SlideShare a Scribd company logo
Slide 1: 
Biometrics is the science and technology of measuring and analyzing biological 
data. 
Biometrics are automated methods of recognizing a person based on a 
physiological or 
behavioral characteristics. 
Slide 2: 
there are two types of biometrics based on chracteristics, Physiological and 
Behavioral. 
face recognition, fingerprints,hand geometry, and retinal scan come under the 
physiological 
category. signature and voice recognition come under behavioral category. 
Slide 3: 
A one to one comparison of a captured biometric with a stored template to verify 
that the 
individual is who he claims to be. In a verification,the user must first enter 
his or her identity 
to the biometric system. then it is compared to the one stored in database, it 
must be a perfect 
match to gain gain access. 
Slide 4: 
first we look into the behavioural biometrics.voice recognition is defined as 
the automated 
verification of a person’s claimed identity,based on unique characteristics of 
their voice. 
Noise reduction algorithms can be employed to improve accuracy, but incorrect 
application can 
have the opposite effect.Voice recognization requires large amount of computer 
storage, people's 
voices can change,and also background noises can interfere. 
Slide 5: 
the angle at which the pen is held 
the number of times the pen is lifted, 
the time it takes to write the entire signature 
the pressure exerted by the person while signing, 
the variations in the speed with which different parts of the signature are 
written. 
It can be operated in two 
different ways: Static: In this mode, users write their signature on paper, 
digitize it through an optical scanner 
or a camera, and the biometric system recognizes the signature analyzing its 
shape. This group 
is also known as ’off-line’.Dynamic: In this mode, users write their signature 
in a digitizing tablet, 
which acquires the signature in real time. 
Slide 6: 
this scan analysis of the unique shape, pattern and positioning of facial 
features. 
Passive biometrics and does not require a persons cooperation. 
Highly complex technology and largely software based. 
and also uses Up to 128 Eigen vectors are created for each person in order to 
achieve unmistakable 
identification. it is considerably more expensive and complex than other
methods, such as passwords, or 
identification cards. 
slide 7 
A fingerprint in its narrow sense is an impression left by the friction ridges 
of a human finger. 
The major minutia features of fingerprint ridges are ridge ending, bifurcation, 
and short ridge (or dot). 
The ridge ending is the point at which a ridge terminates. Bifurcations are 
points at which a single ridge 
splits into two ridges. Short ridges (or dots) are ridges which are 
significantly shorter than the average ridge 
length on the fingerprint. Minutiae and patterns are very important in the 
analysis of fingerprints since no 
two fingers have been shown to be identical. 
Oldest form of Biometrics,Highly Reliable,Uses distinctive features of 
fingers,High Security access, 
Reduce cost,Instance Report. 
slide 8: 
Hand geometry recognition is the longest implemented biometric type, debuting in 
the market in the 
late 1980s. The devices use a simple concept of measuring and recording the 
length, width, thickness, 
and surface area of an individual’s hand while guided on a plate. Hand geometry 
systems use a camera 
to capture a image of the hand. The hand of the subject is placed on the plate, 
palm down, 
and guided by five pegs that sense when the hand is in place. although its not 
as accurate as retinal scan 
and fingerprints and less reliable. 
slide 9: 
It is analyzing the layer of blood vessels situated at the back of the eye. 
The machine takes around ten seconds to shine a ’low intensity coherent light 
source 
onto the retina to illuminate the blood vessels.Retinal scanners have several 
advantages 
over fingerprinting and voice recognition systems. They do not require as much 
computer 
memory as a fingerprint scan, and they are not subject to contamination from 
dirt or finger 
misplacement. Unlike voice recognition systems, retinal scanner are not 
distracted by background 
noise or changes in voice caused by illness. The main disadvantage of the 
retinal scanner is that the 
person has to focus on the scanner from about three inches away. This 
restriction makes the device 
difficult for ATM use because a person using a cash machine rarely focuses on 
one area very long and 
is never close enough.A new device called an iris scanner may prove more useful 
for these casual 
transactions, since the scanning camera can be farther away and only has to scan 
the pattern of the 
iris (colored portion) of the eye, a procedure which does not require focusing 
on the camera. but it can 
be fooled by wearing lens 
conclusion:
Not perfect yet, Missing body part problem.,Decreasing costs and increasing 
convenience. ,Increasing 
both privacy and identity security. ,The field of biometrics is evolving. 
,Benefit from this technology 
Technology is growing rapidly, but at the same time security breaches and 
transactions 
frauds are also in the increase world over.All agencies including libraries who 
are in need 
of security and safety have to adopt biometrics . The next few years you will 
see just about every 
thing come with biometric protection. Mobile phones, MP3 players, cars, laptop 
computers, building 
access, locker access.Let us hope for safe and secure future.

More Related Content

What's hot

Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
Anit Thapaliya
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
Alexandru Dorobantu
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
Raghavendra DC
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
Roshen Berenger
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
Prabh Jeet
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
Sadan Khan
 
Seminar
SeminarSeminar
Seminar
Nidhi Nayan
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
aminpathan11
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
Abhishek Mishra
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
Amit Pandey
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
Arnab Podder
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
sachin yadav
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
Suhas Deshpande
 

What's hot (20)

Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Seminar
SeminarSeminar
Seminar
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 

Viewers also liked

Cs10 updates draft
Cs10 updates draftCs10 updates draft
Cs10 updates draft
Devin Murphy
 
Slide Explanation Of ISRO (By Kalyanam Kiran)
Slide Explanation Of ISRO (By Kalyanam Kiran)Slide Explanation Of ISRO (By Kalyanam Kiran)
Slide Explanation Of ISRO (By Kalyanam Kiran)
Kalyanam Kiran
 
Living with diabetes and making healthy food choices ii
Living with diabetes and making healthy food choices iiLiving with diabetes and making healthy food choices ii
Living with diabetes and making healthy food choices ii
KarenKramser
 
ISRO (By Kalyanam Kiran)
ISRO (By Kalyanam Kiran)ISRO (By Kalyanam Kiran)
ISRO (By Kalyanam Kiran)
Kalyanam Kiran
 
BAKTERI
BAKTERIBAKTERI
BAKTERI
Riariani
 
I
II
Pygym
PygymPygym
Ppt peranan protista putri yuliandari
Ppt peranan protista putri yuliandariPpt peranan protista putri yuliandari
Ppt peranan protista putri yuliandari
PutriYuliandari
 
IT Consultant - Intellimatch/Recon/ERP
IT Consultant - Intellimatch/Recon/ERPIT Consultant - Intellimatch/Recon/ERP
IT Consultant - Intellimatch/Recon/ERP
Sanjay Kumar
 

Viewers also liked (9)

Cs10 updates draft
Cs10 updates draftCs10 updates draft
Cs10 updates draft
 
Slide Explanation Of ISRO (By Kalyanam Kiran)
Slide Explanation Of ISRO (By Kalyanam Kiran)Slide Explanation Of ISRO (By Kalyanam Kiran)
Slide Explanation Of ISRO (By Kalyanam Kiran)
 
Living with diabetes and making healthy food choices ii
Living with diabetes and making healthy food choices iiLiving with diabetes and making healthy food choices ii
Living with diabetes and making healthy food choices ii
 
ISRO (By Kalyanam Kiran)
ISRO (By Kalyanam Kiran)ISRO (By Kalyanam Kiran)
ISRO (By Kalyanam Kiran)
 
BAKTERI
BAKTERIBAKTERI
BAKTERI
 
I
II
I
 
Pygym
PygymPygym
Pygym
 
Ppt peranan protista putri yuliandari
Ppt peranan protista putri yuliandariPpt peranan protista putri yuliandari
Ppt peranan protista putri yuliandari
 
IT Consultant - Intellimatch/Recon/ERP
IT Consultant - Intellimatch/Recon/ERPIT Consultant - Intellimatch/Recon/ERP
IT Consultant - Intellimatch/Recon/ERP
 

Similar to kiran's slide info

Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
Shiva Krishna Chandra Shekar
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
Dharmendrasingh417
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
sakshi_20
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
Shiva Krishna Chandra Shekar
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
 
Biometric
BiometricBiometric
Biometric
NikhilKumar1203
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
scg121433
 
PPT (2)
PPT (2)PPT (2)
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
YUSRA FERNANDO
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
Chitrachedu Dada Kalandar
 
Biometrics
BiometricsBiometrics
Biometrics
Shivani Gautam
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
Abhishek Walia
 

Similar to kiran's slide info (20)

Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Biometric
BiometricBiometric
Biometric
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 

Recently uploaded

原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
facilitymanager11
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
a9qfiubqu
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
VyNguyen709676
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
yuvarajkumar334
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
exukyp
 

Recently uploaded (20)

原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024Monthly Management report for the Month of May 2024
Monthly Management report for the Month of May 2024
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
 

kiran's slide info

  • 1. Slide 1: Biometrics is the science and technology of measuring and analyzing biological data. Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristics. Slide 2: there are two types of biometrics based on chracteristics, Physiological and Behavioral. face recognition, fingerprints,hand geometry, and retinal scan come under the physiological category. signature and voice recognition come under behavioral category. Slide 3: A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. In a verification,the user must first enter his or her identity to the biometric system. then it is compared to the one stored in database, it must be a perfect match to gain gain access. Slide 4: first we look into the behavioural biometrics.voice recognition is defined as the automated verification of a person’s claimed identity,based on unique characteristics of their voice. Noise reduction algorithms can be employed to improve accuracy, but incorrect application can have the opposite effect.Voice recognization requires large amount of computer storage, people's voices can change,and also background noises can interfere. Slide 5: the angle at which the pen is held the number of times the pen is lifted, the time it takes to write the entire signature the pressure exerted by the person while signing, the variations in the speed with which different parts of the signature are written. It can be operated in two different ways: Static: In this mode, users write their signature on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the signature analyzing its shape. This group is also known as ’off-line’.Dynamic: In this mode, users write their signature in a digitizing tablet, which acquires the signature in real time. Slide 6: this scan analysis of the unique shape, pattern and positioning of facial features. Passive biometrics and does not require a persons cooperation. Highly complex technology and largely software based. and also uses Up to 128 Eigen vectors are created for each person in order to achieve unmistakable identification. it is considerably more expensive and complex than other
  • 2. methods, such as passwords, or identification cards. slide 7 A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. The major minutia features of fingerprint ridges are ridge ending, bifurcation, and short ridge (or dot). The ridge ending is the point at which a ridge terminates. Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint. Minutiae and patterns are very important in the analysis of fingerprints since no two fingers have been shown to be identical. Oldest form of Biometrics,Highly Reliable,Uses distinctive features of fingers,High Security access, Reduce cost,Instance Report. slide 8: Hand geometry recognition is the longest implemented biometric type, debuting in the market in the late 1980s. The devices use a simple concept of measuring and recording the length, width, thickness, and surface area of an individual’s hand while guided on a plate. Hand geometry systems use a camera to capture a image of the hand. The hand of the subject is placed on the plate, palm down, and guided by five pegs that sense when the hand is in place. although its not as accurate as retinal scan and fingerprints and less reliable. slide 9: It is analyzing the layer of blood vessels situated at the back of the eye. The machine takes around ten seconds to shine a ’low intensity coherent light source onto the retina to illuminate the blood vessels.Retinal scanners have several advantages over fingerprinting and voice recognition systems. They do not require as much computer memory as a fingerprint scan, and they are not subject to contamination from dirt or finger misplacement. Unlike voice recognition systems, retinal scanner are not distracted by background noise or changes in voice caused by illness. The main disadvantage of the retinal scanner is that the person has to focus on the scanner from about three inches away. This restriction makes the device difficult for ATM use because a person using a cash machine rarely focuses on one area very long and is never close enough.A new device called an iris scanner may prove more useful for these casual transactions, since the scanning camera can be farther away and only has to scan the pattern of the iris (colored portion) of the eye, a procedure which does not require focusing on the camera. but it can be fooled by wearing lens conclusion:
  • 3. Not perfect yet, Missing body part problem.,Decreasing costs and increasing convenience. ,Increasing both privacy and identity security. ,The field of biometrics is evolving. ,Benefit from this technology Technology is growing rapidly, but at the same time security breaches and transactions frauds are also in the increase world over.All agencies including libraries who are in need of security and safety have to adopt biometrics . The next few years you will see just about every thing come with biometric protection. Mobile phones, MP3 players, cars, laptop computers, building access, locker access.Let us hope for safe and secure future.