SlideShare a Scribd company logo
INTRODUCTIONTO
BIOMETRICTECHNOLOGY
Presented by Rahul Sag
TABLE OF CONTENTS :
-
• Introduction
• What is Biometrics
• History
• How does BIOMETRIC work
• Characteristics
• Types
• Applications
• PROS & CONS of Biometrics
• Conclusion
INTRODUCTION
WHY DO WE NEED BIOMETRICS?
• High security and assurance – Biometric
identification provides the answers to
“something a person has and is” and helps
verify identity.
• User Experience – Convenient and fast.
• Non-transferrable – Everyone has access to a
unique set of biometrics
• Protect sensitive information
WHAT ARE BIOMETRICS?
•Biometrics are automated method in
which we recognize a person with his
Behavioral or Physiological
characteristic.
• Biometrics are used to identify a
person on the basis of its vital
statistics.
•Biometrics differ from person to
HISTORY
• The first biometrics system was created
in 1870 by French anthropologist
named Alphonse Bertillon
• He developed a method of specific body
measurements for classification and
comparison Biometrics of criminals
and victims
DIFFERENTIATING PEOPLE
Its SIMILAR TO GAIT
HOW DOES BIOMETRIC WORK ?
• Every biometric
authentication process needs
a sensor to read
input samples.
• This data is called a template.
• For a single biometric
authentication method,
thousands of image
combinations are generated.
• Biometrics system makes use
of a database storage to store
a combination of template.
• Then these are converted to
WHAT IS A TEMPLATE?
• A biometric template is a set of stored
biometric features or mapping of biometric
features
• MINUTIAE POINT or simply points are
locations where a ridge(dark lines in
fingerprints) becomes discontinues these
are called features
• EXAMPLE USING FINGER PRINT.
CHARACTERISTICS OF
BIOMETRICS
PHYSIOLOGICA
L
• This is related to the
shape of the body.
• Examples include
fingerprint, face
recognition, DNA, Hand
or Palm geometry, Iris
recognition, Vein
patterns, Retina, etc.
BEHAVIOROL
• This is related to the
behavior of a person.
Examples include
typing rhythm, voice.
• Examples include
Signatures,
Keystrokes, Voice
recognition .
TYPES OF BIOMETRICS
BEHAVIRIOL BIOMETRICS
KEYSTROKES
• The rhythms with which
one types at a keyboard
are sufficiently distinctive
to form the basis of the
biometric technology
known as keystroke
dynamics
• Measures the time
between strokes and
duration of key pressed.
Latencies between keystrokes
when writing by two persons
VOICE RECOGNITION
• Identification of the person who is
speaking by characteristics of
their voices (voice biometrics),
also called Voice Patterns.
• The is a difference between
speaker recognition (recognition
who is speaking) and speech
recognition what is being said)
• Pitch
• Quality
• Strength
• Frequency
1. FINGERPRINT RECOGNITION
2. FACE RECOGNITION
3. IRIS RECOGNITION
IN PHYSIOLOGICAL BIOMETRICS
WHICH ARE POPULAR :
PHYSIOLOGICAL BIOMETRICS
FINGERPRINT RECOGNITION
• A fingerprint includes patterns
found on a fingertip.
• There are a variety of
approaches for the fingerprint
verification, such as traditional
police based method and using
pattern-matching devices.
• Fingerprint scanning seems to
be a good choice for in-house
systems. It can be easily found
on smartphones and laptops
FACE RECOGNITION
• Involves identifying a person based on the high-
resolution images captured.
• Thousands of patterns of the face are captured by
the facial recognition device and stored in its
database.
• In subsequent uses, this data is used to match and
authenticate a person.
• This kind of matching is mostly
used in the police and intelligence
departments.
FACE RECOGNITION
• An iris-based biometric authentication involves analyzing features
found in the colored circular tissue that surrounds the pupil.
• The color of the iris determines the color of the eye. This uses a
conventional camera element that helps to capture high-resolution
images depicting the structure of the iris.
• Further, it is more reliable and results in highest pattern matching.
• Measures unique characteristics
of the retina.
• Blood vessel patterns
• Vein patterns
RETINA SCANNING
APPLICATIONS OF BIOMETRICS
1) Commercial
ATM, credit card, cellular phone, distance learning,
etc.
2) Government
ID card, driver’s license, social security, passport
control, etc.
3) Forensic
terrorist identification, missing children, etc.
4) Heath-Care
Access to medical details, Patient Info, etc.
5) Travelling and Immigration
Air Travel, Boarder Crossing, Passport, etc.
6) Institutions and Offices
Biometric time and attendance systems are used in various
22
SOME OF BIOMETRIC SYSTEMS
SOME BIOMETRIC DEVICES
AVAILABLE IN MARKET:
1. Biometric Attendance Management System
2. Safran Morpho Bio-metric Fingerprint Scanner
3. 3M Cogent High Speed Dual Iris Scanner
4. Yale Premium Biometric Fingerprint Digital Door
Lock
BIOMETRICS
PROS:
• Integrate a wide range of biometric solutions and
technologies, customer applications and databases
into a robust and scalable control solution for facility
and network access.
• Unequivocally link an individual to a transaction or
event.
• Reduce password administration costs.
• Replace hard-to-remember passwords which may
be shared or observed.
BIOMETRICS
CONS
• Security of the biometric data: It is crucial that the storage and retrieval
of the biometric data is highly secured. There is a chance that the
thieves will stalk and assault the property owner to gain access. With
the increase in cybercrimes, ransomware attacks such systems must
be kept under high surveillance and the data should be encrypted
using custom algorithms.
• Biological characteristics may change: With age and growth certain
physiological characteristics may change and the biometric
authentication may not work. One has to keep updating the records
over a period of time.
• The match may fail: There could be a case that the system may find
few identical records and may not be able to finalize the match.
CONCLUSION
• This technology is getting better every day and spreading
globally at a faster rate. Voice and fingerprint authentication is
being collaborated with most of the electronic devices.
• In recent times, biometrics based on brain
(electroencephalogram) and heart (electrocardiogram) signals
have emerged. We hope for many such advancements in the
field of the biometrics.
• Of course, every technology has some drawbacks, we should
concentrate on overcoming these drawbacks instead of
crushing the technology.
THANK YOU

More Related Content

Similar to INTRODUCTION TO BIOMETRIC.pptx

Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
MaidaShahbaz3
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometrics
BiometricsBiometrics
Biometrics
Rameesha Sadaqat
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Overview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NOverview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya N
Ravikumar Chilmula
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
preethi3173
 
Biomatric
BiomatricBiomatric
Biomatric
NA000000
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individuals
Vaibhav Bhalotia
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric PresentationAnand Yadav
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
TusharKataria22
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
NareshKireedula
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 

Similar to INTRODUCTION TO BIOMETRIC.pptx (20)

Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Overview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya NOverview on Biometrics by Ch.Ravikumar & Priya N
Overview on Biometrics by Ch.Ravikumar & Priya N
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individuals
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometrics
BiometricsBiometrics
Biometrics
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

INTRODUCTION TO BIOMETRIC.pptx

  • 2. TABLE OF CONTENTS : - • Introduction • What is Biometrics • History • How does BIOMETRIC work • Characteristics • Types • Applications • PROS & CONS of Biometrics • Conclusion
  • 3. INTRODUCTION WHY DO WE NEED BIOMETRICS? • High security and assurance – Biometric identification provides the answers to “something a person has and is” and helps verify identity. • User Experience – Convenient and fast. • Non-transferrable – Everyone has access to a unique set of biometrics • Protect sensitive information
  • 4. WHAT ARE BIOMETRICS? •Biometrics are automated method in which we recognize a person with his Behavioral or Physiological characteristic. • Biometrics are used to identify a person on the basis of its vital statistics. •Biometrics differ from person to
  • 5. HISTORY • The first biometrics system was created in 1870 by French anthropologist named Alphonse Bertillon • He developed a method of specific body measurements for classification and comparison Biometrics of criminals and victims
  • 7. HOW DOES BIOMETRIC WORK ? • Every biometric authentication process needs a sensor to read input samples. • This data is called a template. • For a single biometric authentication method, thousands of image combinations are generated. • Biometrics system makes use of a database storage to store a combination of template. • Then these are converted to
  • 8. WHAT IS A TEMPLATE? • A biometric template is a set of stored biometric features or mapping of biometric features • MINUTIAE POINT or simply points are locations where a ridge(dark lines in fingerprints) becomes discontinues these are called features • EXAMPLE USING FINGER PRINT.
  • 9. CHARACTERISTICS OF BIOMETRICS PHYSIOLOGICA L • This is related to the shape of the body. • Examples include fingerprint, face recognition, DNA, Hand or Palm geometry, Iris recognition, Vein patterns, Retina, etc. BEHAVIOROL • This is related to the behavior of a person. Examples include typing rhythm, voice. • Examples include Signatures, Keystrokes, Voice recognition .
  • 11. BEHAVIRIOL BIOMETRICS KEYSTROKES • The rhythms with which one types at a keyboard are sufficiently distinctive to form the basis of the biometric technology known as keystroke dynamics • Measures the time between strokes and duration of key pressed.
  • 12. Latencies between keystrokes when writing by two persons
  • 13. VOICE RECOGNITION • Identification of the person who is speaking by characteristics of their voices (voice biometrics), also called Voice Patterns. • The is a difference between speaker recognition (recognition who is speaking) and speech recognition what is being said) • Pitch • Quality • Strength • Frequency
  • 14. 1. FINGERPRINT RECOGNITION 2. FACE RECOGNITION 3. IRIS RECOGNITION IN PHYSIOLOGICAL BIOMETRICS WHICH ARE POPULAR : PHYSIOLOGICAL BIOMETRICS
  • 15. FINGERPRINT RECOGNITION • A fingerprint includes patterns found on a fingertip. • There are a variety of approaches for the fingerprint verification, such as traditional police based method and using pattern-matching devices. • Fingerprint scanning seems to be a good choice for in-house systems. It can be easily found on smartphones and laptops
  • 16. FACE RECOGNITION • Involves identifying a person based on the high- resolution images captured. • Thousands of patterns of the face are captured by the facial recognition device and stored in its database. • In subsequent uses, this data is used to match and authenticate a person. • This kind of matching is mostly used in the police and intelligence departments.
  • 17.
  • 18. FACE RECOGNITION • An iris-based biometric authentication involves analyzing features found in the colored circular tissue that surrounds the pupil. • The color of the iris determines the color of the eye. This uses a conventional camera element that helps to capture high-resolution images depicting the structure of the iris. • Further, it is more reliable and results in highest pattern matching.
  • 19.
  • 20. • Measures unique characteristics of the retina. • Blood vessel patterns • Vein patterns RETINA SCANNING
  • 21. APPLICATIONS OF BIOMETRICS 1) Commercial ATM, credit card, cellular phone, distance learning, etc. 2) Government ID card, driver’s license, social security, passport control, etc. 3) Forensic terrorist identification, missing children, etc. 4) Heath-Care Access to medical details, Patient Info, etc. 5) Travelling and Immigration Air Travel, Boarder Crossing, Passport, etc. 6) Institutions and Offices Biometric time and attendance systems are used in various
  • 23. SOME BIOMETRIC DEVICES AVAILABLE IN MARKET: 1. Biometric Attendance Management System 2. Safran Morpho Bio-metric Fingerprint Scanner 3. 3M Cogent High Speed Dual Iris Scanner 4. Yale Premium Biometric Fingerprint Digital Door Lock
  • 24. BIOMETRICS PROS: • Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access. • Unequivocally link an individual to a transaction or event. • Reduce password administration costs. • Replace hard-to-remember passwords which may be shared or observed.
  • 25. BIOMETRICS CONS • Security of the biometric data: It is crucial that the storage and retrieval of the biometric data is highly secured. There is a chance that the thieves will stalk and assault the property owner to gain access. With the increase in cybercrimes, ransomware attacks such systems must be kept under high surveillance and the data should be encrypted using custom algorithms. • Biological characteristics may change: With age and growth certain physiological characteristics may change and the biometric authentication may not work. One has to keep updating the records over a period of time. • The match may fail: There could be a case that the system may find few identical records and may not be able to finalize the match.
  • 26. CONCLUSION • This technology is getting better every day and spreading globally at a faster rate. Voice and fingerprint authentication is being collaborated with most of the electronic devices. • In recent times, biometrics based on brain (electroencephalogram) and heart (electrocardiogram) signals have emerged. We hope for many such advancements in the field of the biometrics. • Of course, every technology has some drawbacks, we should concentrate on overcoming these drawbacks instead of crushing the technology.