SlideShare a Scribd company logo
1 of 18
Biometric Authentication
Finger Print Based Access
Control
Copyright © 2015 Skyfi Education Labs
Pvt. Ltd.
Introduction to Biometrics
 The term "biometrics" is derived from the Greek
words “Bio" means life and “Metric" means to
measure.
 Biometrics is the measurement and statistical
analysis of people's physical and behavioral
characteristics.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Introduction to Biometrics
 The technology is mainly used for identification and
access control or for identifying individuals that are
under surveillance.
 The basic premise of biometric authentication is that
everyone is unique and an individual can be
identified by his or her intrinsic physical or behavioral
traits.
 For example, every human has an unique fingerprint,
DNA, iris etc.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Types of biometric identifiers
 Physiological characteristics: The shape or
composition of the body.
Finger Print DNA Face Recognition Iris
Recognition
© 2015 Skyfi Education Labs Pvt.
Ltd.
Types of biometric identifiers
 Behavioral characteristics: The behavior of a person.
Typing Rhythm Gesture Voice
Recognition
© 2015 Skyfi Education Labs Pvt.
Ltd.
Comparison of Biometrics
Technology Accuracy Cost Social
Acceptability
Devices
DNA High High High Lab Test
Equipment
Iris High High Medium-Low Camera
Face Medium-Low Medium Low Camera
Voice Medium Medium Medium Microphone
Finger Print High Medium High Scanner
Hand Gesture Medium-Low Low Medium Scanner
Signature Low Medium High Optical Pen
© 2015 Skyfi Education Labs Pvt.
Ltd.
Human Finger Print
 A fingerprint is an impression left by the friction
ridges of a human finger.
 These are detailed, presumed to be nearly unique,
difficult to alter and durable over the life of an
individual, making them suitable as long-term
markers of human identity.
 A fingerprint consists of ridges and valleys and
they provide grip for our hand.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Finger Print Patterns
The three basic patterns of fingerprint ridges are
Arch Loop Whorl
Scientists have found that family members often share
the same general fingerprint patterns, leading to the
belief that these patterns are inherited.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Finger Print Recognition
 Finger Print Recognition requires the comparison of
several features of the print pattern.
 These include patterns, which are aggregate
characteristics of ridges, and minutia points, which
are unique features found within the patterns.
Ridge Ending Bifurcation Short
Ridge
© 2015 Skyfi Education Labs Pvt.
Ltd.
Finger Print Sensor
 A fingerprint sensor is an electronic device used to
capture a digital image of the fingerprint pattern.
 The captured image is called a live scan. This live
scan is digitally processed to create a biometric
template (a collection of extracted features) which is
stored and used for matching.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Types of Finger Print Sensor
 Capacitive
 Optical
 RF
 Thermal
 Piezo resistive
 Ultrasonic
 Piezoelectric
 MEMS
© 2015 Skyfi Education Labs Pvt.
Ltd.
Capacitive and Optical type finger print
are the most commonly used one.
Schematic Diagram of Biometric System
© 2015 Skyfi Education Labs Pvt.
Ltd.
Function of Biometric System
 Sensor: it is the input unit may contain scanner,
camera, microphone etc to capture the identification.
 Pre Processor : this involve in filtering the useful
data from the measured quantity.
 Extractor: this will extract the necessary features that
need to be identified.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Function of Biometric System
 Template Generator: based on the extracted features
the template will be made as a digits or an image.
Those templates will be stored in a data base only
during enrollment process.
 Matcher: during the matching phase the stored
templates will be compared with the input data using
various algorithms.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Application of Biometrics
 India's national ID program called Aadhaar is the
largest biometric database in the world.
 As of 31 December 2015, over 95 crore (950 million)
Aadhaar numbers have been issued in the project.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Application of Biometrics
Voice Search Door Access
© 2015 Skyfi Education Labs Pvt.
Ltd.
Application of Biometrics
Personal Identity Surveillance System
© 2015 Skyfi Education Labs Pvt.
Ltd.
Online Project Based courses
 For more details on this project visit
http://www.skyfilabs.com/online-courses
Write to us at info@skyfilabs.com
Follow us at www.facebook.com/skyfilabs
Contact us at 1800-3000-1260
18

More Related Content

What's hot

Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airportCheapticketsSG
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication finalAshok Kuikel
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUAlpesh Kurhade
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 

What's hot (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Biometric
BiometricBiometric
Biometric
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication final
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 

Viewers also liked

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024Frank Maiorca
 
biometric payment system authentication
biometric payment system authenticationbiometric payment system authentication
biometric payment system authenticationSaurabh Pandey
 
eID Authentication mechanisms for eFinance and ePayment services
eID Authentication mechanisms for eFinance and ePayment serviceseID Authentication mechanisms for eFinance and ePayment services
eID Authentication mechanisms for eFinance and ePayment servicesManel Medina
 
New Trends in Mobile Authentication
New Trends in Mobile AuthenticationNew Trends in Mobile Authentication
New Trends in Mobile AuthenticationNok Nok Labs, Inc
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security MobileJerry Ruggieri
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access systemAkshay Govekar
 
H.323: Packet Network Protocol
H.323: Packet Network ProtocolH.323: Packet Network Protocol
H.323: Packet Network ProtocolYatish Bathla
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
WEB Based claim processing sytem SRS
WEB Based claim processing sytem SRSWEB Based claim processing sytem SRS
WEB Based claim processing sytem SRSNitin Bhardwaj
 
java Project report online banking system
java Project report online banking systemjava Project report online banking system
java Project report online banking systemVishNu KuNtal
 

Viewers also liked (20)

KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024KeystrokeGuard_Presentation_20141024
KeystrokeGuard_Presentation_20141024
 
report
reportreport
report
 
Fingerprint based authentication system
Fingerprint based authentication systemFingerprint based authentication system
Fingerprint based authentication system
 
biometric payment system authentication
biometric payment system authenticationbiometric payment system authentication
biometric payment system authentication
 
Cspass
CspassCspass
Cspass
 
eID Authentication mechanisms for eFinance and ePayment services
eID Authentication mechanisms for eFinance and ePayment serviceseID Authentication mechanisms for eFinance and ePayment services
eID Authentication mechanisms for eFinance and ePayment services
 
New Trends in Mobile Authentication
New Trends in Mobile AuthenticationNew Trends in Mobile Authentication
New Trends in Mobile Authentication
 
finger prints
finger printsfinger prints
finger prints
 
Biometric Security Mobile
Biometric Security MobileBiometric Security Mobile
Biometric Security Mobile
 
Finger print
Finger printFinger print
Finger print
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
H.323: Packet Network Protocol
H.323: Packet Network ProtocolH.323: Packet Network Protocol
H.323: Packet Network Protocol
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
WEB Based claim processing sytem SRS
WEB Based claim processing sytem SRSWEB Based claim processing sytem SRS
WEB Based claim processing sytem SRS
 
java Project report online banking system
java Project report online banking systemjava Project report online banking system
java Project report online banking system
 

Similar to Skyfi Labs Biometric Authentication Project

SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)mounika117
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
8.biometric security
8.biometric security8.biometric security
8.biometric securitynishiyath
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 

Similar to Skyfi Labs Biometric Authentication Project (20)

Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Biometric
BiometricBiometric
Biometric
 
Biometric
Biometric Biometric
Biometric
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
8.biometric security
8.biometric security8.biometric security
8.biometric security
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 

Recently uploaded

Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)NareenAsad
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxMANASINANDKISHORDEOR
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualBalamuruganV28
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfssuser5c9d4b1
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Nitin Sonavane
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfAshrafRagab14
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdfKamal Acharya
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docxrahulmanepalli02
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfMadan Karki
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024EMMANUELLEFRANCEHELI
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 

Recently uploaded (20)

Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)Operating System chapter 9 (Virtual Memory)
Operating System chapter 9 (Virtual Memory)
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
Module-III Varried Flow.pptx GVF Definition, Water Surface Profile Dynamic Eq...
 
Piping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdfPiping and instrumentation diagram p.pdf
Piping and instrumentation diagram p.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdfALCOHOL PRODUCTION- Beer Brewing Process.pdf
ALCOHOL PRODUCTION- Beer Brewing Process.pdf
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 

Skyfi Labs Biometric Authentication Project

  • 1. Biometric Authentication Finger Print Based Access Control Copyright © 2015 Skyfi Education Labs Pvt. Ltd.
  • 2. Introduction to Biometrics  The term "biometrics" is derived from the Greek words “Bio" means life and “Metric" means to measure.  Biometrics is the measurement and statistical analysis of people's physical and behavioral characteristics. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 3. Introduction to Biometrics  The technology is mainly used for identification and access control or for identifying individuals that are under surveillance.  The basic premise of biometric authentication is that everyone is unique and an individual can be identified by his or her intrinsic physical or behavioral traits.  For example, every human has an unique fingerprint, DNA, iris etc. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 4. Types of biometric identifiers  Physiological characteristics: The shape or composition of the body. Finger Print DNA Face Recognition Iris Recognition © 2015 Skyfi Education Labs Pvt. Ltd.
  • 5. Types of biometric identifiers  Behavioral characteristics: The behavior of a person. Typing Rhythm Gesture Voice Recognition © 2015 Skyfi Education Labs Pvt. Ltd.
  • 6. Comparison of Biometrics Technology Accuracy Cost Social Acceptability Devices DNA High High High Lab Test Equipment Iris High High Medium-Low Camera Face Medium-Low Medium Low Camera Voice Medium Medium Medium Microphone Finger Print High Medium High Scanner Hand Gesture Medium-Low Low Medium Scanner Signature Low Medium High Optical Pen © 2015 Skyfi Education Labs Pvt. Ltd.
  • 7. Human Finger Print  A fingerprint is an impression left by the friction ridges of a human finger.  These are detailed, presumed to be nearly unique, difficult to alter and durable over the life of an individual, making them suitable as long-term markers of human identity.  A fingerprint consists of ridges and valleys and they provide grip for our hand. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 8. Finger Print Patterns The three basic patterns of fingerprint ridges are Arch Loop Whorl Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 9. Finger Print Recognition  Finger Print Recognition requires the comparison of several features of the print pattern.  These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. Ridge Ending Bifurcation Short Ridge © 2015 Skyfi Education Labs Pvt. Ltd.
  • 10. Finger Print Sensor  A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.  The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 11. Types of Finger Print Sensor  Capacitive  Optical  RF  Thermal  Piezo resistive  Ultrasonic  Piezoelectric  MEMS © 2015 Skyfi Education Labs Pvt. Ltd. Capacitive and Optical type finger print are the most commonly used one.
  • 12. Schematic Diagram of Biometric System © 2015 Skyfi Education Labs Pvt. Ltd.
  • 13. Function of Biometric System  Sensor: it is the input unit may contain scanner, camera, microphone etc to capture the identification.  Pre Processor : this involve in filtering the useful data from the measured quantity.  Extractor: this will extract the necessary features that need to be identified. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 14. Function of Biometric System  Template Generator: based on the extracted features the template will be made as a digits or an image. Those templates will be stored in a data base only during enrollment process.  Matcher: during the matching phase the stored templates will be compared with the input data using various algorithms. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 15. Application of Biometrics  India's national ID program called Aadhaar is the largest biometric database in the world.  As of 31 December 2015, over 95 crore (950 million) Aadhaar numbers have been issued in the project. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 16. Application of Biometrics Voice Search Door Access © 2015 Skyfi Education Labs Pvt. Ltd.
  • 17. Application of Biometrics Personal Identity Surveillance System © 2015 Skyfi Education Labs Pvt. Ltd.
  • 18. Online Project Based courses  For more details on this project visit http://www.skyfilabs.com/online-courses Write to us at info@skyfilabs.com Follow us at www.facebook.com/skyfilabs Contact us at 1800-3000-1260 18

Editor's Notes

  1. Every human has some unique features of their own. Those uniqueness is measured for security applications known as biometric techniques. The parameter may be a physical appearance or else the behavior.
  2. Biometric is classified into two types: Physical and behavioral characteristics. Physical characteristics are the unique feature in human body as shown.
  3. In This method the behavior of a people is used as an identification.
  4. arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side. whorl: Ridges form circularly around a central point on the finger.
  5. The ridge ending is the point at which a ridge terminates. Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint.
  6. It is the basic schematic of all kind of biometric system. The sensor is the input unit may contain scanner, camera, microphone etc to capture the identification. Pre processing involve in filtering the useful data from the measured quantity.