SlideShare a Scribd company logo
1 of 14
Presented by : ALISHA VERMA
USN No. : 1OX22MC058
Submitted to : ASHOK B.P
Biometrics is a technology used to identify,
analyze, and measure an individual’s physical and
behavioral characteristics.
Each human being is unique in terms of
characteristics, which make him or her different
from all others. The physical attributes such as
finger prints, color of iris, color of hair, hand
geometry, and behavioral characteristics such as
tone and accent of speech, signature, or the way
of typing keys of computer keyboard etc., make a
person stand separate from the rest.
WHAT IS BIOMETRIC?
 With increasing use of Information Technology in
the field of banking, science, medication, etc.,
there is an immense need to protect the systems
and data from unauthorized users.
Why Biometrics is Required?
Enrollment is a process of capturing biometrics samples, processing them to create a biometric
template and storing the templates (usually with additional data) onto storage, such as a
database or chip.
ENROLLMENT
This process tries to find out answer of question, “Are you
the same who you are claiming to be?”, or, “Do I know
you?” This is one-to-many matching and comparison of a
person’s biometrics with the whole database.
 Verification : This is the one-to-one process of matching where live
sample entered by the candidate is compared with a previously
stored template in the database. If both are matching with more
than 70% agreeable similarity, then the verification is successful.
 Authorization : It is the process of assigning access rights to the
authenticated or verified users. It tries to find out the answer for the
question, “Are you eligible to have certain rights to access this
resource?”
AUTHENTICATION
The entire security structure of biometrics
authentication is based on comparison.
Biometric systems capture and store
individual characteristics that remain
constant over time, such as fingerprints,
voice, retinal patterns, facial recognition,
and hand patterns. When a user makes an
authentication request, the system
compares their biometrics with the data in
the database. If there's an accurate match,
access is granted.
WORKING PROCESS
TYPES OF BIOMETRIC
1.Fingerprint recognition
2.Iris recognition
3.Face recognition
4.Hand geometry
5.Voice/speech recognition
The fingerprint recognition involves
snapping an image using a fingerprint
scanner which is then digitally
compared with a previously stored
snapshot of your fingerprints. The
scanner processor sees whether the
loops, whorls and arches have any
similarity. An important point to be
noted is that the scanner doesn’t keep
the complete image of your
fingerprint. It only stores information
about specific points in the form of
binary numbers.
Fingerprint recognition
Iris recognition works on the basis of
iris pattern in human eye. The iris is
the pigmented elastic tissue that has
adjustable circular opening in center. It
controls the diameter of pupil. In adult
humans, the texture of iris is stable
throughout their lives. The iris patterns
of left and right eyes are different. The
iris patterns and colors change from
person to person.
Iris Recognition
Facial recognition is based on determining
shape and size of jaw, chin, shape and
location of the eyes, eyebrows, nose, lips,
and cheekbones. 2D facial scanners start
reading face geometry and recording it on
the grid. The facial geometry is transferred
to the database in terms of points. The
comparison algorithms perform face
matching and come up with the results.
Facial recognition is performed in the
following ways −
Facial Recognition
It includes measuring length and
width of palm, surface area, length
and position of fingers, and overall
bone structure of the hand. A person’s
hand is unique and can be used to
identify a person from others.
Hand Geometry Recognition
Voice Recognition is also called Speaker
Recognition. At the time of enrollment, the user
needs to speak a word or phrase into a
microphone. This is necessary to acquire speech
sample of a candidate.
The electrical signal from the microphone is
converted into digital signal by an Analog to
Digital (ADC) converter. It is recorded into the
computer memory as a digitized sample. The
computer then compares and attempts to match
the input voice of candidate with the stored
digitized voice sample and identifies the
candidate.
Voice Recognition
Conclusion
 Biometrics system allows for increased security, convenience and
accountability while detecting and deterring Froud . Biometric solution one of
the best & strongest security feature to benefit individuals and institutions.
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric

More Related Content

Similar to SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric

Similar to SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric (20)

Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
biometrics.ppt
biometrics.pptbiometrics.ppt
biometrics.ppt
 

More from AnkitaVerma776806

the reference of book detail Hospital Booking.pptx
the reference of book detail Hospital Booking.pptxthe reference of book detail Hospital Booking.pptx
the reference of book detail Hospital Booking.pptxAnkitaVerma776806
 
ARTIFICIAL INTELLLLIGENCEE modul11_AI.pptx
ARTIFICIAL INTELLLLIGENCEE modul11_AI.pptxARTIFICIAL INTELLLLIGENCEE modul11_AI.pptx
ARTIFICIAL INTELLLLIGENCEE modul11_AI.pptxAnkitaVerma776806
 
voicecontrolhomeautomation-130627021245-phpapp01 (1).ppt
voicecontrolhomeautomation-130627021245-phpapp01 (1).pptvoicecontrolhomeautomation-130627021245-phpapp01 (1).ppt
voicecontrolhomeautomation-130627021245-phpapp01 (1).pptAnkitaVerma776806
 
the refernce of programming C notes ppt.pptx
the refernce of programming C notes ppt.pptxthe refernce of programming C notes ppt.pptx
the refernce of programming C notes ppt.pptxAnkitaVerma776806
 
detail the reference of Hospital Booking.pptx
detail the reference of Hospital Booking.pptxdetail the reference of Hospital Booking.pptx
detail the reference of Hospital Booking.pptxAnkitaVerma776806
 
Advances in ML learning process require. ppt.pptx
Advances in ML learning process require. ppt.pptxAdvances in ML learning process require. ppt.pptx
Advances in ML learning process require. ppt.pptxAnkitaVerma776806
 
Reasesrty djhjan S - explanation required.pptx
Reasesrty djhjan S - explanation required.pptxReasesrty djhjan S - explanation required.pptx
Reasesrty djhjan S - explanation required.pptxAnkitaVerma776806
 
SE Complete notes mod 4 &5.pdf
SE Complete notes mod 4 &5.pdfSE Complete notes mod 4 &5.pdf
SE Complete notes mod 4 &5.pdfAnkitaVerma776806
 

More from AnkitaVerma776806 (15)

the reference of book detail Hospital Booking.pptx
the reference of book detail Hospital Booking.pptxthe reference of book detail Hospital Booking.pptx
the reference of book detail Hospital Booking.pptx
 
ARTIFICIAL INTELLLLIGENCEE modul11_AI.pptx
ARTIFICIAL INTELLLLIGENCEE modul11_AI.pptxARTIFICIAL INTELLLLIGENCEE modul11_AI.pptx
ARTIFICIAL INTELLLLIGENCEE modul11_AI.pptx
 
voicecontrolhomeautomation-130627021245-phpapp01 (1).ppt
voicecontrolhomeautomation-130627021245-phpapp01 (1).pptvoicecontrolhomeautomation-130627021245-phpapp01 (1).ppt
voicecontrolhomeautomation-130627021245-phpapp01 (1).ppt
 
the refernce of programming C notes ppt.pptx
the refernce of programming C notes ppt.pptxthe refernce of programming C notes ppt.pptx
the refernce of programming C notes ppt.pptx
 
detail the reference of Hospital Booking.pptx
detail the reference of Hospital Booking.pptxdetail the reference of Hospital Booking.pptx
detail the reference of Hospital Booking.pptx
 
Advances in ML learning process require. ppt.pptx
Advances in ML learning process require. ppt.pptxAdvances in ML learning process require. ppt.pptx
Advances in ML learning process require. ppt.pptx
 
Reasesrty djhjan S - explanation required.pptx
Reasesrty djhjan S - explanation required.pptxReasesrty djhjan S - explanation required.pptx
Reasesrty djhjan S - explanation required.pptx
 
ch8.pptx
ch8.pptxch8.pptx
ch8.pptx
 
AI(Module1).pptx
AI(Module1).pptxAI(Module1).pptx
AI(Module1).pptx
 
continuity of module 2.pptx
continuity of module 2.pptxcontinuity of module 2.pptx
continuity of module 2.pptx
 
Advances in ML. ppt.pptx
Advances in ML. ppt.pptxAdvances in ML. ppt.pptx
Advances in ML. ppt.pptx
 
Module 3_DAA (2).pptx
Module 3_DAA (2).pptxModule 3_DAA (2).pptx
Module 3_DAA (2).pptx
 
SE Complete notes mod 4 &5.pdf
SE Complete notes mod 4 &5.pdfSE Complete notes mod 4 &5.pdf
SE Complete notes mod 4 &5.pdf
 
CH1 ARRAY (1).pptx
CH1 ARRAY (1).pptxCH1 ARRAY (1).pptx
CH1 ARRAY (1).pptx
 
IOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdfIOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdf
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric

  • 1. Presented by : ALISHA VERMA USN No. : 1OX22MC058 Submitted to : ASHOK B.P
  • 2. Biometrics is a technology used to identify, analyze, and measure an individual’s physical and behavioral characteristics. Each human being is unique in terms of characteristics, which make him or her different from all others. The physical attributes such as finger prints, color of iris, color of hair, hand geometry, and behavioral characteristics such as tone and accent of speech, signature, or the way of typing keys of computer keyboard etc., make a person stand separate from the rest. WHAT IS BIOMETRIC?
  • 3.  With increasing use of Information Technology in the field of banking, science, medication, etc., there is an immense need to protect the systems and data from unauthorized users. Why Biometrics is Required?
  • 4. Enrollment is a process of capturing biometrics samples, processing them to create a biometric template and storing the templates (usually with additional data) onto storage, such as a database or chip. ENROLLMENT
  • 5. This process tries to find out answer of question, “Are you the same who you are claiming to be?”, or, “Do I know you?” This is one-to-many matching and comparison of a person’s biometrics with the whole database.  Verification : This is the one-to-one process of matching where live sample entered by the candidate is compared with a previously stored template in the database. If both are matching with more than 70% agreeable similarity, then the verification is successful.  Authorization : It is the process of assigning access rights to the authenticated or verified users. It tries to find out the answer for the question, “Are you eligible to have certain rights to access this resource?” AUTHENTICATION
  • 6. The entire security structure of biometrics authentication is based on comparison. Biometric systems capture and store individual characteristics that remain constant over time, such as fingerprints, voice, retinal patterns, facial recognition, and hand patterns. When a user makes an authentication request, the system compares their biometrics with the data in the database. If there's an accurate match, access is granted. WORKING PROCESS
  • 7. TYPES OF BIOMETRIC 1.Fingerprint recognition 2.Iris recognition 3.Face recognition 4.Hand geometry 5.Voice/speech recognition
  • 8. The fingerprint recognition involves snapping an image using a fingerprint scanner which is then digitally compared with a previously stored snapshot of your fingerprints. The scanner processor sees whether the loops, whorls and arches have any similarity. An important point to be noted is that the scanner doesn’t keep the complete image of your fingerprint. It only stores information about specific points in the form of binary numbers. Fingerprint recognition
  • 9. Iris recognition works on the basis of iris pattern in human eye. The iris is the pigmented elastic tissue that has adjustable circular opening in center. It controls the diameter of pupil. In adult humans, the texture of iris is stable throughout their lives. The iris patterns of left and right eyes are different. The iris patterns and colors change from person to person. Iris Recognition
  • 10. Facial recognition is based on determining shape and size of jaw, chin, shape and location of the eyes, eyebrows, nose, lips, and cheekbones. 2D facial scanners start reading face geometry and recording it on the grid. The facial geometry is transferred to the database in terms of points. The comparison algorithms perform face matching and come up with the results. Facial recognition is performed in the following ways − Facial Recognition
  • 11. It includes measuring length and width of palm, surface area, length and position of fingers, and overall bone structure of the hand. A person’s hand is unique and can be used to identify a person from others. Hand Geometry Recognition
  • 12. Voice Recognition is also called Speaker Recognition. At the time of enrollment, the user needs to speak a word or phrase into a microphone. This is necessary to acquire speech sample of a candidate. The electrical signal from the microphone is converted into digital signal by an Analog to Digital (ADC) converter. It is recorded into the computer memory as a digitized sample. The computer then compares and attempts to match the input voice of candidate with the stored digitized voice sample and identifies the candidate. Voice Recognition
  • 13. Conclusion  Biometrics system allows for increased security, convenience and accountability while detecting and deterring Froud . Biometric solution one of the best & strongest security feature to benefit individuals and institutions.