SlideShare a Scribd company logo
OUT LINE
 Why Biometric Authentication?
 Frauds in industry
 Identification vs. Authentication
What is Biometrics?
 The automated use behavioral and physiological
characteristics to determine or veiry an identity.
Know
HaveBe
Rapid!
Frauds in industry happens in the
following situations:
 Safety deposit boxes and vaults
 Bank transaction like ATM withdrawals
 Access to computers and emails
 Credit Card purchase
 Purchase of house, car, clothes or jewellery
 Getting official documents like birth certificates or
passports
 Obtaining court papers
 Drivers licence
 Getting into confidential workplace
 writing Checks
Why Biometric Application?
 To prevent stealing of possessions that
mark the authorised person's identity e.g.
security badges, licenses, or properties
 To prevent fraudulent acts like faking ID
badges or licenses.
 To ensure safety and security, thus
decrease crime rates
Identification vs. Authentication
Identification Authentication
It determines the identity of
the person.
It determines whether the
person is indeed who he
claims to be.
No identity claim
Many-to-one mapping.
Cost of computation ∝
number of record of users.
Identity claim from the user
One-to-one mapping.
The cost of computation is
independent of the number of
records of users.
Captured biometric signatures
come from a set of known
biometric feature stored in the
system.
Captured biometric signatures
may be unknown to the
system.
Types of Biometrics
 Fingerprint
 Face Recognition  Session III
 Hand Geometry
 Iris Scan
 Voice Scan  Session II
 Signature
 Retina Scan
 Infrared Face and Body Parts
 Keystroke Dynamics
 Gait
 Odour
 Ear
 DNA
Hand Geometry
•Captured using a CCD camera, or LED
•Orthographic Scanning
•Recognition System’s Crossover = 0.1%
IrisCode
Face
Principal Component Analysis
Desired Properties
 Universality
 Uniqueness
 Permanence
 Collectability
 Performance
 User’s Accpetability
 Robustness against Circumvention
Comparison
Biometric Type Accuracy Ease of Use User Acceptance
Fingerprint High Medium Low
Hand Geometry Medium High Medium
Voice Medium High High
Retina High Low Low
Iris Medium Medium Medium
Signature Medium Medium High
Face Low High High
Application by Technologies
Biometrics Vendors Market
Share
Applications
Fingerprint 90 34% Law enforcement; civil
government; enterprise
security; medical and
financial transactionsHand Geometry - 26% Time and attendance systems,
physical access
Face
Recognition
12 15% Transaction authentication;
picture ID duplication
prevention; surveillance
Voice
Authentication
32 11% Security, V-commerce
Iris Recognition 1 9% Banking, access control

More Related Content

What's hot

Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
nayakslideshare
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
M2SYS Technology
 
How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?
Stephany Gochuico
 
How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...
Linxens Group
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
NEC Public Safety
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
ClubHack
 
xyzmo Company Overview
xyzmo Company Overviewxyzmo Company Overview
xyzmo Company Overview
Namirial GmbH
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
IVR Technology Group
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
Veridium
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In Malaysia
FICO
 
Digitizing Healthcare Identity - Lessons Learned - Brenan Isabelle
Digitizing Healthcare Identity - Lessons Learned  - Brenan IsabelleDigitizing Healthcare Identity - Lessons Learned  - Brenan Isabelle
Digitizing Healthcare Identity - Lessons Learned - Brenan Isabelle
IdentityNorthEvents
 
E banking & security
E banking & securityE banking & security
E banking & security
Sumeer Sharma
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
indragantiSaiHiranma
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
Teo Leonard
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
Syed Akhtar-Uz-Zaman
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 

What's hot (18)

Biometric
 Biometric Biometric
Biometric
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
The Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in BankingThe Benefits of Using Biometrics in Banking
The Benefits of Using Biometrics in Banking
 
How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?
 
How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
xyzmo Company Overview
xyzmo Company Overviewxyzmo Company Overview
xyzmo Company Overview
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Survey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In MalaysiaSurvey: Identity Authentication For Banks In Malaysia
Survey: Identity Authentication For Banks In Malaysia
 
Digitizing Healthcare Identity - Lessons Learned - Brenan Isabelle
Digitizing Healthcare Identity - Lessons Learned  - Brenan IsabelleDigitizing Healthcare Identity - Lessons Learned  - Brenan Isabelle
Digitizing Healthcare Identity - Lessons Learned - Brenan Isabelle
 
E banking & security
E banking & securityE banking & security
E banking & security
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 

Viewers also liked

Framework7
Framework7Framework7
Framework7
lrsilva99
 
Tarjeta de felicitacion
Tarjeta de felicitacionTarjeta de felicitacion
Tarjeta de felicitacion
carmen lucerohuaman
 
SPC Water Framework Directive_Final
SPC Water Framework Directive_FinalSPC Water Framework Directive_Final
SPC Water Framework Directive_FinalStephen Barry
 
Herramientas de la web 2.0
Herramientas de la web 2.0Herramientas de la web 2.0
Herramientas de la web 2.0
carmen lucerohuaman
 
Herramientas de la web 2.0
Herramientas de la web 2.0Herramientas de la web 2.0
Herramientas de la web 2.0
carmen lucerohuaman
 
ใบงานสำรวจตนเอง M615 09
ใบงานสำรวจตนเอง M615 09ใบงานสำรวจตนเอง M615 09
ใบงานสำรวจตนเอง M615 09
nattanit yuyuenyong
 
Gramatika engleskog jezika
Gramatika engleskog jezika Gramatika engleskog jezika
Gramatika engleskog jezika Jelena Šijan
 
Pengenalan customer relationship management
Pengenalan customer relationship managementPengenalan customer relationship management
Pengenalan customer relationship management
Jagoan Koding
 

Viewers also liked (10)

Framework7
Framework7Framework7
Framework7
 
Tarjeta de felicitacion
Tarjeta de felicitacionTarjeta de felicitacion
Tarjeta de felicitacion
 
SPC Water Framework Directive_Final
SPC Water Framework Directive_FinalSPC Water Framework Directive_Final
SPC Water Framework Directive_Final
 
Herramientas de la web 2.0
Herramientas de la web 2.0Herramientas de la web 2.0
Herramientas de la web 2.0
 
shivamettke
shivamettkeshivamettke
shivamettke
 
Herramientas de la web 2.0
Herramientas de la web 2.0Herramientas de la web 2.0
Herramientas de la web 2.0
 
ใบงานสำรวจตนเอง M615 09
ใบงานสำรวจตนเอง M615 09ใบงานสำรวจตนเอง M615 09
ใบงานสำรวจตนเอง M615 09
 
Marirza
MarirzaMarirza
Marirza
 
Gramatika engleskog jezika
Gramatika engleskog jezika Gramatika engleskog jezika
Gramatika engleskog jezika
 
Pengenalan customer relationship management
Pengenalan customer relationship managementPengenalan customer relationship management
Pengenalan customer relationship management
 

Similar to Introduction tobiometrics

BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
Roy Awais
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
Roy Awais
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
Girish Kengar
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
Gagan Gowda
 
Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
sachin yadav
 
The Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationThe Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity Verification
FTx Identity
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometric
Biometric Biometric
Biometric
Pratish Sardar
 
Electronic Identity Verification: Key to Unlocking Business Success
Electronic Identity Verification:  Key to Unlocking Business SuccessElectronic Identity Verification:  Key to Unlocking Business Success
Electronic Identity Verification: Key to Unlocking Business Success
FTx Identity
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Biometrics
BiometricsBiometrics
Biometrics
anjalika sinha
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
DigitalPersona
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
desire120
 
Innovations in Identity Capture and Verification.pdf
Innovations in Identity Capture and Verification.pdfInnovations in Identity Capture and Verification.pdf
Innovations in Identity Capture and Verification.pdf
GargiBen
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
Bahaa Abdulhadi
 
Our Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprisesOur Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprises
Suruli Kannan
 

Similar to Introduction tobiometrics (20)

BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
The Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationThe Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity Verification
 
Biometric
 Biometric Biometric
Biometric
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric
Biometric Biometric
Biometric
 
Electronic Identity Verification: Key to Unlocking Business Success
Electronic Identity Verification:  Key to Unlocking Business SuccessElectronic Identity Verification:  Key to Unlocking Business Success
Electronic Identity Verification: Key to Unlocking Business Success
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Innovations in Identity Capture and Verification.pdf
Innovations in Identity Capture and Verification.pdfInnovations in Identity Capture and Verification.pdf
Innovations in Identity Capture and Verification.pdf
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
Our Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprisesOur Voice Biometrics Experience with Global enterprises
Our Voice Biometrics Experience with Global enterprises
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Introduction tobiometrics

  • 1.
  • 2. OUT LINE  Why Biometric Authentication?  Frauds in industry  Identification vs. Authentication
  • 3. What is Biometrics?  The automated use behavioral and physiological characteristics to determine or veiry an identity. Know HaveBe Rapid!
  • 4. Frauds in industry happens in the following situations:  Safety deposit boxes and vaults  Bank transaction like ATM withdrawals  Access to computers and emails  Credit Card purchase  Purchase of house, car, clothes or jewellery  Getting official documents like birth certificates or passports  Obtaining court papers  Drivers licence  Getting into confidential workplace  writing Checks
  • 5. Why Biometric Application?  To prevent stealing of possessions that mark the authorised person's identity e.g. security badges, licenses, or properties  To prevent fraudulent acts like faking ID badges or licenses.  To ensure safety and security, thus decrease crime rates
  • 6. Identification vs. Authentication Identification Authentication It determines the identity of the person. It determines whether the person is indeed who he claims to be. No identity claim Many-to-one mapping. Cost of computation ∝ number of record of users. Identity claim from the user One-to-one mapping. The cost of computation is independent of the number of records of users. Captured biometric signatures come from a set of known biometric feature stored in the system. Captured biometric signatures may be unknown to the system.
  • 7. Types of Biometrics  Fingerprint  Face Recognition  Session III  Hand Geometry  Iris Scan  Voice Scan  Session II  Signature  Retina Scan  Infrared Face and Body Parts  Keystroke Dynamics  Gait  Odour  Ear  DNA
  • 8. Hand Geometry •Captured using a CCD camera, or LED •Orthographic Scanning •Recognition System’s Crossover = 0.1%
  • 11. Desired Properties  Universality  Uniqueness  Permanence  Collectability  Performance  User’s Accpetability  Robustness against Circumvention
  • 12. Comparison Biometric Type Accuracy Ease of Use User Acceptance Fingerprint High Medium Low Hand Geometry Medium High Medium Voice Medium High High Retina High Low Low Iris Medium Medium Medium Signature Medium Medium High Face Low High High
  • 13. Application by Technologies Biometrics Vendors Market Share Applications Fingerprint 90 34% Law enforcement; civil government; enterprise security; medical and financial transactionsHand Geometry - 26% Time and attendance systems, physical access Face Recognition 12 15% Transaction authentication; picture ID duplication prevention; surveillance Voice Authentication 32 11% Security, V-commerce Iris Recognition 1 9% Banking, access control

Editor's Notes

  1. Odour: sensor arrays  sensor descriptors (a set of vocabulary) Main Obstacles: sensors may drift, of suffer from poisoning, limited lifetime (constantly replaced), Not as sensitive as human nose. Complicated by the use of deodorants, perfumes and diets We are looking for instruments capable of distinguishing invariant components of human odour
  2. CCD = Charged coupled device, LED = Light Emitting Diodes
  3. 2D Gabor wavelets 256 bytes