SlideShare a Scribd company logo
Project name: Biometrics (physical security)
• Group no:
• Collage name : Ganpat university / B.S Patel Polytechnic
• Class: Computer-B(CE-52)
• Project by: 1)Patel Riddhi
2)Patel Saxi
3)Patel Shital
• Guidelines by: Prof . Ankit Raval
CONTENTS
• Introduction
• Definition
• Procedure
• Terms of Biometrics
• Characteristics
• Recognition Techniques
• Applications
• Conclusion
INTRODUCTION
Information security is concerned with the assurance of
confidentially , integrity and Availability of information in all forms.
This is the ancient Greek word:
bios=“life” and metron=“measure”
DEFINATION
Biometrics refers to the automatic identification of a person based
on his/her physiological or behavioural characteristics.
Terms of biometrics
CHARACTERISTICS
Fingerprint Recognition
This includes the following:
1.Small ridges
2.Spaces between to temporarily divergent ridges
3.Spurs (a notch protruding from a ridges)
4.bridges
Hand geometry
Hand geometry is and automated measurement of
many dimensions of hand.
Iris scanning
Iris scanning measures the iris pattern in the coloured
part of the eye.
VOICE RECOGNITION
Voice Recognition uses vocal characteristics
to identify individuals using a pass phrase.
Telephone or microphone can serve as a
sensor.
SIGNATURE VERIFICATION
An automated method of measuring individual’s signature.
This technology examines speed , direction and pressure while
writing.
KEYSTROKE IDENTIFICATION
It is an automated method of examining an individual’s
key strokes on keyboard.
This technology examines speed . pressure and total
time taken to type particular words.
Also the time elapsed between hitting certain keys.
APPLICATIONS
•Prevent unauthorized access to ATMS, Cellular phones Desktop PCs.
•Criminal identification.
•In automobiles biometrics can replace keys with keyless entry
devices.
•Airport security.
CONCLUSION
•Biometrics is an emerging area with many opportunities for growth.
•Possibly in the near future , you will not have to remember PINs and
passwords and key in your bags or pockets will be things of the past.

More Related Content

Similar to ns.project.pptx

Biometrics
BiometricsBiometrics
Biometrics
Atul Singh
 
Biometrics
BiometricsBiometrics
Biometrics
Atul Singh
 
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
1A245MohitTitarmare
 
Biometric
BiometricBiometric
Biometric
Kazirida
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
Sheel Shah
 
Farheen123
Farheen123Farheen123
Farheen123
farheentaj9
 
Biometric technologies
Biometric technologies Biometric technologies
Biometric technologies
Brainware University
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
AashishTanania
 
Biometrics
BiometricsBiometrics
Biometrics
Sukhdeep Kaur
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
SundusKhan42
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
RahulSagar79
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
Kishor Singh
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
nagasukanya1
 
Bio Chip Presentation
Bio Chip PresentationBio Chip Presentation
Bio Chip Presentation
Sujanth Sebamalaithasan
 
E0364024030
E0364024030E0364024030
E0364024030
inventionjournals
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
Raga Deepthi
 
MAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdfMAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdf
20BAI017HarshVasisht
 
Bio shiv
Bio shivBio shiv
Bio shiv
Shivank Garg
 

Similar to ns.project.pptx (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
 
Biometric
BiometricBiometric
Biometric
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Farheen123
Farheen123Farheen123
Farheen123
 
Biometric technologies
Biometric technologies Biometric technologies
Biometric technologies
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Biometrics
BiometricsBiometrics
Biometrics
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
 
Bio Chip Presentation
Bio Chip PresentationBio Chip Presentation
Bio Chip Presentation
 
E0364024030
E0364024030E0364024030
E0364024030
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
MAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdfMAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdf
 
Bio shiv
Bio shivBio shiv
Bio shiv
 

More from PrincePatel272012

DataAnalyticsIntroduction and its ci.pptx
DataAnalyticsIntroduction and its ci.pptxDataAnalyticsIntroduction and its ci.pptx
DataAnalyticsIntroduction and its ci.pptx
PrincePatel272012
 
Iot-Internet-of-Things-how its work.pptx
Iot-Internet-of-Things-how its work.pptxIot-Internet-of-Things-how its work.pptx
Iot-Internet-of-Things-how its work.pptx
PrincePatel272012
 
digital forensic in pharmacy science department
digital forensic in pharmacy science departmentdigital forensic in pharmacy science department
digital forensic in pharmacy science department
PrincePatel272012
 
Pr-2_DM.pptx
Pr-2_DM.pptxPr-2_DM.pptx
Pr-2_DM.pptx
PrincePatel272012
 
Pr-1_DM.pptx
Pr-1_DM.pptxPr-1_DM.pptx
Pr-1_DM.pptx
PrincePatel272012
 
Pr-4_Vitualization.pptx
Pr-4_Vitualization.pptxPr-4_Vitualization.pptx
Pr-4_Vitualization.pptx
PrincePatel272012
 
Windows Azure(Pr-1).ppt.pptx
Windows Azure(Pr-1).ppt.pptxWindows Azure(Pr-1).ppt.pptx
Windows Azure(Pr-1).ppt.pptx
PrincePatel272012
 

More from PrincePatel272012 (7)

DataAnalyticsIntroduction and its ci.pptx
DataAnalyticsIntroduction and its ci.pptxDataAnalyticsIntroduction and its ci.pptx
DataAnalyticsIntroduction and its ci.pptx
 
Iot-Internet-of-Things-how its work.pptx
Iot-Internet-of-Things-how its work.pptxIot-Internet-of-Things-how its work.pptx
Iot-Internet-of-Things-how its work.pptx
 
digital forensic in pharmacy science department
digital forensic in pharmacy science departmentdigital forensic in pharmacy science department
digital forensic in pharmacy science department
 
Pr-2_DM.pptx
Pr-2_DM.pptxPr-2_DM.pptx
Pr-2_DM.pptx
 
Pr-1_DM.pptx
Pr-1_DM.pptxPr-1_DM.pptx
Pr-1_DM.pptx
 
Pr-4_Vitualization.pptx
Pr-4_Vitualization.pptxPr-4_Vitualization.pptx
Pr-4_Vitualization.pptx
 
Windows Azure(Pr-1).ppt.pptx
Windows Azure(Pr-1).ppt.pptxWindows Azure(Pr-1).ppt.pptx
Windows Azure(Pr-1).ppt.pptx
 

Recently uploaded

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 

Recently uploaded (12)

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 

ns.project.pptx

  • 1. Project name: Biometrics (physical security) • Group no: • Collage name : Ganpat university / B.S Patel Polytechnic • Class: Computer-B(CE-52) • Project by: 1)Patel Riddhi 2)Patel Saxi 3)Patel Shital • Guidelines by: Prof . Ankit Raval
  • 2.
  • 3. CONTENTS • Introduction • Definition • Procedure • Terms of Biometrics • Characteristics • Recognition Techniques • Applications • Conclusion
  • 4. INTRODUCTION Information security is concerned with the assurance of confidentially , integrity and Availability of information in all forms. This is the ancient Greek word: bios=“life” and metron=“measure”
  • 5. DEFINATION Biometrics refers to the automatic identification of a person based on his/her physiological or behavioural characteristics. Terms of biometrics
  • 7.
  • 8. Fingerprint Recognition This includes the following: 1.Small ridges 2.Spaces between to temporarily divergent ridges 3.Spurs (a notch protruding from a ridges) 4.bridges
  • 9. Hand geometry Hand geometry is and automated measurement of many dimensions of hand.
  • 10. Iris scanning Iris scanning measures the iris pattern in the coloured part of the eye.
  • 11. VOICE RECOGNITION Voice Recognition uses vocal characteristics to identify individuals using a pass phrase. Telephone or microphone can serve as a sensor.
  • 12. SIGNATURE VERIFICATION An automated method of measuring individual’s signature. This technology examines speed , direction and pressure while writing.
  • 13. KEYSTROKE IDENTIFICATION It is an automated method of examining an individual’s key strokes on keyboard. This technology examines speed . pressure and total time taken to type particular words. Also the time elapsed between hitting certain keys.
  • 14. APPLICATIONS •Prevent unauthorized access to ATMS, Cellular phones Desktop PCs. •Criminal identification. •In automobiles biometrics can replace keys with keyless entry devices. •Airport security.
  • 15. CONCLUSION •Biometrics is an emerging area with many opportunities for growth. •Possibly in the near future , you will not have to remember PINs and passwords and key in your bags or pockets will be things of the past.