SlideShare a Scribd company logo
1 of 23
PATTERN MATCHING USING BIOMETRIC TECHNIQUES For Documentation and Downloads Visit
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HISTORY ,[object Object],[object Object],[object Object],[object Object],[object Object]
BIOMETRIC SYSTEM CHARACTERISTIC ,[object Object],[object Object],[object Object],[object Object]
Basic architecture of a biometric  system
DIFFERENT METHODOLOGIES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FINGER PRINT IDENTIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object]
HAND GEOMETRY Examines : hand shape, lengths  and widths of the fingers, and  the overall size of the hand.  ,[object Object],[object Object]
IRIS-BASED IDENTIFICATION ,[object Object],[object Object]
RETINAL PATTERN RECOGNITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
FACIAL RECOGNITION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SIGNATURE RECOGNITION ,[object Object],1.Static signature verification. (determines only geometric features) 2.Dynamic signature verification. ( determines both geometric features and dynamic features)
SPEAKER VERIFICATION ,[object Object],[object Object],[object Object],[object Object]
FINGER PRINT ANALYSIS ,[object Object],[object Object],[object Object],Fig. Finger print matching
FINGERPRINT PATTERN TYPES Loop Whorl . Arch
FACTORS CONSIDERED IN SCANNING   ,[object Object],[object Object],[object Object],[object Object]
MULTIBIOMETRICS ,[object Object],[object Object]
APPLICATIONS ,[object Object],Driver’s licenses  Canteen administration in a campus Benefit payment systems  Border Control Voting systems Future Applications : ATM machine use Workstation and network access Travel and tourism Internet transactions Telephone transactions
DRAWBACKS OF BIOMETRIC METHODS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONCLUSION ,[object Object],Biometric systems are going to play a major role in coming future mostly in  Security field.
REFERENCES ,[object Object],[object Object],[object Object]
THAN"Q" For Documentation and Downloads Visit For Documentation and Downloads Visit
QUERIES

More Related Content

What's hot

Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication'Femi Akin-Laguda
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System Sadan Khan
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technologypalsantosh
 
Biometrics
BiometricsBiometrics
BiometricsNA000000
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometricMazin Alwaaly
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Face And Ear Composite Recognition Tool
Face And Ear Composite Recognition ToolFace And Ear Composite Recognition Tool
Face And Ear Composite Recognition ToolAbhineet Bhamra
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4sakshi_20
 
Feature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyFeature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyShashank Dhariwal
 

What's hot (20)

Bio shiv
Bio shivBio shiv
Bio shiv
 
biometrics
biometricsbiometrics
biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Biometric
BiometricBiometric
Biometric
 
Bio-Metric
Bio-MetricBio-Metric
Bio-Metric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
Farheen123
Farheen123Farheen123
Farheen123
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Pattern recognition ear as a biometric
Pattern recognition ear as a biometricPattern recognition ear as a biometric
Pattern recognition ear as a biometric
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Face And Ear Composite Recognition Tool
Face And Ear Composite Recognition ToolFace And Ear Composite Recognition Tool
Face And Ear Composite Recognition Tool
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Seminar
SeminarSeminar
Seminar
 
Feature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A SurveyFeature Extraction Techniques for Ear Biometrics: A Survey
Feature Extraction Techniques for Ear Biometrics: A Survey
 

Viewers also liked

湘南ミーティングChallenges for Real-time Activity Recognition報告
湘南ミーティングChallenges for Real-time Activity Recognition報告湘南ミーティングChallenges for Real-time Activity Recognition報告
湘南ミーティングChallenges for Real-time Activity Recognition報告Sozo Inoue
 
Samuel suarez. exp. iva
Samuel suarez. exp. ivaSamuel suarez. exp. iva
Samuel suarez. exp. ivasifca
 
My open bite case fatema
My open bite case fatemaMy open bite case fatema
My open bite case fatemaIshtiaq Hasan
 
Arm yourself with Domain Driven Security. It's time to slay some security trolls
Arm yourself with Domain Driven Security. It's time to slay some security trollsArm yourself with Domain Driven Security. It's time to slay some security trolls
Arm yourself with Domain Driven Security. It's time to slay some security trollsOmegapoint Academy
 
Makalah ilmu kesehatan masyarakat
Makalah ilmu kesehatan masyarakatMakalah ilmu kesehatan masyarakat
Makalah ilmu kesehatan masyarakatZelitania
 
Kelly Briceño hardware.ppt
Kelly Briceño hardware.pptKelly Briceño hardware.ppt
Kelly Briceño hardware.pptkathkbm
 
What is marketing channel
What is marketing channelWhat is marketing channel
What is marketing channelSameer Mathur
 
antecedentes de el calculo diferencial
antecedentes de el calculo diferencialantecedentes de el calculo diferencial
antecedentes de el calculo diferencialjosedej
 
La Evolución del Amojonamiento
La Evolución del AmojonamientoLa Evolución del Amojonamiento
La Evolución del Amojonamientoortiz_pedroj
 
How to build a consistent digital brand experience
How to build a consistent digital brand experienceHow to build a consistent digital brand experience
How to build a consistent digital brand experienceActivate Media
 
Programa Foro Turismo (Tcv) El Observatorio De Los Estrategas
Programa Foro Turismo (Tcv) El Observatorio De Los EstrategasPrograma Foro Turismo (Tcv) El Observatorio De Los Estrategas
Programa Foro Turismo (Tcv) El Observatorio De Los Estrategasguestbe3f9e
 
Variante de la hemoglobina con alteración de la
Variante de la hemoglobina con alteración de laVariante de la hemoglobina con alteración de la
Variante de la hemoglobina con alteración de laOriana Mundaray
 
Questões de segurança no correio eletrónico
Questões de segurança no correio eletrónicoQuestões de segurança no correio eletrónico
Questões de segurança no correio eletrónicoMaria Brandão
 
9 b fit and healthy
9 b fit and healthy9 b fit and healthy
9 b fit and healthycpugh5345
 
Oposiciones Secundaria Tecnología_Tema1
Oposiciones Secundaria Tecnología_Tema1Oposiciones Secundaria Tecnología_Tema1
Oposiciones Secundaria Tecnología_Tema1tanbac
 

Viewers also liked (20)

湘南ミーティングChallenges for Real-time Activity Recognition報告
湘南ミーティングChallenges for Real-time Activity Recognition報告湘南ミーティングChallenges for Real-time Activity Recognition報告
湘南ミーティングChallenges for Real-time Activity Recognition報告
 
TH Ecosystem 7-11
TH Ecosystem 7-11TH Ecosystem 7-11
TH Ecosystem 7-11
 
Samuel suarez. exp. iva
Samuel suarez. exp. ivaSamuel suarez. exp. iva
Samuel suarez. exp. iva
 
My open bite case fatema
My open bite case fatemaMy open bite case fatema
My open bite case fatema
 
Coaching Concepts
Coaching ConceptsCoaching Concepts
Coaching Concepts
 
Cie10. cavidad oral
Cie10. cavidad oralCie10. cavidad oral
Cie10. cavidad oral
 
002. 01 pecado vs santuario
002.  01 pecado vs santuario002.  01 pecado vs santuario
002. 01 pecado vs santuario
 
El sismo de 1970
El sismo de 1970El sismo de 1970
El sismo de 1970
 
Arm yourself with Domain Driven Security. It's time to slay some security trolls
Arm yourself with Domain Driven Security. It's time to slay some security trollsArm yourself with Domain Driven Security. It's time to slay some security trolls
Arm yourself with Domain Driven Security. It's time to slay some security trolls
 
Makalah ilmu kesehatan masyarakat
Makalah ilmu kesehatan masyarakatMakalah ilmu kesehatan masyarakat
Makalah ilmu kesehatan masyarakat
 
Kelly Briceño hardware.ppt
Kelly Briceño hardware.pptKelly Briceño hardware.ppt
Kelly Briceño hardware.ppt
 
What is marketing channel
What is marketing channelWhat is marketing channel
What is marketing channel
 
antecedentes de el calculo diferencial
antecedentes de el calculo diferencialantecedentes de el calculo diferencial
antecedentes de el calculo diferencial
 
La Evolución del Amojonamiento
La Evolución del AmojonamientoLa Evolución del Amojonamiento
La Evolución del Amojonamiento
 
How to build a consistent digital brand experience
How to build a consistent digital brand experienceHow to build a consistent digital brand experience
How to build a consistent digital brand experience
 
Programa Foro Turismo (Tcv) El Observatorio De Los Estrategas
Programa Foro Turismo (Tcv) El Observatorio De Los EstrategasPrograma Foro Turismo (Tcv) El Observatorio De Los Estrategas
Programa Foro Turismo (Tcv) El Observatorio De Los Estrategas
 
Variante de la hemoglobina con alteración de la
Variante de la hemoglobina con alteración de laVariante de la hemoglobina con alteración de la
Variante de la hemoglobina con alteración de la
 
Questões de segurança no correio eletrónico
Questões de segurança no correio eletrónicoQuestões de segurança no correio eletrónico
Questões de segurança no correio eletrónico
 
9 b fit and healthy
9 b fit and healthy9 b fit and healthy
9 b fit and healthy
 
Oposiciones Secundaria Tecnología_Tema1
Oposiciones Secundaria Tecnología_Tema1Oposiciones Secundaria Tecnología_Tema1
Oposiciones Secundaria Tecnología_Tema1
 

Similar to Spattern matching using biometric techniques

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxMewar University
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxCoreGaming3
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniquesjackofhearty1
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)kalyanAdduri
 

Similar to Spattern matching using biometric techniques (20)

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
SEMINAR.pptx
SEMINAR.pptxSEMINAR.pptx
SEMINAR.pptx
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)
 

More from Presentaionslive.blogspot.com

More from Presentaionslive.blogspot.com (20)

Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
Phis
PhisPhis
Phis
 
Network security
Network securityNetwork security
Network security
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Grid computing
Grid computingGrid computing
Grid computing
 
Networksecurity&cryptography
Networksecurity&cryptographyNetworksecurity&cryptography
Networksecurity&cryptography
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Information Security
Information SecurityInformation Security
Information Security
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
 
Steganography
Steganography Steganography
Steganography
 
Novel architecture
Novel architectureNovel architecture
Novel architecture
 
Neural networks
Neural networksNeural networks
Neural networks
 
Multimedia and gaming
Multimedia and gamingMultimedia and gaming
Multimedia and gaming
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A multimodal interaction framework for pervasive game applications
A   multimodal   interaction   framework   for pervasive   game   applicationsA   multimodal   interaction   framework   for pervasive   game   applications
A multimodal interaction framework for pervasive game applications
 
1 spattern matching using biometric techniques
1 spattern matching using biometric techniques1 spattern matching using biometric techniques
1 spattern matching using biometric techniques
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Unique p mail-addressing 97-03
Unique p mail-addressing 97-03Unique p mail-addressing 97-03
Unique p mail-addressing 97-03
 
Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interface
 

Spattern matching using biometric techniques