SlideShare a Scribd company logo
Sardar Patel Memorial Society’s (Trust)
RAJIV GANDHI COLLEGE OF ENGINEERING,
RESEARCH AND TECHNOLOGY,
CHANDRAPUR
Department of Computer Science and Engineering
SEMESTER- III
SESSION-2022-23
A SEMINAR ON
BIOMETRIC TECHNOLOGY
Under the guidance of
Prof. MINAKSHI GETKAR
AND
SEMINAR IN-CHARGE
Prof. RUPATAI LICHODE
Presented By-
GAURAV MANOHAR WANKAR[CSEC322]
CONTENTS:-
 History
 Introduction(What is Biometrics?)
 Role of biometric technology
 Modes of biometric system
 Block Diagram
 Types of biometrics
 Biometrics Devices
 Benefits
 Advantages and Disadvantages
 Applications
 Conclusion
 References
HISTORY:-
 The first real biometric system was created in 1870 by
French anthropologist Alphonse Bertillion and turned
biometrics a distinguished field of study.
 The first classification method for fingerprints was
developed in 1892 by Sir. Francis Galton.
INTRODUCTION:-
-What is biometric?
 The word "biometrics" is derived from the Greek
words 'bios' and 'metric‘ which means life and
measurement respectively.
 Biometrics are automated methods of recognizing a
person based on a physiological or behavioral
characteristic.
 Biometrics technologies measure a particular set of a
person's vital statistics in order to determine identity.
ROLE OF BIOMETRICS TECHNOLOGIES
IN INFORMATION SECURITY:-
• Effective way to prove the true identity of individual
users
• Biometric devices create a more ambiguous and user
friendly environment
• Biometric devices measure unique characteristic of
each person
MODES OF BIOMETRIC SYSTEM:-
 Verification mode:- The system performs a one-to-
one comparison of a captured biometric with a specific
template stored in a biometric database in order to verify
the individual is the person they claim to be.
 Identification mode:- The system performs a one-to-
many comparison against a biometric database in an
attempt to establish the identity of an unknown
individual.
BLOCK DIAGRAM OF BIOMETRIC SYSTEM:-
TYPES OF BIOMETRICS:-
 Behavioral Biometrics- It is the scientific study of
how people’s and animal’s bodies function(Used for
verification) .
 Physical Biometrics- It refers to physiological
features on the human body that can serve as
identification or verification, such as fingerprint or
retina scan.
BEHAVIORAL BIOMETRICS:-
 Voice Recognition:- It is the ability of the machine or
program to receive and interpret dictation or to
understand and carry out spoken commands.
 Signature:- An authentication method that uses the
dynamics of a person’s handwritten signature.
 Keystroke Dynamics:- It is the method of identifying
or conforming the identity of an individual based on
the manner and the rhythm of typing on a keyboard.
PHYSICAL BIOMETRICS:-
 Fingerprint Recognition:- The technology which
identifies and verifies a person’s fingerprint with data
saved in it before hand.
 Facial Recognition:- It is a well exposed technology
which maps facial features from a photograph or video
and compares the information with a database of known
faces to find a match.
 Iris recognition:- It is an automated method of
biometric identification, taking unique patterns within a
ring shaped region surrounding the pupil of each eye.
BIOMETRIC DEVICES:-
 Fingerprint Scanner
 Facial Scanner
 Iris Scanner
FINGERPRINT SCANNER:-
 It is used for recognizing and authenticating the
fingerprint of an individual.
 A fingerprint scanner scans a human finger then
process it to map by the points of loops and ridges of
finger.
 This map then been converted in templets.
 Then matcher compares two templets and gives results
and the final result will be displayed by software.
 Fingerprint reader and the scanner are safe and
reliable devices for any security authentication.
FACIAL SCANNER:-
 A scanner (application) scans the geometry (structure)
of applicants face.
 Then a set of algorithms converts it into binary
number and stores it in database.
 Then at time of identification matcher compares the
new and stored face.
 Application shows the result and gives access.
IRIS SCANNER:-
 An iris scanner scans the iris inwards to the pupil edge.
 Then an algorithm make a map by the plotted marks
of iris(usually 173 points).
 This map is then transferred to numbers and make
templets.
 Then at time of identification matchers compares the
new and stored iris.
 Application shows the result and gives access.
BENEFITS OF USING BIOMETRIC SYSTEM OVER
TRADITIONAL AUTHENTICATION SYSTEMS:-
• Invariant: Biometric traits are invariant over time as smart
cards get damaged over time but biometric traits doesn’t.
• Accountability: If there is a security breach, then
biometric ensures who can be the responsible person for
the breach but in traditional methods, smart cards can be
stolen and used by someone else. Hence, accountable
person is easily identifiable now days by using biometric.
• Easy to use: Biometric systems are easy to use.
• Convenient: User doesn’t have to remember passwords,
pins and keep safe the smart cards like before.
• More secure: Biometric trait can’t be stolen or copied.
ADVANTAGES AND DISADVANTAGES
OF BIOMETRIC TECHNOLOGY:-
Advantages:- Disadvantages:-
 High security and assurance –
Biometric identification
provides the answers to
“something a person has and is”
and helps verify identity
 User Experience – Convenient
and fast
 Non-transferrable – Everyone
has access to a unique set of
biometrics
 Spoof-proof – Biometrics are
hard to fake or steal
 Costs – Significant investment
needed in biometrics for
security
 Data breaches – Biometric
databases can still be hacked
 Tracking and data – Biometric
devices like facial recognition
systems can limit privacy for
users
 False positives and inaccuracy –
False rejects and false accepts
can still occur preventing select
users from accessing systems
APPLICATIONS:-
• Banking/Credit
• Computer/ Network Security
• Mobile Phone Security
• Business and Residential Access Control
• Law Enforcement
• Automobile Security/ Access Control
• Military ID
• Hotel Access Control
• Time and Attendance
CONCLUSION:-
 Biometrics can only be limited by limiting one's
imagination.
 Biometric technology is now being used in almost
every area.
 Biometric is a emerging area with many opportunities
for growth.
 Possible in the near future you will not have to
remember PINs and PASSWORD and keys in your
bags or pockets will be things of the past.
REFERENCES:-
www.geeksforgeeks.org/biometric-system-architecture
www.slideshare.net
www.academia.edu
www.studymafia.org
www.javatpoint.com
THANK YOU!!

More Related Content

What's hot

Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
Pavani839789
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics
BiometricsBiometrics
Biometrics
Divya Shah
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
vineeth chepuri
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
Shreyans Jain
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Biometrics
BiometricsBiometrics
Biometrics
senejug
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
Sn Moddho
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
Pavan Kumar MT
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 

Similar to SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx

SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
1A245MohitTitarmare
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
Siddharth Kishan
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
NareshKireedula
 
Access control system
Access control systemAccess control system
Access control system
Paheerathan Sabaratnam
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 

Similar to SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx (20)

SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOG0Y.1pptx.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Biometrics
BiometricsBiometrics
Biometrics
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Access control system
Access control systemAccess control system
Access control system
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 

Recently uploaded

Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
SuryaKalyan3
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
zvaywau
 
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, BesCLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
aditiyad2020
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
aditiyad2020
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
SuryaKalyan3
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
angelicafronda7
 
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
zvaywau
 
IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
Aine Greaney Ellrott
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
luforfor
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
ZackSpencer3
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
iraqartsandculture
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
CristianMestre
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
taqyed
 
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives ProjectthGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
Marc Dusseiller Dusjagr
 
The Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance LindallThe Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance Lindall
BBaez1
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
ClaireWilson398082
 
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menangSundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Situs Slot gacor dan terpercaya
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
beduwt
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
luforfor
 

Recently uploaded (20)

Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
 
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, BesCLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
 
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
 
European Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdfEuropean Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdf
 
IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
 
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives ProjectthGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
 
The Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance LindallThe Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance Lindall
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
 
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menangSundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menang
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
 

SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx

  • 1. Sardar Patel Memorial Society’s (Trust) RAJIV GANDHI COLLEGE OF ENGINEERING, RESEARCH AND TECHNOLOGY, CHANDRAPUR Department of Computer Science and Engineering SEMESTER- III SESSION-2022-23 A SEMINAR ON BIOMETRIC TECHNOLOGY Under the guidance of Prof. MINAKSHI GETKAR AND SEMINAR IN-CHARGE Prof. RUPATAI LICHODE Presented By- GAURAV MANOHAR WANKAR[CSEC322]
  • 2. CONTENTS:-  History  Introduction(What is Biometrics?)  Role of biometric technology  Modes of biometric system  Block Diagram  Types of biometrics  Biometrics Devices  Benefits  Advantages and Disadvantages  Applications  Conclusion  References
  • 3. HISTORY:-  The first real biometric system was created in 1870 by French anthropologist Alphonse Bertillion and turned biometrics a distinguished field of study.  The first classification method for fingerprints was developed in 1892 by Sir. Francis Galton.
  • 4. INTRODUCTION:- -What is biometric?  The word "biometrics" is derived from the Greek words 'bios' and 'metric‘ which means life and measurement respectively.  Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.  Biometrics technologies measure a particular set of a person's vital statistics in order to determine identity.
  • 5. ROLE OF BIOMETRICS TECHNOLOGIES IN INFORMATION SECURITY:- • Effective way to prove the true identity of individual users • Biometric devices create a more ambiguous and user friendly environment • Biometric devices measure unique characteristic of each person
  • 6. MODES OF BIOMETRIC SYSTEM:-  Verification mode:- The system performs a one-to- one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be.  Identification mode:- The system performs a one-to- many comparison against a biometric database in an attempt to establish the identity of an unknown individual.
  • 7. BLOCK DIAGRAM OF BIOMETRIC SYSTEM:-
  • 8. TYPES OF BIOMETRICS:-  Behavioral Biometrics- It is the scientific study of how people’s and animal’s bodies function(Used for verification) .  Physical Biometrics- It refers to physiological features on the human body that can serve as identification or verification, such as fingerprint or retina scan.
  • 9. BEHAVIORAL BIOMETRICS:-  Voice Recognition:- It is the ability of the machine or program to receive and interpret dictation or to understand and carry out spoken commands.  Signature:- An authentication method that uses the dynamics of a person’s handwritten signature.  Keystroke Dynamics:- It is the method of identifying or conforming the identity of an individual based on the manner and the rhythm of typing on a keyboard.
  • 10. PHYSICAL BIOMETRICS:-  Fingerprint Recognition:- The technology which identifies and verifies a person’s fingerprint with data saved in it before hand.  Facial Recognition:- It is a well exposed technology which maps facial features from a photograph or video and compares the information with a database of known faces to find a match.  Iris recognition:- It is an automated method of biometric identification, taking unique patterns within a ring shaped region surrounding the pupil of each eye.
  • 11. BIOMETRIC DEVICES:-  Fingerprint Scanner  Facial Scanner  Iris Scanner
  • 12. FINGERPRINT SCANNER:-  It is used for recognizing and authenticating the fingerprint of an individual.  A fingerprint scanner scans a human finger then process it to map by the points of loops and ridges of finger.  This map then been converted in templets.  Then matcher compares two templets and gives results and the final result will be displayed by software.  Fingerprint reader and the scanner are safe and reliable devices for any security authentication.
  • 13. FACIAL SCANNER:-  A scanner (application) scans the geometry (structure) of applicants face.  Then a set of algorithms converts it into binary number and stores it in database.  Then at time of identification matcher compares the new and stored face.  Application shows the result and gives access.
  • 14. IRIS SCANNER:-  An iris scanner scans the iris inwards to the pupil edge.  Then an algorithm make a map by the plotted marks of iris(usually 173 points).  This map is then transferred to numbers and make templets.  Then at time of identification matchers compares the new and stored iris.  Application shows the result and gives access.
  • 15. BENEFITS OF USING BIOMETRIC SYSTEM OVER TRADITIONAL AUTHENTICATION SYSTEMS:- • Invariant: Biometric traits are invariant over time as smart cards get damaged over time but biometric traits doesn’t. • Accountability: If there is a security breach, then biometric ensures who can be the responsible person for the breach but in traditional methods, smart cards can be stolen and used by someone else. Hence, accountable person is easily identifiable now days by using biometric. • Easy to use: Biometric systems are easy to use. • Convenient: User doesn’t have to remember passwords, pins and keep safe the smart cards like before. • More secure: Biometric trait can’t be stolen or copied.
  • 16. ADVANTAGES AND DISADVANTAGES OF BIOMETRIC TECHNOLOGY:- Advantages:- Disadvantages:-  High security and assurance – Biometric identification provides the answers to “something a person has and is” and helps verify identity  User Experience – Convenient and fast  Non-transferrable – Everyone has access to a unique set of biometrics  Spoof-proof – Biometrics are hard to fake or steal  Costs – Significant investment needed in biometrics for security  Data breaches – Biometric databases can still be hacked  Tracking and data – Biometric devices like facial recognition systems can limit privacy for users  False positives and inaccuracy – False rejects and false accepts can still occur preventing select users from accessing systems
  • 17. APPLICATIONS:- • Banking/Credit • Computer/ Network Security • Mobile Phone Security • Business and Residential Access Control • Law Enforcement • Automobile Security/ Access Control • Military ID • Hotel Access Control • Time and Attendance
  • 18. CONCLUSION:-  Biometrics can only be limited by limiting one's imagination.  Biometric technology is now being used in almost every area.  Biometric is a emerging area with many opportunities for growth.  Possible in the near future you will not have to remember PINs and PASSWORD and keys in your bags or pockets will be things of the past.