SlideShare a Scribd company logo
Biometric Authentication
Finger Print Based Access
Control
Copyright © 2015 Skyfi Education Labs
Pvt. Ltd.
Introduction to Biometrics
 The term "biometrics" is derived from the Greek
words “Bio" means life and “Metric" means to
measure.
 Biometrics is the measurement and statistical
analysis of people's physical and behavioral
characteristics.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Introduction to Biometrics
 The technology is mainly used for identification and
access control or for identifying individuals that are
under surveillance.
 The basic premise of biometric authentication is that
everyone is unique and an individual can be
identified by his or her intrinsic physical or behavioral
traits.
 For example, every human has an unique fingerprint,
DNA, iris etc.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Types of biometric identifiers
 Physiological characteristics: The shape or
composition of the body.
Finger Print DNA Face Recognition Iris
Recognition
© 2015 Skyfi Education Labs Pvt.
Ltd.
Types of biometric identifiers
 Behavioral characteristics: The behavior of a person.
Typing Rhythm Gesture Voice
Recognition
© 2015 Skyfi Education Labs Pvt.
Ltd.
Comparison of Biometrics
Technology Accuracy Cost Social
Acceptability
Devices
DNA High High High Lab Test
Equipment
Iris High High Medium-Low Camera
Face Medium-Low Medium Low Camera
Voice Medium Medium Medium Microphone
Finger Print High Medium High Scanner
Hand Gesture Medium-Low Low Medium Scanner
Signature Low Medium High Optical Pen
© 2015 Skyfi Education Labs Pvt.
Ltd.
Human Finger Print
 A fingerprint is an impression left by the friction
ridges of a human finger.
 These are detailed, presumed to be nearly unique,
difficult to alter and durable over the life of an
individual, making them suitable as long-term
markers of human identity.
 A fingerprint consists of ridges and valleys and
they provide grip for our hand.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Finger Print Patterns
The three basic patterns of fingerprint ridges are
Arch Loop Whorl
Scientists have found that family members often share
the same general fingerprint patterns, leading to the
belief that these patterns are inherited.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Finger Print Recognition
 Finger Print Recognition requires the comparison of
several features of the print pattern.
 These include patterns, which are aggregate
characteristics of ridges, and minutia points, which
are unique features found within the patterns.
Ridge Ending Bifurcation Short
Ridge
© 2015 Skyfi Education Labs Pvt.
Ltd.
Finger Print Sensor
 A fingerprint sensor is an electronic device used to
capture a digital image of the fingerprint pattern.
 The captured image is called a live scan. This live
scan is digitally processed to create a biometric
template (a collection of extracted features) which is
stored and used for matching.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Types of Finger Print Sensor
 Capacitive
 Optical
 RF
 Thermal
 Piezo resistive
 Ultrasonic
 Piezoelectric
 MEMS
© 2015 Skyfi Education Labs Pvt.
Ltd.
Capacitive and Optical type finger print
are the most commonly used one.
Schematic Diagram of Biometric System
© 2015 Skyfi Education Labs Pvt.
Ltd.
Function of Biometric System
 Sensor: it is the input unit may contain scanner,
camera, microphone etc to capture the identification.
 Pre Processor : this involve in filtering the useful
data from the measured quantity.
 Extractor: this will extract the necessary features that
need to be identified.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Function of Biometric System
 Template Generator: based on the extracted features
the template will be made as a digits or an image.
Those templates will be stored in a data base only
during enrollment process.
 Matcher: during the matching phase the stored
templates will be compared with the input data using
various algorithms.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Application of Biometrics
 India's national ID program called Aadhaar is the
largest biometric database in the world.
 As of 31 December 2015, over 95 crore (950 million)
Aadhaar numbers have been issued in the project.
© 2015 Skyfi Education Labs Pvt.
Ltd.
Application of Biometrics
Voice Search Door Access
© 2015 Skyfi Education Labs Pvt.
Ltd.
Application of Biometrics
Personal Identity Surveillance System
© 2015 Skyfi Education Labs Pvt.
Ltd.
Online Project Based courses
 For more details on this project visit
http://www.skyfilabs.com/online-courses
Write to us at info@skyfilabs.com
Follow us at www.facebook.com/skyfilabs
Contact us at 1800-3000-1260
18

More Related Content

What's hot

Biomatrics
BiomatricsBiomatrics
Biomatrics
Sheel Shah
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
parmsidhu
 
Biometric
BiometricBiometric
Biometric
aceedutec
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
Chitrachedu Dada Kalandar
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
Raghavendra DC
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
CheapticketsSG
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication final
Ashok Kuikel
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
Alpesh Kurhade
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
IJTET Journal
 
Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
SajidHussain340
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
Alexandru Dorobantu
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
Shamili Nookala
 
Biometrics
BiometricsBiometrics
Biometrics
senejug
 
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
Shiva Krishna Chandra Shekar
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
OECLIB Odisha Electronics Control Library
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 

What's hot (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Biometric
BiometricBiometric
Biometric
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication final
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 

Viewers also liked

Presentación de productos y servicios de sky fi
Presentación de productos y servicios de sky fiPresentación de productos y servicios de sky fi
Presentación de productos y servicios de sky fi
skyfi
 
3g vs wifi
3g vs wifi3g vs wifi
3g vs wifi
Pavan Kumar
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technology
Sushil Sudake
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
Ericsson
 
Paper battery
Paper batteryPaper battery
Paper battery
adhipsebingeorge
 
Presentation on Paper battery
Presentation on Paper battery Presentation on Paper battery
Presentation on Paper battery
manish katara
 
Paper battery
Paper batteryPaper battery
Paper battery
Biswajit Pratihari
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
Abhishek Manwal
 

Viewers also liked (8)

Presentación de productos y servicios de sky fi
Presentación de productos y servicios de sky fiPresentación de productos y servicios de sky fi
Presentación de productos y servicios de sky fi
 
3g vs wifi
3g vs wifi3g vs wifi
3g vs wifi
 
5 g –wireless technology
5 g –wireless technology5 g –wireless technology
5 g –wireless technology
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Presentation on Paper battery
Presentation on Paper battery Presentation on Paper battery
Presentation on Paper battery
 
Paper battery
Paper batteryPaper battery
Paper battery
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 

Similar to Skyfi labs Biometric Authentication

Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
University Of Education Lahore D.G Khan Campus
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
mounika117
 
Biometric
BiometricBiometric
Biometric
NikhilKumar1203
 
Biometric
Biometric Biometric
Biometric
Vinay Gupta
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
8.biometric security
8.biometric security8.biometric security
8.biometric security
nishiyath
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
Manoj Kumar
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Biometrics
BiometricsBiometrics
Biometrics
BiometricsBiometrics
Biometrics
King Kamal
 
Biometrics
BiometricsBiometrics
Biometrics
meeravali shaik
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 

Similar to Skyfi labs Biometric Authentication (20)

Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Biometric
BiometricBiometric
Biometric
 
Biometric
Biometric Biometric
Biometric
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
8.biometric security
8.biometric security8.biometric security
8.biometric security
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 

Recently uploaded

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 

Recently uploaded (20)

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 

Skyfi labs Biometric Authentication

  • 1. Biometric Authentication Finger Print Based Access Control Copyright © 2015 Skyfi Education Labs Pvt. Ltd.
  • 2. Introduction to Biometrics  The term "biometrics" is derived from the Greek words “Bio" means life and “Metric" means to measure.  Biometrics is the measurement and statistical analysis of people's physical and behavioral characteristics. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 3. Introduction to Biometrics  The technology is mainly used for identification and access control or for identifying individuals that are under surveillance.  The basic premise of biometric authentication is that everyone is unique and an individual can be identified by his or her intrinsic physical or behavioral traits.  For example, every human has an unique fingerprint, DNA, iris etc. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 4. Types of biometric identifiers  Physiological characteristics: The shape or composition of the body. Finger Print DNA Face Recognition Iris Recognition © 2015 Skyfi Education Labs Pvt. Ltd.
  • 5. Types of biometric identifiers  Behavioral characteristics: The behavior of a person. Typing Rhythm Gesture Voice Recognition © 2015 Skyfi Education Labs Pvt. Ltd.
  • 6. Comparison of Biometrics Technology Accuracy Cost Social Acceptability Devices DNA High High High Lab Test Equipment Iris High High Medium-Low Camera Face Medium-Low Medium Low Camera Voice Medium Medium Medium Microphone Finger Print High Medium High Scanner Hand Gesture Medium-Low Low Medium Scanner Signature Low Medium High Optical Pen © 2015 Skyfi Education Labs Pvt. Ltd.
  • 7. Human Finger Print  A fingerprint is an impression left by the friction ridges of a human finger.  These are detailed, presumed to be nearly unique, difficult to alter and durable over the life of an individual, making them suitable as long-term markers of human identity.  A fingerprint consists of ridges and valleys and they provide grip for our hand. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 8. Finger Print Patterns The three basic patterns of fingerprint ridges are Arch Loop Whorl Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 9. Finger Print Recognition  Finger Print Recognition requires the comparison of several features of the print pattern.  These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. Ridge Ending Bifurcation Short Ridge © 2015 Skyfi Education Labs Pvt. Ltd.
  • 10. Finger Print Sensor  A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.  The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 11. Types of Finger Print Sensor  Capacitive  Optical  RF  Thermal  Piezo resistive  Ultrasonic  Piezoelectric  MEMS © 2015 Skyfi Education Labs Pvt. Ltd. Capacitive and Optical type finger print are the most commonly used one.
  • 12. Schematic Diagram of Biometric System © 2015 Skyfi Education Labs Pvt. Ltd.
  • 13. Function of Biometric System  Sensor: it is the input unit may contain scanner, camera, microphone etc to capture the identification.  Pre Processor : this involve in filtering the useful data from the measured quantity.  Extractor: this will extract the necessary features that need to be identified. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 14. Function of Biometric System  Template Generator: based on the extracted features the template will be made as a digits or an image. Those templates will be stored in a data base only during enrollment process.  Matcher: during the matching phase the stored templates will be compared with the input data using various algorithms. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 15. Application of Biometrics  India's national ID program called Aadhaar is the largest biometric database in the world.  As of 31 December 2015, over 95 crore (950 million) Aadhaar numbers have been issued in the project. © 2015 Skyfi Education Labs Pvt. Ltd.
  • 16. Application of Biometrics Voice Search Door Access © 2015 Skyfi Education Labs Pvt. Ltd.
  • 17. Application of Biometrics Personal Identity Surveillance System © 2015 Skyfi Education Labs Pvt. Ltd.
  • 18. Online Project Based courses  For more details on this project visit http://www.skyfilabs.com/online-courses Write to us at info@skyfilabs.com Follow us at www.facebook.com/skyfilabs Contact us at 1800-3000-1260 18

Editor's Notes

  1. Every human has some unique features of their own. Those uniqueness is measured for security applications known as biometric techniques. The parameter may be a physical appearance or else the behavior.
  2. Biometric is classified into two types: Physical and behavioral characteristics. Physical characteristics are the unique feature in human body as shown.
  3. In This method the behavior of a people is used as an identification.
  4. arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side. whorl: Ridges form circularly around a central point on the finger.
  5. The ridge ending is the point at which a ridge terminates. Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or dots) are ridges which are significantly shorter than the average ridge length on the fingerprint.
  6. It is the basic schematic of all kind of biometric system. The sensor is the input unit may contain scanner, camera, microphone etc to capture the identification. Pre processing involve in filtering the useful data from the measured quantity.