security.pdf
Importance of Biometrics data security.pdfImportance of Biometrics data security.pdf
Importance of Biometrics data security.pdfSarahLee434084
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksSaif Salah
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptDrBasemMohamedElomda
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredEnterprise Wired
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Advantages of Multimodal Biometrics.pdf
Advantages of Multimodal Biometrics.pdfAdvantages of Multimodal Biometrics.pdf
Advantages of Multimodal Biometrics.pdfBahaa Abdulhadi
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGpharmaindexing
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earMazin Alwaaly
 
Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)lakshmi.ec
 

Similar to BIOMETRY - MULTIMODAL BIOMETRICS AND ITS CHARACTERISTICS , POSITIVE AND NEGATIVE IDENTIFICATION (20)

Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdfintroductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
introductiontobiometricsystemssecurity-150607104617-lva1-app6892.pdf
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Introduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptxIntroduction to BIOMETRICS Security.pptx
Introduction to BIOMETRICS Security.pptx
 
Importance of Biometrics data security.pdf
Importance of Biometrics data security.pdfImportance of Biometrics data security.pdf
Importance of Biometrics data security.pdf
 
Final report
Final reportFinal report
Final report
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and Attacks
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
LECTURE 1 PPT.pptx
LECTURE 1 PPT.pptxLECTURE 1 PPT.pptx
LECTURE 1 PPT.pptx
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Advantages of Multimodal Biometrics.pdf
Advantages of Multimodal Biometrics.pdfAdvantages of Multimodal Biometrics.pdf
Advantages of Multimodal Biometrics.pdf
 
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
 
Pattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and earPattern recognition multi biometrics using face and ear
Pattern recognition multi biometrics using face and ear
 
Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)Douglas2018 article an_overviewofsteganographytechn (1)
Douglas2018 article an_overviewofsteganographytechn (1)
 
Biometrics
BiometricsBiometrics
Biometrics
 

More from AparnaAjayan8

UNIT 5 CJS THE PSYCHOLOGICAL THEORIES IN CJS
UNIT 5 CJS THE PSYCHOLOGICAL THEORIES IN CJSUNIT 5 CJS THE PSYCHOLOGICAL THEORIES IN CJS
UNIT 5 CJS THE PSYCHOLOGICAL THEORIES IN CJSAparnaAjayan8
 
brainelectricaloscillationsignatureprofilingbeos-210703053216 (1).pptx
brainelectricaloscillationsignatureprofilingbeos-210703053216 (1).pptxbrainelectricaloscillationsignatureprofilingbeos-210703053216 (1).pptx
brainelectricaloscillationsignatureprofilingbeos-210703053216 (1).pptxAparnaAjayan8
 
Organization and structure of Indian police.pptx
Organization and structure of Indian police.pptxOrganization and structure of Indian police.pptx
Organization and structure of Indian police.pptxAparnaAjayan8
 
FOOD SAFETY AND STANDARDS INDIANS ACT,2006.pptx
FOOD SAFETY AND STANDARDS INDIANS ACT,2006.pptxFOOD SAFETY AND STANDARDS INDIANS ACT,2006.pptx
FOOD SAFETY AND STANDARDS INDIANS ACT,2006.pptxAparnaAjayan8
 
UNIT 1.pptx victimology basis and terminology
UNIT 1.pptx victimology basis and terminologyUNIT 1.pptx victimology basis and terminology
UNIT 1.pptx victimology basis and terminologyAparnaAjayan8
 
differentialassociationtheory-briancunningham-130429124323-phpapp02.pdf
differentialassociationtheory-briancunningham-130429124323-phpapp02.pdfdifferentialassociationtheory-briancunningham-130429124323-phpapp02.pdf
differentialassociationtheory-briancunningham-130429124323-phpapp02.pdfAparnaAjayan8
 
wildlifeforensic-220628082812-73062d22.pptx
wildlifeforensic-220628082812-73062d22.pptxwildlifeforensic-220628082812-73062d22.pptx
wildlifeforensic-220628082812-73062d22.pptxAparnaAjayan8
 
GENE gene marker blood typing , abo blood typing vntr
GENE gene marker blood typing , abo blood typing vntrGENE gene marker blood typing , abo blood typing vntr
GENE gene marker blood typing , abo blood typing vntrAparnaAjayan8
 
GENE marker typing , abo blood grouping ,karl lamdsteiner
GENE marker typing , abo blood grouping ,karl lamdsteinerGENE marker typing , abo blood grouping ,karl lamdsteiner
GENE marker typing , abo blood grouping ,karl lamdsteinerAparnaAjayan8
 
VICTIMOLOGY DOWRY DEATH HOW IT HELPS CRIMINI=AL JUSTICE SYSTEM
VICTIMOLOGY DOWRY DEATH HOW IT HELPS CRIMINI=AL JUSTICE SYSTEMVICTIMOLOGY DOWRY DEATH HOW IT HELPS CRIMINI=AL JUSTICE SYSTEM
VICTIMOLOGY DOWRY DEATH HOW IT HELPS CRIMINI=AL JUSTICE SYSTEMAparnaAjayan8
 
TERMINAL BALLISTICS.pptx EFFECT OF PROJECTILE ON HIYYING THE TARGET
TERMINAL BALLISTICS.pptx  EFFECT OF PROJECTILE ON HIYYING THE TARGETTERMINAL BALLISTICS.pptx  EFFECT OF PROJECTILE ON HIYYING THE TARGET
TERMINAL BALLISTICS.pptx EFFECT OF PROJECTILE ON HIYYING THE TARGETAparnaAjayan8
 
unit 1 ballistic coeffi.pdf EQUATION HOW TO CALCULATE
unit 1 ballistic coeffi.pdf EQUATION HOW TO CALCULATEunit 1 ballistic coeffi.pdf EQUATION HOW TO CALCULATE
unit 1 ballistic coeffi.pdf EQUATION HOW TO CALCULATEAparnaAjayan8
 
GAIT PATTERN AND THE NALYSIS OF IT AND IMPORTANCE IN FORENSICS
GAIT PATTERN AND THE NALYSIS OF IT AND IMPORTANCE IN FORENSICSGAIT PATTERN AND THE NALYSIS OF IT AND IMPORTANCE IN FORENSICS
GAIT PATTERN AND THE NALYSIS OF IT AND IMPORTANCE IN FORENSICSAparnaAjayan8
 

More from AparnaAjayan8 (13)

UNIT 5 CJS THE PSYCHOLOGICAL THEORIES IN CJS
UNIT 5 CJS THE PSYCHOLOGICAL THEORIES IN CJSUNIT 5 CJS THE PSYCHOLOGICAL THEORIES IN CJS
UNIT 5 CJS THE PSYCHOLOGICAL THEORIES IN CJS
 
brainelectricaloscillationsignatureprofilingbeos-210703053216 (1).pptx
brainelectricaloscillationsignatureprofilingbeos-210703053216 (1).pptxbrainelectricaloscillationsignatureprofilingbeos-210703053216 (1).pptx
brainelectricaloscillationsignatureprofilingbeos-210703053216 (1).pptx
 
Organization and structure of Indian police.pptx
Organization and structure of Indian police.pptxOrganization and structure of Indian police.pptx
Organization and structure of Indian police.pptx
 
FOOD SAFETY AND STANDARDS INDIANS ACT,2006.pptx
FOOD SAFETY AND STANDARDS INDIANS ACT,2006.pptxFOOD SAFETY AND STANDARDS INDIANS ACT,2006.pptx
FOOD SAFETY AND STANDARDS INDIANS ACT,2006.pptx
 
UNIT 1.pptx victimology basis and terminology
UNIT 1.pptx victimology basis and terminologyUNIT 1.pptx victimology basis and terminology
UNIT 1.pptx victimology basis and terminology
 
differentialassociationtheory-briancunningham-130429124323-phpapp02.pdf
differentialassociationtheory-briancunningham-130429124323-phpapp02.pdfdifferentialassociationtheory-briancunningham-130429124323-phpapp02.pdf
differentialassociationtheory-briancunningham-130429124323-phpapp02.pdf
 
wildlifeforensic-220628082812-73062d22.pptx
wildlifeforensic-220628082812-73062d22.pptxwildlifeforensic-220628082812-73062d22.pptx
wildlifeforensic-220628082812-73062d22.pptx
 
GENE gene marker blood typing , abo blood typing vntr
GENE gene marker blood typing , abo blood typing vntrGENE gene marker blood typing , abo blood typing vntr
GENE gene marker blood typing , abo blood typing vntr
 
GENE marker typing , abo blood grouping ,karl lamdsteiner
GENE marker typing , abo blood grouping ,karl lamdsteinerGENE marker typing , abo blood grouping ,karl lamdsteiner
GENE marker typing , abo blood grouping ,karl lamdsteiner
 
VICTIMOLOGY DOWRY DEATH HOW IT HELPS CRIMINI=AL JUSTICE SYSTEM
VICTIMOLOGY DOWRY DEATH HOW IT HELPS CRIMINI=AL JUSTICE SYSTEMVICTIMOLOGY DOWRY DEATH HOW IT HELPS CRIMINI=AL JUSTICE SYSTEM
VICTIMOLOGY DOWRY DEATH HOW IT HELPS CRIMINI=AL JUSTICE SYSTEM
 
TERMINAL BALLISTICS.pptx EFFECT OF PROJECTILE ON HIYYING THE TARGET
TERMINAL BALLISTICS.pptx  EFFECT OF PROJECTILE ON HIYYING THE TARGETTERMINAL BALLISTICS.pptx  EFFECT OF PROJECTILE ON HIYYING THE TARGET
TERMINAL BALLISTICS.pptx EFFECT OF PROJECTILE ON HIYYING THE TARGET
 
unit 1 ballistic coeffi.pdf EQUATION HOW TO CALCULATE
unit 1 ballistic coeffi.pdf EQUATION HOW TO CALCULATEunit 1 ballistic coeffi.pdf EQUATION HOW TO CALCULATE
unit 1 ballistic coeffi.pdf EQUATION HOW TO CALCULATE
 
GAIT PATTERN AND THE NALYSIS OF IT AND IMPORTANCE IN FORENSICS
GAIT PATTERN AND THE NALYSIS OF IT AND IMPORTANCE IN FORENSICSGAIT PATTERN AND THE NALYSIS OF IT AND IMPORTANCE IN FORENSICS
GAIT PATTERN AND THE NALYSIS OF IT AND IMPORTANCE IN FORENSICS
 

Recently uploaded

Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRDelhi Call girls
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptxanandsmhk
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfWadeK3
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PPRINCE C P
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 

Recently uploaded (20)

Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptxUnlocking  the Potential: Deep dive into ocean of Ceramic Magnets.pptx
Unlocking the Potential: Deep dive into ocean of Ceramic Magnets.pptx
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
VIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C PVIRUSES structure and classification ppt by Dr.Prince C P
VIRUSES structure and classification ppt by Dr.Prince C P
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 

BIOMETRY - MULTIMODAL BIOMETRICS AND ITS CHARACTERISTICS , POSITIVE AND NEGATIVE IDENTIFICATION

  • 1. UNIT 2 BIOMETRICS Aparna Ajayan Asst Prof Forensic science and criminology Department RVS COLLEGE
  • 2. Multimodal Biometrics • Multimodal biometrics involve using multiple sources of data, like fingerprints, facial features, iris scans, voice recognition, etc., to enhance security and accuracy in identity verification. • This approach is more reliable than using a single biometric modality, as it combines different traits to reduce the risk of false positives or negatives. • Multimodal biometric authentication combines two or more identifiers, such as fingerprint, face, or iris, to either enhance the user- experience or boost the security (or both!) of user authentication.
  • 3. • A multi-modal system combining fingerprint and finger vein characteristics for biometric recognition would be considered a “multi- modal” system regardless of whether fingerprint and finger vein images were captured by different or the same biometric devices.
  • 4. Characteristics of multimodal biometrics • Enhanced Accuracy: Multimodal biometrics leverages the strengths of multiple biometric modalities, reducing the risk of false acceptances or rejections and increasing overall accuracy. • Robustness: Combining different biometric traits compensates for individual variations, environmental factors, and changes over time, leading to more reliable identification. • Security: The fusion of multiple biometric traits makes it significantly harder for impostors to mimic or spoof the system, enhancing overall security. • Privacy: Unlike unimodal biometrics, which might require the collection of a single sensitive biometric, multimodal systems can be designed to use non- sensitive traits, preserving user privacy • .Flexibility: Multimodal systems can adapt to various scenarios and user preferences, allowing for a tailored and user-friendly experience
  • 5. • Integration: These systems can be integrated with existing security systems or databases, making them suitable for a wide range of applications, from access control to digital payments. • Challenges: Implementing multimodal biometrics requires addressing challenges like data fusion techniques, interoperability, and hardware compatibility. • Performance Trade-offs: While offering enhanced accuracy, multimodal systems may involve increased computational complexity and cost due to the need for multiple sensors or data processing methods. • Continuous Authentication: Multimodal systems can provide continuous authentication by constantly monitoring and validating multiple biometric traits, enhancing security in real-time.
  • 6. • Adaptability: Multimodal systems can adapt to changing conditions or injuries that might affect one biometric modality, ensuring reliable identification. • Usability: Users might find multimodal biometrics more convenient as they can choose from multiple methods based on context or preference. • Ethical Considerations: Implementing multimodal biometrics requires addressing potential ethical concerns related to privacy, consent, and potential misuse of sensitive data.
  • 7. Advantage • Enhanced Accuracy: Combining multiple biometric modalities improves the accuracy of identification and reduces the likelihood of false positives and false negatives. • Increased Security: Multimodal biometrics provide a higher level of security by making it difficult for attackers to simultaneously spoof multiple biometric traits. • Robustness: The system remains reliable even in situations where one biometric modality might fail due to injuries, changes over time, or environmental conditions. • Reduced Vulnerability to Spoofing: It becomes more challenging for attackers to successfully mimic or spoof multiple biometric traits, enhancing overall system security. • User-Friendly: Users have the flexibility to choose the biometric modality that suits their preferences, making the system more user-friendly. Privacy: Multimodal systems can be designed to use non-sensitive biometric traits, preserving user privacy while still maintaining security.
  • 8. Disadvantage • Complexity and Cost: Implementing multimodal biometrics can be more complex and costly due to the need for multiple sensors, hardware, and data processing techniques. • Integration Challenges: Integrating multiple biometric modalities into existing systems might require additional effort and resources. • Performance Trade-offs: The enhanced accuracy comes at the cost of increased computational complexity, potentially leading to slower response times. • Ethical Concerns: Collecting and storing multiple biometric traits raises ethical concerns related to user consent, privacy, and potential misuse of sensitive data.
  • 9. • User Acceptance: Some users might find the use of multiple biometric modalities cumbersome or overwhelming, impacting user acceptance. • Data Storage and Management: Storing and managing data from multiple biometric traits requires effective data security measures to prevent breaches. • Error Propagation: If one of the biometric modalities has errors or inaccuracies, they can potentially affect the overall accuracy of the system.
  • 11. Positive And Negative Identification Positive Identification: • Positive identification, also known as one-to-one identification or verification, is the process of confirming the identity of an individual by comparing their biometric data with a previously enrolled template. • In positive identification, a person claims an identity (provides an ID, username, etc.), and their biometric data is compared against a stored template associated with that identity. • If the biometric data matches the template within an acceptable margin of error, the individual's identity is verified positively. • This process is commonly used in applications like unlocking smartphones or accessing secure systems using fingerprint, facial recognition, or other biometric data.
  • 12. Negative Identification • Negative identification, also referred to as one-to-many identification or identification searching, involves searching a biometric database to determine if an individual's biometric data matches any of the templates stored in the database. • Unlike positive identification, where the person provides their identity and the system verifies it, negative identification is used when the identity is unknown, and the goal is to find a match within a database of templates. • This is commonly used in law enforcement scenarios where a forensic sample (like a fingerprint left at a crime scene) is compared against a database to identify potential suspects.