SlideShare a Scribd company logo
1 of 22
“Biometrically Secured ATM Vigilance
System”
Co-ordinator
Mrs Kavyashree E D
Asst. Prof.
Dept. of CSE
ATMECE, Mysuru
Presenting By
MAHADEVASWAMY N
[4AD19CS037]
Under the Guidance of
Mr Deepu R
Professor
Dept. of CSE
ATMECE, Mysuru
1. Introduction
2. Methodology
3. Result and Discussion
4. Conclusion
5. References
• Biometrics refers to the automatic identification of a person based on his
physiological/behavioral characteristics.
• Various types of biometric systems are being used for real time identification
most popular are based on face recognition and finger print matching.
• Most of the ATM in the past have been using ID cards to identify users but with
the wide acceptance of Biometrics a new generation of Biometrics ATM are
being deployed for wide range of applications worldwide.
• Biometrics based authentication is a potential candidate to replace password-
based authentication.
Current Authentication Systems
• User Name
• Password
• One Time Password
Online
Authentication
• Token-based identification
systems
- Identification Cards
• Signature
Bank
Authentication
Issues in current ATM networks
• ATM Card frauds
• Use of ATM card duplicators
• Card sharing by family and friends
• Inability to trace the wrongful users
• ATM PINs can be shared on phone or recorded using secret
cameras
Biometric ATMs solve these issues & offer
• Single/Multi factor Biometric Authentication: Fingerprint, Iris, Face.
• Multifactor Authentication: Card + PIN + Biometrics
• Online or offline Authentication using smart cards
• Card less Authentication
• Biometrics is combination of card or PIN
Why use Biometric ATM ?
• Provides strong authentication
• Can be used instead of a PIN
• Hidden costs of ATM card management like card personalization, delivery,
management, re-issuance, PIN generation, help-desk, and re-issuance can be
avoided
• Ideal for Indian rural masses
• It is accurate
• Flexible account access allows clients to access their accounts at their
convenience
• Low operational cost of the ATMs will ultimately reduce Total cost
of ownership (TCO).
Applications of Biometric ATM
• Banking & Finance
• Food coupons / Tickets / Canteen ATM
• Membership Verification ATM
• Transaction / Check Deposit ATM
• Self Service ATM
• Retail ATM
Typology of identification methods
Biometric System
Biometric System
Biometric System
Data Collection
Transmission
Signal Processing
Data Storage
Decision
Biometric System
Various Biometric Systems
HAND
• The three dimensional shape of a person’s hand has several
advantages as an identification device.
• Scanning a hand and producing a result takes 1.2seconds.It requires
little space for data storage about 9 bytes which can fit easily
magnetic strip credit cards.
FINGER PRINT
A fingerprint scanner system has two basic jobs :
• It needs to get an image of your finger.
• It needs to determine whether the pattern of ridges and valleys in this image
matches the pattern of ridges and valleys in pre-scanned images.
• Only specific characteristics, which are unique to every fingerprint, are
filtered and saved as an encrypted biometric key or mathematical
representation.
• No image of a fingerprint is ever saved, only a series of numbers (a binary
code), which is used for verification. The algorithm cannot be reconverted
to an image, so no one can duplicate your fingerprints.
ATMs of the Future
• Today’s biometric scanners go far beyond basic fingerprint
recognition.
• In Poland and Japan, consumers are already using Hitachi's infrared
scanners that capture the unique pattern of capillaries in the finger and
hand.
• The most secure biometric technology uses a device designed to
perform an iris scan based on more than 2,000 unique measurement
points.
• According to developers, people and pets all over the world will be
connected to a system that uses iris scan identification within the next
decade.
Multibiometrics
INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL
IDENTIFICATION
An automatic personal identification system based on fingerprints or
faces is often not able to meet the system performance requirements.
A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT,
FACE AND SPEECH
This system takes the advantage of the capabilities of each individual
biometric. It can be used to overcome some of the limitations of a single
biometrics.
Pictures
Biometric Reading at ATM Machines Already in use in
Brazil
Poland's cooperative BPS bank
It's the first in Europe to install a biometric ATM
allowing customers to withdraw cash simply
with the touch of a fingertip.
Conclusion
• Biometric tokens are the safest means of preventing ATM frauds.
• The main reason for introducing biometric systems is to increase
overall security.
• Biometrics offers greater security and convenience than traditional
methods of personal recognition.
• In some applications, biometrics can replace or supplement the
existing technology. In others, it is the only viable approach.
• The biometric system is only one part of an overall identification or
authentication process, and the other parts of that process will play an
equal role in determining its effectiveness.
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff

More Related Content

Similar to Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff

Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx1A255Gauravwankar
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)mounika117
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxSundusKhan42
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxTusharKataria22
 

Similar to Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff (20)

Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
Atm system ppt
Atm system pptAtm system ppt
Atm system ppt
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 

Recently uploaded

Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfssuser5c9d4b1
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesRashidFaridChishti
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..MaherOthman7
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemSampad Kar
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Studentskannan348865
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological universityMohd Saifudeen
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfJNTUA
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.MdManikurRahman
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdfKamal Acharya
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...IJECEIAES
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 

Recently uploaded (20)

Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Microkernel in Operating System | Operating System
Microkernel in Operating System | Operating SystemMicrokernel in Operating System | Operating System
Microkernel in Operating System | Operating System
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Geometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdfGeometric constructions Engineering Drawing.pdf
Geometric constructions Engineering Drawing.pdf
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 

Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff

  • 1. “Biometrically Secured ATM Vigilance System” Co-ordinator Mrs Kavyashree E D Asst. Prof. Dept. of CSE ATMECE, Mysuru Presenting By MAHADEVASWAMY N [4AD19CS037] Under the Guidance of Mr Deepu R Professor Dept. of CSE ATMECE, Mysuru
  • 2. 1. Introduction 2. Methodology 3. Result and Discussion 4. Conclusion 5. References
  • 3. • Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics. • Various types of biometric systems are being used for real time identification most popular are based on face recognition and finger print matching. • Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics a new generation of Biometrics ATM are being deployed for wide range of applications worldwide. • Biometrics based authentication is a potential candidate to replace password- based authentication.
  • 4. Current Authentication Systems • User Name • Password • One Time Password Online Authentication • Token-based identification systems - Identification Cards • Signature Bank Authentication
  • 5. Issues in current ATM networks • ATM Card frauds • Use of ATM card duplicators • Card sharing by family and friends • Inability to trace the wrongful users • ATM PINs can be shared on phone or recorded using secret cameras
  • 6. Biometric ATMs solve these issues & offer • Single/Multi factor Biometric Authentication: Fingerprint, Iris, Face. • Multifactor Authentication: Card + PIN + Biometrics • Online or offline Authentication using smart cards • Card less Authentication • Biometrics is combination of card or PIN
  • 7. Why use Biometric ATM ? • Provides strong authentication • Can be used instead of a PIN • Hidden costs of ATM card management like card personalization, delivery, management, re-issuance, PIN generation, help-desk, and re-issuance can be avoided • Ideal for Indian rural masses • It is accurate • Flexible account access allows clients to access their accounts at their convenience • Low operational cost of the ATMs will ultimately reduce Total cost of ownership (TCO).
  • 8. Applications of Biometric ATM • Banking & Finance • Food coupons / Tickets / Canteen ATM • Membership Verification ATM • Transaction / Check Deposit ATM • Self Service ATM • Retail ATM
  • 11. Biometric System Biometric System Data Collection Transmission Signal Processing Data Storage Decision
  • 13. Various Biometric Systems HAND • The three dimensional shape of a person’s hand has several advantages as an identification device. • Scanning a hand and producing a result takes 1.2seconds.It requires little space for data storage about 9 bytes which can fit easily magnetic strip credit cards.
  • 14.
  • 15. FINGER PRINT A fingerprint scanner system has two basic jobs : • It needs to get an image of your finger. • It needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. • Only specific characteristics, which are unique to every fingerprint, are filtered and saved as an encrypted biometric key or mathematical representation. • No image of a fingerprint is ever saved, only a series of numbers (a binary code), which is used for verification. The algorithm cannot be reconverted to an image, so no one can duplicate your fingerprints.
  • 16.
  • 17. ATMs of the Future • Today’s biometric scanners go far beyond basic fingerprint recognition. • In Poland and Japan, consumers are already using Hitachi's infrared scanners that capture the unique pattern of capillaries in the finger and hand. • The most secure biometric technology uses a device designed to perform an iris scan based on more than 2,000 unique measurement points. • According to developers, people and pets all over the world will be connected to a system that uses iris scan identification within the next decade.
  • 18. Multibiometrics INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL IDENTIFICATION An automatic personal identification system based on fingerprints or faces is often not able to meet the system performance requirements. A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT, FACE AND SPEECH This system takes the advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics.
  • 19.
  • 20. Pictures Biometric Reading at ATM Machines Already in use in Brazil Poland's cooperative BPS bank It's the first in Europe to install a biometric ATM allowing customers to withdraw cash simply with the touch of a fingertip.
  • 21. Conclusion • Biometric tokens are the safest means of preventing ATM frauds. • The main reason for introducing biometric systems is to increase overall security. • Biometrics offers greater security and convenience than traditional methods of personal recognition. • In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. • The biometric system is only one part of an overall identification or authentication process, and the other parts of that process will play an equal role in determining its effectiveness.