SlideShare a Scribd company logo
A PAPER PRESENTATION
              ON

BIOMETRICS TECHNOLOGY



                        Presented by
                Presented By:
                P.Srinivas ( 07W81A0542)
                Seetu mishra
                M.Anusha (07W81A0507)
                cse: 2nd yr
                Arjun college of tech &
                science
1.Introduction
2.Security and Authentication
3.Methods of verification
      1. Psychological verification
          a) Finger Print
          b) Hand Print.
          c) Face Measurement.
          d) Retinal Scanning
          e) DNA Analysis.
      • Behavioral verification
          1. Typing.
          2. Signature.
          3. Voice.
a)Identification.
b)Applications.
c)Advantages .
d)Limitations.
e)Conclusion.
f)1st UID project in maharastra
g)References
1. Biometrics is derived from the conjunction of the Greek words
   bios and metrics that mean life and to measure respectively.
2. Biometrics is an accurate method of authentication that uses the
   physiological and biological traits of a person to verify and
   establish their identity.
3. A Biometrics system is actually a pattern recognition system that
   utilizes various patterns like iris patterns, retina patterns and
   biological traits like fingerprints, facial geometry, voice
   recognition and hand recognition etc….
Functionality of Biometric device:
1. First , it checks whether we are who we claim we are i.e. It sets off
   to verify our identity.
2. Second, it tries to find out who we are, i.e. It sets off to establish
   an identity.
3. Biometrics goes far from the traditional systems and thus helps in
   tightening internet security
Authentication is the process of Giving
Permissions
Example:-
Microsoft SQL Server uses permissions to
enforce database security
SQL Server's permissions system recognizes
four types of users: the SA, database owners,
database object owners, and other users of
the database.
Methods of
Verification

  Psychological
  Psychological   Behavioural
                   Behavioural
  verification
  verification    verification
                  verification
Fingerprint:
Fingerprint:
It involves the user placing his finger over a glass-
plate, which resides over a high-resolution camera,
which uses optical or electromagnetic means to
take its snapshot. The software analysis your
finger for pattern such as loops, worls and arches


Pros:
a. This technology is neither too expensive
nor does it require extensive user training.

b. It also simple to implement.
c. Finger print system has FAR<0.5%
d. It is oldest known technique that is still
used in criminal records and forensic.

 Cons:
 1.Any injures of fingers effect more.
Hand print:
    It compares a 3D image of the users
    hand to that present in the system
    database. It is somewhat similar to
    finger print verification.
Pros:
        a. Accuracy is better than
fingerprint.
        b. Cheap and easy to deploy.
 Cons:
    a) Complex in usage.
    b) Implementation is expensive.
    c) Any damages to hand effect
       more.
   Applications:
        San Francisco International
        Airport
        Immigration facilities
        Day Care Centers
Face measurement:


Measuring this is as simple as taking a picture
and analyzing the image from a security video
capture. This technique enables the computer
to use your face as your password and
matching these to an existing database

  Pros:
           a. Mot continents at public
              places.
  creams also effect the measurements.
           b. Less expensive.

  Cons:
      Inaccurate is affected by changes in
      lighting, age, and movement, glass.
      Face
Retinal scans:
             Retinal scans:


It involves imaging of the blood vessels in the
retina of the eye when infrared light of a certain
frequency and wavelength is incident upon it.this
energy is absorbed by the blood vessels is
different in different individuals.

The retinal iris patterns are unique to individuals
than any biometric yet devised.

        The retina is an internal part of the eye
located at the back of the eye and is get of thin
nerve which sense the light coming through a
camera, pupil, eye lenses.

        The pattern of blood vessels which
makeup retina are unique to each individual i.e.,
<1.2 inch.
Retinal scans:
Pros:
          a. Accurate with no false match in 2 million
people.
          b. It s sophisticated process.
Cons:
   Expensive, difficult to deploy and use.
   Focus of light effect measurements.
 Applications:
    High-end security: military, power
    plans
DNA Analysis:
         It involves in checking the DNA pattern
of a human used when physical characteristics
are unrecognizable. It is used to identify people,
who are died, to find out the relationship like
identifying Childs natural parents.

        This is one Biometric that is judicially
accepted. No human have identified DNA
patterns except in twins.

Advantages:
        a. DNA samples can be collected from
toothbrush, clothes.

Disadvantages:
    DNA testing takes longer time than other
    methods.
    Twins have same DNA.
    Researchers produce same DNA.
Typing:
Some systems measure things
you do in addition to the
things you are, you will notice
that your typing has a certain
pattern. Some letters follow
others in quick succession,
while others take longer.
         Software called Bio
password is available for less
than $100.It integrates with
Windows 2000.Windows
NT.Login to provide this
authentication without the
need for any additional
software. This measure is a
behavioral characteristic of a
person.
Signature:

         Some qualities looked into
include acceleration rates, direction,
and pressure and stroke length. Here
mainly concentrate on pressures. This
pressures stored in back end for
future significations.
 
Disadvantages:
          a. The disadvantage with the
technology lies in the randomness or
the consistency with which a user
makes his signature. If pressures are
not tally with stored pressure in the
database
    Applications
       Access to documents
       Execution of contracts
       Banking services
Voice

        It involves in the recognition of
the voice of the individual. 
Pros:
It is inexpensive.
It also works through telephone.
Some person mimicry with other person
voices.
Cons:
         a. One can mimic the voice of
the individual.
 Biometric does not guarantee security.
It simply offers ore convenient and
reliable means of identification and
authentication
 Applications:
    Call Centers
    Law enforcement – house arrest authentication
    Electronic commerce
    Customer authentication for service calls
Percentage Of Usage Of Verifications
Percentage Of Usage Of Verifications
Identification

It is a process of recognition and involves taking the biometric data and searching for
the match in the database asking it a slow process that it is more prone to errors.
                             It involves confirming your identity and the biometric
systems have to match your data with only one, single record.
           Depending on the technique used, Biometric have varying levels of
accuracy .The system might let you pass in one attempt on Monday and require five on
Tuesday.
           The accuracy of any biometric system is measured in terms of FAR and FRR.

FAR (False Acceptance Rates):
         Where an imposer is accepted as a match. It is a probability of falsely
accepting a metric as a match.

FRR (False Rejection Rates):
          Where a legal match is denied. Where the system sails to recognize an
authentic Bio-signature.
          As FRR increases, the FAR goes down and vice versa.
Almost all biometric systems can be adjusted to varying levels of strictness to create a
variation in FAR and FRR. For a system to be successful, both have to be with in
acceptable low limits.
      Applications
                                                 Cellular 
                                                  phone 
                              Computer 
                               Computer          industry
                              networks
                               networks



                                                         Internet 
  Network 
   Network 
security and 
 security and                                            Banking 
authenicatio
 authenicatio
     nn




                                            Voting
                   Multi                   Solutions
                  national 
                 companie
                      s
Advantages

1. It provide good security mechanism than all other security
   methods
2. It never fails in security constraints.
3. In public locations such as banks and airports a large number
   of people transit every day including known criminals.
4. Face recognition systems attached to video surveillance
   systems are supposed to help catch them.
 
1st UPI PROJECT IN MAHARASTRA
The worlds first ID project on biometric data is
     
used to provide unique identification numbers for
India billion plus citizens rolled out on Wednesday
with prime minister Man Mohan Singh & UPS chief
Sonia Gandhi. Handling over the 1st set of 12 digit
no to 10 tribals .
It is a biometric based data including from
fingerprint & iris scan is being used 1st time in the
world to provide cost effective, nationally valid &
verifiable single source of id proof through an
authentication infrastructure.  
Limitations

1. It needs high memory space in the back
   end.
2. Collect data for security is difficult
3. Some times fails the security with right
   users
4. Any time data loose in database high
   effect for security mechanism.
5. So many equipments are needed for
   provide this technology.
6. It highly expensive
Conclusions
Security is not just about putting big locks on the front door; it also
involves making sure all the windows are shut.

Each one can be individually fooled, but the comparison makes the
system more secure as a whole.

Biometrics are have its own advantages and disadvantages. It high
expensive but it provide good security.

Money is not important than security. It is more useful for confidential
maters.
References
i. http://Biometrics.com
ii.http://whitepapers.com
iii.http://www.milesresearch.com
iv.http://microsoft/biometrics.com
v.D.c paper 30th september 2010
Seetu

More Related Content

What's hot

BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
 
Final report
Final reportFinal report
Final report
Pranjul Mishra
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
Abduhalim Beknazarov
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
Ned Hayes
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
Tenet Systems Pvt Ltd
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
Arhind Gautam
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
 

What's hot (20)

BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Final report
Final reportFinal report
Final report
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biometrics
BiometricsBiometrics
Biometrics
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 

Viewers also liked

Pembentangan Calon Sekolah Kluster 2012
Pembentangan Calon Sekolah Kluster 2012Pembentangan Calon Sekolah Kluster 2012
Pembentangan Calon Sekolah Kluster 2012Sk Ganda Temengor
 
Who IS Miles Farnham?
Who IS Miles Farnham?Who IS Miles Farnham?
Who IS Miles Farnham?Warpeg
 
Final formations
Final formationsFinal formations
Final formationsCalvin Hok
 
E keratan akhbar harian 10 okt 2011
E keratan akhbar harian 10 okt 2011E keratan akhbar harian 10 okt 2011
E keratan akhbar harian 10 okt 2011nzaty
 
Canarsee - pressure ratings for pvc pipe
Canarsee - pressure ratings for pvc pipeCanarsee - pressure ratings for pvc pipe
Canarsee - pressure ratings for pvc pipe
Canarsee
 
business communication
business communicationbusiness communication
business communicationHimani Shukla
 
referencias y citas
referencias y citasreferencias y citas
referencias y citas
tupor
 
human resource management (concept)
human resource management (concept) human resource management (concept)
human resource management (concept) Himani Shukla
 
Formations
FormationsFormations
Formations
Calvin Hok
 
Final formations
Final formationsFinal formations
Final formationsCalvin Hok
 
Final formations
Final formationsFinal formations
Final formationsCalvin Hok
 
Final formations
Final formationsFinal formations
Final formationsCalvin Hok
 
Portafolios_Dr Humberto González
Portafolios_Dr Humberto GonzálezPortafolios_Dr Humberto González
Le contenu web & multiplateformes : stratégies et bonnes pratiques
Le contenu web & multiplateformes : stratégies et bonnes pratiquesLe contenu web & multiplateformes : stratégies et bonnes pratiques
Le contenu web & multiplateformes : stratégies et bonnes pratiques
Catherine BL
 
Comment gérer sa réputation sur Facebook
Comment gérer sa réputation sur FacebookComment gérer sa réputation sur Facebook
Comment gérer sa réputation sur Facebook
jeromelecoeur
 

Viewers also liked (20)

New deal 2013
New deal 2013New deal 2013
New deal 2013
 
Pembentangan Calon Sekolah Kluster 2012
Pembentangan Calon Sekolah Kluster 2012Pembentangan Calon Sekolah Kluster 2012
Pembentangan Calon Sekolah Kluster 2012
 
Projects Portfolio
Projects PortfolioProjects Portfolio
Projects Portfolio
 
Who IS Miles Farnham?
Who IS Miles Farnham?Who IS Miles Farnham?
Who IS Miles Farnham?
 
Final formations
Final formationsFinal formations
Final formations
 
E keratan akhbar harian 10 okt 2011
E keratan akhbar harian 10 okt 2011E keratan akhbar harian 10 okt 2011
E keratan akhbar harian 10 okt 2011
 
Canarsee - pressure ratings for pvc pipe
Canarsee - pressure ratings for pvc pipeCanarsee - pressure ratings for pvc pipe
Canarsee - pressure ratings for pvc pipe
 
business communication
business communicationbusiness communication
business communication
 
Profil SK Ganda Temengor
Profil SK Ganda TemengorProfil SK Ganda Temengor
Profil SK Ganda Temengor
 
referencias y citas
referencias y citasreferencias y citas
referencias y citas
 
human resource management (concept)
human resource management (concept) human resource management (concept)
human resource management (concept)
 
Formations
FormationsFormations
Formations
 
Final formations
Final formationsFinal formations
Final formations
 
Final formations
Final formationsFinal formations
Final formations
 
Final formations
Final formationsFinal formations
Final formations
 
Portafolios_Dr Humberto González
Portafolios_Dr Humberto GonzálezPortafolios_Dr Humberto González
Portafolios_Dr Humberto González
 
Portafolios Humberto González
Portafolios Humberto GonzálezPortafolios Humberto González
Portafolios Humberto González
 
Le contenu web & multiplateformes : stratégies et bonnes pratiques
Le contenu web & multiplateformes : stratégies et bonnes pratiquesLe contenu web & multiplateformes : stratégies et bonnes pratiques
Le contenu web & multiplateformes : stratégies et bonnes pratiques
 
Comment gérer sa réputation sur Facebook
Comment gérer sa réputation sur FacebookComment gérer sa réputation sur Facebook
Comment gérer sa réputation sur Facebook
 
Ni visee managem
Ni visee managemNi visee managem
Ni visee managem
 

Similar to Seetu

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
ANEESH SASIDHARAN
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
Kumar Goud
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
ehab_madda
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
sachin yadav
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Biometrics
BiometricsBiometrics
Biometrics
biometrics12
 
How can biometric technology be used to fight cybercrime and cyber rel.docx
How can biometric technology be used to fight cybercrime and cyber rel.docxHow can biometric technology be used to fight cybercrime and cyber rel.docx
How can biometric technology be used to fight cybercrime and cyber rel.docx
tpaula2
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
Swapnil Bangera
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
N010438890
N010438890N010438890
N010438890
IOSR Journals
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
Mudit Mishra
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
 

Similar to Seetu (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
How can biometric technology be used to fight cybercrime and cyber rel.docx
How can biometric technology be used to fight cybercrime and cyber rel.docxHow can biometric technology be used to fight cybercrime and cyber rel.docx
How can biometric technology be used to fight cybercrime and cyber rel.docx
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
N010438890
N010438890N010438890
N010438890
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Seetu

  • 1. A PAPER PRESENTATION ON BIOMETRICS TECHNOLOGY Presented by Presented By: P.Srinivas ( 07W81A0542) Seetu mishra M.Anusha (07W81A0507) cse: 2nd yr Arjun college of tech & science
  • 2. 1.Introduction 2.Security and Authentication 3.Methods of verification 1. Psychological verification a) Finger Print b) Hand Print. c) Face Measurement. d) Retinal Scanning e) DNA Analysis. • Behavioral verification 1. Typing. 2. Signature. 3. Voice. a)Identification. b)Applications. c)Advantages . d)Limitations. e)Conclusion. f)1st UID project in maharastra g)References
  • 3. 1. Biometrics is derived from the conjunction of the Greek words bios and metrics that mean life and to measure respectively. 2. Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity. 3. A Biometrics system is actually a pattern recognition system that utilizes various patterns like iris patterns, retina patterns and biological traits like fingerprints, facial geometry, voice recognition and hand recognition etc…. Functionality of Biometric device: 1. First , it checks whether we are who we claim we are i.e. It sets off to verify our identity. 2. Second, it tries to find out who we are, i.e. It sets off to establish an identity. 3. Biometrics goes far from the traditional systems and thus helps in tightening internet security
  • 4. Authentication is the process of Giving Permissions Example:- Microsoft SQL Server uses permissions to enforce database security SQL Server's permissions system recognizes four types of users: the SA, database owners, database object owners, and other users of the database.
  • 5. Methods of Verification Psychological Psychological Behavioural Behavioural verification verification verification verification
  • 6.
  • 7. Fingerprint: Fingerprint: It involves the user placing his finger over a glass- plate, which resides over a high-resolution camera, which uses optical or electromagnetic means to take its snapshot. The software analysis your finger for pattern such as loops, worls and arches Pros: a. This technology is neither too expensive nor does it require extensive user training. b. It also simple to implement. c. Finger print system has FAR<0.5% d. It is oldest known technique that is still used in criminal records and forensic. Cons: 1.Any injures of fingers effect more.
  • 8. Hand print: It compares a 3D image of the users hand to that present in the system database. It is somewhat similar to finger print verification. Pros: a. Accuracy is better than fingerprint. b. Cheap and easy to deploy. Cons: a) Complex in usage. b) Implementation is expensive. c) Any damages to hand effect more. Applications: San Francisco International Airport Immigration facilities Day Care Centers
  • 9. Face measurement: Measuring this is as simple as taking a picture and analyzing the image from a security video capture. This technique enables the computer to use your face as your password and matching these to an existing database Pros: a. Mot continents at public places. creams also effect the measurements. b. Less expensive. Cons: Inaccurate is affected by changes in lighting, age, and movement, glass. Face
  • 10. Retinal scans: Retinal scans: It involves imaging of the blood vessels in the retina of the eye when infrared light of a certain frequency and wavelength is incident upon it.this energy is absorbed by the blood vessels is different in different individuals. The retinal iris patterns are unique to individuals than any biometric yet devised. The retina is an internal part of the eye located at the back of the eye and is get of thin nerve which sense the light coming through a camera, pupil, eye lenses. The pattern of blood vessels which makeup retina are unique to each individual i.e., <1.2 inch.
  • 11. Retinal scans: Pros: a. Accurate with no false match in 2 million people. b. It s sophisticated process. Cons: Expensive, difficult to deploy and use. Focus of light effect measurements. Applications: High-end security: military, power plans
  • 12. DNA Analysis: It involves in checking the DNA pattern of a human used when physical characteristics are unrecognizable. It is used to identify people, who are died, to find out the relationship like identifying Childs natural parents. This is one Biometric that is judicially accepted. No human have identified DNA patterns except in twins. Advantages: a. DNA samples can be collected from toothbrush, clothes. Disadvantages: DNA testing takes longer time than other methods. Twins have same DNA. Researchers produce same DNA.
  • 13.
  • 14. Typing: Some systems measure things you do in addition to the things you are, you will notice that your typing has a certain pattern. Some letters follow others in quick succession, while others take longer. Software called Bio password is available for less than $100.It integrates with Windows 2000.Windows NT.Login to provide this authentication without the need for any additional software. This measure is a behavioral characteristic of a person.
  • 15. Signature: Some qualities looked into include acceleration rates, direction, and pressure and stroke length. Here mainly concentrate on pressures. This pressures stored in back end for future significations.   Disadvantages: a. The disadvantage with the technology lies in the randomness or the consistency with which a user makes his signature. If pressures are not tally with stored pressure in the database Applications Access to documents Execution of contracts Banking services
  • 16. Voice It involves in the recognition of the voice of the individual.  Pros: It is inexpensive. It also works through telephone. Some person mimicry with other person voices. Cons: a. One can mimic the voice of the individual. Biometric does not guarantee security. It simply offers ore convenient and reliable means of identification and authentication Applications: Call Centers Law enforcement – house arrest authentication Electronic commerce Customer authentication for service calls
  • 17. Percentage Of Usage Of Verifications Percentage Of Usage Of Verifications
  • 18. Identification It is a process of recognition and involves taking the biometric data and searching for the match in the database asking it a slow process that it is more prone to errors. It involves confirming your identity and the biometric systems have to match your data with only one, single record. Depending on the technique used, Biometric have varying levels of accuracy .The system might let you pass in one attempt on Monday and require five on Tuesday. The accuracy of any biometric system is measured in terms of FAR and FRR. FAR (False Acceptance Rates): Where an imposer is accepted as a match. It is a probability of falsely accepting a metric as a match. FRR (False Rejection Rates): Where a legal match is denied. Where the system sails to recognize an authentic Bio-signature. As FRR increases, the FAR goes down and vice versa. Almost all biometric systems can be adjusted to varying levels of strictness to create a variation in FAR and FRR. For a system to be successful, both have to be with in acceptable low limits.
  • 19.       Applications Cellular  phone  Computer  Computer  industry networks networks Internet  Network  Network  security and  security and  Banking  authenicatio authenicatio nn Voting Multi  Solutions national  companie s
  • 20. Advantages 1. It provide good security mechanism than all other security   methods 2. It never fails in security constraints. 3. In public locations such as banks and airports a large number of people transit every day including known criminals. 4. Face recognition systems attached to video surveillance systems are supposed to help catch them.
  • 21.   1st UPI PROJECT IN MAHARASTRA The worlds first ID project on biometric data is   used to provide unique identification numbers for India billion plus citizens rolled out on Wednesday with prime minister Man Mohan Singh & UPS chief Sonia Gandhi. Handling over the 1st set of 12 digit no to 10 tribals . It is a biometric based data including from fingerprint & iris scan is being used 1st time in the world to provide cost effective, nationally valid & verifiable single source of id proof through an authentication infrastructure.  
  • 22. Limitations 1. It needs high memory space in the back end. 2. Collect data for security is difficult 3. Some times fails the security with right users 4. Any time data loose in database high effect for security mechanism. 5. So many equipments are needed for provide this technology. 6. It highly expensive
  • 23. Conclusions Security is not just about putting big locks on the front door; it also involves making sure all the windows are shut. Each one can be individually fooled, but the comparison makes the system more secure as a whole. Biometrics are have its own advantages and disadvantages. It high expensive but it provide good security. Money is not important than security. It is more useful for confidential maters.