SlideShare a Scribd company logo
Biometrics = bios + metron. Bios means life and metron
means measure.
In the terms of computer security, biometrics refers to
authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified .
A Biometrics System is a system for the automated
recognition of individuals based on their behaviour and
biological characteristics. Also called
BEHAVIOMETRICS.
Biometric-based solutions are able to provide for
confidential financial transactions and personal data
privacy
There two types of biometrics
1. Physiological biometrics
2. Behavioral biometrics
Depending on the context, in a biometrics system, there are two
different ways to resolve a person’s identity
I. Verification
II. Identification
VERIFICATION
Comparing a sample against a single stored template is called
verification.
IDENTIFICATION
Search a sample against a database of templates.
1) Physiological biometrics :
Physiological are related to the shape of the body.
EXAMPLES :-
Handprint
Fingerprint
Retina
Face
2) Behavioral biometrics:
Behavioral are related to the behavior of a person.
EXAMPLES :-
Voice/Speech
Handwriting/Signature
Movement Patterns(i.e. typing, walking, etc.)
1) Physiological Biometrics
2) Behavioral Biometrics
Everybody has unique handprints.
A handprint Biometric Systems
scans hand and finger sand the
data is compared with the
specimen stored for you in the
system. The user is allowed or
denied based on the result of this
verification.
Fingerprints are used in forensic
and identification for long time.
Fingerprint Biometric Systems
examine the unique
characteristics of your
fingerprints and use that
information to determine
whether or not you should be
Retina Pattern Biometric system
uses an infrared beam to scan
your retina. Retina pattern
biometric systems examine the
unique characteristics of user’s
retina and compare that
information with stored pattern
to determine whether user should
be allowed access.
A facial recognisation system is a
computer application for
automatically identifying or
verifying a person from a digital
image or a video frame from a
video source.
Voice Patterns Biometric
Systems can also be used for
user authentication. Voice
Patterns Biometric Systems
examine the unique
characteristics of user’s voice.
Signature recognition is a
behavioral biometric. The
dynamics is measured as a
means of the pressure,
direction, acceleration and
the length of the strokes,
dynamics number of strokes
and their duration.
Keystroke Biometric Systems
examine the unique
characteristics of user’s
keystrokes and use that
information to determine
whether the user should be
allowed access.
• Criminal identification
• Prison security
• ATM and other Financial
Transactions
• PC/LAN Login
• Database access
• Border crossing controls
Biometrics
• Costly
• Facial imaging can also hinder
accurate identifications.
• Missing body part problem.
• False acceptances and rejections.
• The amount of comfort.
Security
Authentication
E-commerce and E-
governments
Secure Banking and Financial
Transaction
Digital Rights Management
Healthcare Application
Crime Investigation
Social Services
Time Clocks or Biometric time and attendance systems, which
are being increasingly used in various organizations to control
employee timekeeping.
Biometric safes and biometric locks, provides security to the
homeowners.
Biometric access control systems, providing strong security at
entrances.
Biometric systems are also developed for securing access to pc's
and providing single logon facilities.
Biometrics airport security devices are also deployed at some of
the world's famous airports to enhance the security standards.
Biometrics is a very interesting and exciting field that has be growing
exponentially in recent years (especially 2001).
While Biometric authentication can offer a high degree of security,
they are far from perfect solution.
The influences of biometric technology on society and the risks to
privacy and threat to identify will require meditation through
legislation.
The wide variety of physically unique traits our bodies give us will
soon allow us to live in a very secure password-less world.
QUESTIONS

More Related Content

What's hot

Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
shahab islam
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Biometrics
BiometricsBiometrics
Biometrics
Divya Shah
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
1A255Gauravwankar
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
Shreyans Jain
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 

What's hot (20)

Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 

Similar to Ppt on use of biomatrix in secure e trasaction

Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
palsantosh
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
SundusKhan42
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
FaithCWorth
 
Access control system
Access control systemAccess control system
Access control system
Paheerathan Sabaratnam
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
Sn Moddho
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
Kurukshetra University, Kurukshetra
 
Biometric technologies
Biometric technologies Biometric technologies
Biometric technologies
Brainware University
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
AashishTanania
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
RahulSagar79
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
NareshKireedula
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1yasmeenreem
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1yasmeenreem
 

Similar to Ppt on use of biomatrix in secure e trasaction (20)

Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Access control system
Access control systemAccess control system
Access control system
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometric technologies
Biometric technologies Biometric technologies
Biometric technologies
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Biometrics
Biometrics Biometrics
Biometrics
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometric
Biometric Biometric
Biometric
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1
 

More from Devyani Vaidya

Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
Devyani Vaidya
 
Data warehousing
Data warehousingData warehousing
Data warehousing
Devyani Vaidya
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
Devyani Vaidya
 
Resource management
Resource managementResource management
Resource management
Devyani Vaidya
 
telephone directory
 telephone directory telephone directory
telephone directory
Devyani Vaidya
 
Data as a service
Data as a service Data as a service
Data as a service
Devyani Vaidya
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
Devyani Vaidya
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
Devyani Vaidya
 
Digital locker
Digital lockerDigital locker
Digital locker
Devyani Vaidya
 
Fuels saver system
Fuels saver systemFuels saver system
Fuels saver system
Devyani Vaidya
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Data warehousing
Data warehousingData warehousing
Data warehousing
Devyani Vaidya
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
Devyani Vaidya
 
3D Password
3D Password3D Password
3D Password
Devyani Vaidya
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
Devyani Vaidya
 
Open and Close Door ppt
 Open and Close Door ppt Open and Close Door ppt
Open and Close Door ppt
Devyani Vaidya
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
Devyani Vaidya
 
History of Laptops ppt
History of Laptops pptHistory of Laptops ppt
History of Laptops ppt
Devyani Vaidya
 

More from Devyani Vaidya (18)

Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Resource management
Resource managementResource management
Resource management
 
telephone directory
 telephone directory telephone directory
telephone directory
 
Data as a service
Data as a service Data as a service
Data as a service
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
Digital locker
Digital lockerDigital locker
Digital locker
 
Fuels saver system
Fuels saver systemFuels saver system
Fuels saver system
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
3D Password
3D Password3D Password
3D Password
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
Open and Close Door ppt
 Open and Close Door ppt Open and Close Door ppt
Open and Close Door ppt
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
 
History of Laptops ppt
History of Laptops pptHistory of Laptops ppt
History of Laptops ppt
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

Ppt on use of biomatrix in secure e trasaction

  • 1.
  • 2. Biometrics = bios + metron. Bios means life and metron means measure. In the terms of computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified . A Biometrics System is a system for the automated recognition of individuals based on their behaviour and biological characteristics. Also called BEHAVIOMETRICS. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy
  • 3. There two types of biometrics 1. Physiological biometrics 2. Behavioral biometrics Depending on the context, in a biometrics system, there are two different ways to resolve a person’s identity I. Verification II. Identification VERIFICATION Comparing a sample against a single stored template is called verification. IDENTIFICATION Search a sample against a database of templates.
  • 4. 1) Physiological biometrics : Physiological are related to the shape of the body. EXAMPLES :- Handprint Fingerprint Retina Face 2) Behavioral biometrics: Behavioral are related to the behavior of a person. EXAMPLES :- Voice/Speech Handwriting/Signature Movement Patterns(i.e. typing, walking, etc.) 1) Physiological Biometrics 2) Behavioral Biometrics
  • 5.
  • 6. Everybody has unique handprints. A handprint Biometric Systems scans hand and finger sand the data is compared with the specimen stored for you in the system. The user is allowed or denied based on the result of this verification. Fingerprints are used in forensic and identification for long time. Fingerprint Biometric Systems examine the unique characteristics of your fingerprints and use that information to determine whether or not you should be
  • 7.
  • 8. Retina Pattern Biometric system uses an infrared beam to scan your retina. Retina pattern biometric systems examine the unique characteristics of user’s retina and compare that information with stored pattern to determine whether user should be allowed access. A facial recognisation system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.
  • 9. Voice Patterns Biometric Systems can also be used for user authentication. Voice Patterns Biometric Systems examine the unique characteristics of user’s voice. Signature recognition is a behavioral biometric. The dynamics is measured as a means of the pressure, direction, acceleration and the length of the strokes, dynamics number of strokes and their duration.
  • 10. Keystroke Biometric Systems examine the unique characteristics of user’s keystrokes and use that information to determine whether the user should be allowed access.
  • 11. • Criminal identification • Prison security • ATM and other Financial Transactions • PC/LAN Login • Database access • Border crossing controls Biometrics • Costly • Facial imaging can also hinder accurate identifications. • Missing body part problem. • False acceptances and rejections. • The amount of comfort.
  • 12. Security Authentication E-commerce and E- governments Secure Banking and Financial Transaction Digital Rights Management Healthcare Application Crime Investigation Social Services
  • 13. Time Clocks or Biometric time and attendance systems, which are being increasingly used in various organizations to control employee timekeeping. Biometric safes and biometric locks, provides security to the homeowners. Biometric access control systems, providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities. Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards.
  • 14. Biometrics is a very interesting and exciting field that has be growing exponentially in recent years (especially 2001). While Biometric authentication can offer a high degree of security, they are far from perfect solution. The influences of biometric technology on society and the risks to privacy and threat to identify will require meditation through legislation. The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world.