SlideShare a Scribd company logo
The technology of future.




 Submitted by,             Guided by,
Joshi Pathik V.         Miss A. D. Bhople
Contents
   Introduction
   History
   Present
   Future
   Procedure of Working
   Features of different parameters
   Application
   Conclusion
   References
Introduction
 Information  security is concerned with
  the assurance of confidentially, integrity
  and availability of information in all
  forms.
 This is the ancient Greek word: bios =
  “life” and metron = “measure.”
 Biometric systems based on single source
  of information are called unicode system.
History
 European Explorer Joao de Barros recorded the
  first known example of fingerprinting in China
  during the 14th century.
 1980:- Alphonse Bertillon studied body
  mechanics and measurements to help in
  identifying criminals.
 Karl Pearson, an applied mathematician studied
  biometric research early in 20th century at
  University college of London.
 In     the   1960      and  1970,     signature
  biometric, authentication procedures were
Present
 Today, biometric lows and regulations are in
  process and biometric industry standard are
  being tested.
 It divided in two parts,

       Behavioural Parameters          Behavioural Parameters

•Fingerprint                    •Gait
•Palmprint                      •Voice
•Hand Veins                     •Signature
•Face                           •Keystroke
•Iris
•Retina
•DNA
Future
 A biometric system can provide two
  functions. One of which is verification and
  the other is Authentication.
 In the near future, these biometric
  techniques can be the solution for the
  current threats in the world of information
  security.
 Due to dynamic modification of the
  proposed metric, the rejection ration for a
  some person reduces by a lot.
Procedure of Working
Features of Different
           Parameters
 Fingerprint
 Iris Technology
 Retina Geometry Technology
 Face Recognition Technology
 Hand Geometry Technology
 Voice Recognition Techniques
 Signature Verification Technique
Fingerprint
   The size of fingerprint is around 10*10*15.




             Arch                 Loop




                                                   Whorl




    Ridge ending    Bifurcation      Short Ridge
   In this way the total features and template of
    Fingerprint is as following. The matcher
    matches any two templates as following
    image.
Iris Recognition
   This can be a combination of specific
    characteristics            known             as
    corona, crypts, filaments, freckles, pits, furr
    ows, striations and rings.
Retina Geometry Technology
 A retinal scan involves the use of a low-intensity
  coherent light source, which is projected onto
  the retina to illuminate the blood vessels which
  are then photographed and analyzed.
 A retinal scan has an error rate of 1 in
  10,000,000,       compared      to     fingerprint
  identification error being
  sometimes as high as
  1 in 500.
Face Recognition Technology
   Facial metric technology on the manufacture
    of the specific facial features.




             Eigen Face
Hand Geometry Technology
   There techniques include the estimation of
    length, width, thickness and surface area of
    the hand.
Voice Recognition Techniques
 Voice verification focuses on the vocal
  characteristics that produce speeches and not
  on the sound or the pronunciation of speech
  itself.
 The vocal characteristics depend on the
  dimensions of the vocal tract, mouth, nasal
  cavities and the other speech processing
  mechanism of the human body.
Signature Verification Technique
 The dynamics is measured as a means of the
  pressure, direction, acceleration and the
  length of the strokes, dynamics number of
  strokes and their duration.
 These are either traditional tablets or special
  purpose devices. Tablets capture 2D
  coordinates and the pressure.
Application of Biometrics
 Security
 Authentication
 E-commerce and E-governments
 Secure Banking and Financial Transaction
 Digital Rights Management
 Healthcare Application
 Crime Investigation
 Social Services
Conclusion
 While Biometric authentication can offer a
  high degree of security, they are far from
  perfect solution.
 The influences of biometric technology on
  society and the risks to privacy and threat to
  identify will require meditation through
  legislation.
References
[1] Smart Cart Alliance Identity Council (2007): Identity and Smart Card Technology and Application
      Glossary, http://www.smartcardalliances.org

[2] Langenburg, Glenn (January 24, 2005). "Are one's fingerprints similar to those of his or her parents in any discernable way?".
       Scientific American. Retrieved 28 August 2010.

[3] Thornton, John (May 9, 2000). "Latent Fingerprints, Setting Standards In The Comparison and Identification". 84th Annual
       Training Conference of the California State Division of IAI. Retrieved 30 August 2010.

[4] Wikipedia Image
       http://en.wikipedia.org/wiki/File:Biometric_system_diagram.png

[5] Sanjay R. Ganorkar, Ashok A. Ghatol, “Iris Recognition: An Emerging Biometrics Technology”, In Proc. of The sixth WSEAS
       International Conference on Single Processing, Robotics and Automation, Greece, Feb. 2007, pp. 91 – 96

[6] J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Eds, “Biometrics Systems: Technology, Design and Performance
        Evolution”, New York: Spinger Verlag, 2005

[7] M. A. Dabbah, W. L. Woo, and S. S. Dlay, “Secure Authentication for Face Recognition”, In Proc. of IEEE Symposium on
       computational Intelligence in Image and Signal Processing, April 2007, USA, pp. 121 – 126

[8] A. Kumar, D. C. Wong, H. C. Shen and A. K. Jain , “Personal Verification using Palmprinnt and Hand Geometry Biometrics”, In
        Proc. of fourth International Conference on Audio and Video based Biometric Person Authentication, Guildford, U.K.
        January 2003, pp 668-678

[9] S. Furui, “Recent Advances in Speaker Recognition”, In Proc. of first International Conference on Audio and video based
        Biometric person Authentication, UK, March 1997, pp 859 – 872

[10] A.K. Jain, A. Ross, and S. Prabhakar, “An Introduction to Biometrics Recognition,” IEEE Trans. Circuit Syst. Video
       Technology, Special Issue Image and Video based Biometrics, Volume 14, Issue 1st January 2004, pp. 4 – 20
Thank You

More Related Content

What's hot

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
Biometrics
BiometricsBiometrics
Biometrics
Divya Shah
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
Abdul Rehman
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometrics
BiometricsBiometrics
Biometrics
senejug
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
lole2
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
Ravi Kumar
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 

What's hot (20)

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
biometrics
biometricsbiometrics
biometrics
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 

Viewers also liked

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Advertising Over Internet
Advertising Over InternetAdvertising Over Internet
Advertising Over Internetguest388d34e
 
Geoforensic
Geoforensic Geoforensic
Geoforensic
Bhupeshkumar Nanhe
 
Biometrics
BiometricsBiometrics
Biometrics
Bhupeshkumar Nanhe
 
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
xiaomi5
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
Jignesh Prajapati
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
Prabh Jeet
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
Self
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
Divya Kottikkal
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
Aalaa Khattab
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
Aalaa Khattab
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 

Viewers also liked (16)

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Advertising Over Internet
Advertising Over InternetAdvertising Over Internet
Advertising Over Internet
 
E Payment
E PaymentE Payment
E Payment
 
Geoforensic
Geoforensic Geoforensic
Geoforensic
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 

Similar to Slide-show on Biometrics

Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
Presentaionslive.blogspot.com
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
Kumar Goud
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
sakshi_20
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
Ankit Gupta
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
Agbona Azeez
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Biometrics
BiometricsBiometrics
Biometrics
NA000000
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
RSIS International
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
scg121433
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)
kalyanAdduri
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 

Similar to Slide-show on Biometrics (20)

Bio shiv
Bio shivBio shiv
Bio shiv
 
Spattern matching using biometric techniques
Spattern matching using biometric techniquesSpattern matching using biometric techniques
Spattern matching using biometric techniques
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Slide-show on Biometrics

  • 1. The technology of future. Submitted by, Guided by, Joshi Pathik V. Miss A. D. Bhople
  • 2. Contents  Introduction  History  Present  Future  Procedure of Working  Features of different parameters  Application  Conclusion  References
  • 3. Introduction  Information security is concerned with the assurance of confidentially, integrity and availability of information in all forms.  This is the ancient Greek word: bios = “life” and metron = “measure.”  Biometric systems based on single source of information are called unicode system.
  • 4. History  European Explorer Joao de Barros recorded the first known example of fingerprinting in China during the 14th century.  1980:- Alphonse Bertillon studied body mechanics and measurements to help in identifying criminals.  Karl Pearson, an applied mathematician studied biometric research early in 20th century at University college of London.  In the 1960 and 1970, signature biometric, authentication procedures were
  • 5. Present  Today, biometric lows and regulations are in process and biometric industry standard are being tested.  It divided in two parts, Behavioural Parameters Behavioural Parameters •Fingerprint •Gait •Palmprint •Voice •Hand Veins •Signature •Face •Keystroke •Iris •Retina •DNA
  • 6. Future  A biometric system can provide two functions. One of which is verification and the other is Authentication.  In the near future, these biometric techniques can be the solution for the current threats in the world of information security.  Due to dynamic modification of the proposed metric, the rejection ration for a some person reduces by a lot.
  • 8. Features of Different Parameters  Fingerprint  Iris Technology  Retina Geometry Technology  Face Recognition Technology  Hand Geometry Technology  Voice Recognition Techniques  Signature Verification Technique
  • 9. Fingerprint  The size of fingerprint is around 10*10*15. Arch Loop Whorl Ridge ending Bifurcation Short Ridge
  • 10. In this way the total features and template of Fingerprint is as following. The matcher matches any two templates as following image.
  • 11. Iris Recognition  This can be a combination of specific characteristics known as corona, crypts, filaments, freckles, pits, furr ows, striations and rings.
  • 12. Retina Geometry Technology  A retinal scan involves the use of a low-intensity coherent light source, which is projected onto the retina to illuminate the blood vessels which are then photographed and analyzed.  A retinal scan has an error rate of 1 in 10,000,000, compared to fingerprint identification error being sometimes as high as 1 in 500.
  • 13. Face Recognition Technology  Facial metric technology on the manufacture of the specific facial features. Eigen Face
  • 14. Hand Geometry Technology  There techniques include the estimation of length, width, thickness and surface area of the hand.
  • 15. Voice Recognition Techniques  Voice verification focuses on the vocal characteristics that produce speeches and not on the sound or the pronunciation of speech itself.  The vocal characteristics depend on the dimensions of the vocal tract, mouth, nasal cavities and the other speech processing mechanism of the human body.
  • 16. Signature Verification Technique  The dynamics is measured as a means of the pressure, direction, acceleration and the length of the strokes, dynamics number of strokes and their duration.  These are either traditional tablets or special purpose devices. Tablets capture 2D coordinates and the pressure.
  • 17. Application of Biometrics  Security  Authentication  E-commerce and E-governments  Secure Banking and Financial Transaction  Digital Rights Management  Healthcare Application  Crime Investigation  Social Services
  • 18. Conclusion  While Biometric authentication can offer a high degree of security, they are far from perfect solution.  The influences of biometric technology on society and the risks to privacy and threat to identify will require meditation through legislation.
  • 19. References [1] Smart Cart Alliance Identity Council (2007): Identity and Smart Card Technology and Application Glossary, http://www.smartcardalliances.org [2] Langenburg, Glenn (January 24, 2005). "Are one's fingerprints similar to those of his or her parents in any discernable way?". Scientific American. Retrieved 28 August 2010. [3] Thornton, John (May 9, 2000). "Latent Fingerprints, Setting Standards In The Comparison and Identification". 84th Annual Training Conference of the California State Division of IAI. Retrieved 30 August 2010. [4] Wikipedia Image http://en.wikipedia.org/wiki/File:Biometric_system_diagram.png [5] Sanjay R. Ganorkar, Ashok A. Ghatol, “Iris Recognition: An Emerging Biometrics Technology”, In Proc. of The sixth WSEAS International Conference on Single Processing, Robotics and Automation, Greece, Feb. 2007, pp. 91 – 96 [6] J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Eds, “Biometrics Systems: Technology, Design and Performance Evolution”, New York: Spinger Verlag, 2005 [7] M. A. Dabbah, W. L. Woo, and S. S. Dlay, “Secure Authentication for Face Recognition”, In Proc. of IEEE Symposium on computational Intelligence in Image and Signal Processing, April 2007, USA, pp. 121 – 126 [8] A. Kumar, D. C. Wong, H. C. Shen and A. K. Jain , “Personal Verification using Palmprinnt and Hand Geometry Biometrics”, In Proc. of fourth International Conference on Audio and Video based Biometric Person Authentication, Guildford, U.K. January 2003, pp 668-678 [9] S. Furui, “Recent Advances in Speaker Recognition”, In Proc. of first International Conference on Audio and video based Biometric person Authentication, UK, March 1997, pp 859 – 872 [10] A.K. Jain, A. Ross, and S. Prabhakar, “An Introduction to Biometrics Recognition,” IEEE Trans. Circuit Syst. Video Technology, Special Issue Image and Video based Biometrics, Volume 14, Issue 1st January 2004, pp. 4 – 20