Topic: BIOMETRICS 
Presented By:- 
Ch Ravikumar T.E.ENTC 
Priya N T.E.ENTC
Contents 
1.Defination 
2.Generic Biometric 
System 
3.Types of biometrics 
4.Biometric System 
Vulnerabilities 
5.Security Approaches
Biometrics 
 “It is a physiological or behavioral 
characteristic of a human being that can 
distinguish one person from another and 
that theoretically can be used for 
identification or verification of identity.” 
Who are you? Prove it.
Generic Biometric System 
Enrollment 
Biometrics 
Sensor 
Identification 
Biometrics 
Sensor 
Template 
Database 
Feature Extractor 
Feature Extractor 
Feature Matcher
Types of biometrics
Face Recognition 
• A face image can be 
acquired using a 
normal, off-the-shelf 
camera 
• Easy to accept by 
the public 
• Cost is rather low
Finger Printing 
• Used in forensics 
more than 
100 years 
• Optical, capacitive 
readers 
• Liveness detection
Finger Printing
Hand Geometry 
•Captured using a 
CCD camera, or LED 
•Orthographic 
Scanning 
•The system is often 
bulky
Eyes:Iris,Retina 
• Extracts features 
from the colored 
tissue surrounding 
the pupil. 
• Monochrome 
camera with visible 
and near infra red 
light 
• Liveness detection
DNA 
• Deoxyribonucliec 
Acid 
• Contains Genetic 
information 
• Differentiated 
using base pairs
Keystrokes 
• No special 
hardware 
Required 
• Transparent 
capture
Voice 
• Speaker recognition uses 
a microphone to record 
the voice 
• Your voice can vary with 
age, illness and 
emotions 
• Interesting with the 
increasing use of mobile 
phones
Biometric System Vulnerabilities 
Biometric 
System 
Vulnerabilities 
Adversary 
Attacks 
Spoofing 
Template 
database 
leakage 
Intrinsic 
Limitations
Intrinsic Limitations 
• False Non- 
Match 
• False match 
• Zero effort 
attack
Adversary Attacks 
• Caused due to 
negligence of 
authorized persons 
• An adversary 
exploiting the 
system security 
using insiders 
• Direct attack on the 
sensors
Spoof Attacks
Template Database leakage 
• Biometric template information becomes 
available to an adversary 
• Easier to recover by using reverse 
engineering
Security Approaches 
• Biometric Feature Transformations 
• Cryptosystems
FUTURE METHODS 
Face recognition through blood vessels
FUTURE METHODS 
Brainwave recognition
Any Questions……
Overview on Biometrics by Ch.Ravikumar & Priya N

Overview on Biometrics by Ch.Ravikumar & Priya N