SlideShare une entreprise Scribd logo
1  sur  13
Topic

BIO Metric Devices
Group Members



Presented By:

Ahmed Rehan      (14-10003)
Shamaas LaalDin (15-11022)
Biometric Device


Biometrics (or biometric
authentication) refers to
the identification of humans
by their characteristics or
traits.
Computer               science,
biometrics to be specific, is
used     as    a   form      of
identification and access
control. It is also used to
identify individuals in groups
that are under surveillance.
Biometric Identifiers

Biometric identifiers are the distinctive, measurable
characteristics used to label and describe
individuals. The two categories of biometric
identifiers include physiological and behavioral
characteristics. A biometric would identify by one's
➲voice
➲DNA
➲hand print
➲behavior.
Types Of Biometric Device

    Fingerprint Scanner

    Retinal/Iris Scanner

    Facial Scanner

    Hand Geometry

    Voice print

    DNA Fingerprint

    Deep Tissue Illumination

    Keystroke Pattern
Danger to owner of secured items

When thieves cannot get access to secure properties,
there is a chance that the thieves will stalk and assault
the property owner to gain access. If the item is secured
with a biometric device, the damage to the owner could
be irreversible, and potentially cost more than the
secured property. For example, in 2005, Malaysian car
thieves cut off the finger of a Mercedes-Benz S-Class
owner when attempting to steal the car.
Use of Biometric Devices

Biometric devices are used all over the world like
India,Canada, Australia etc. In Pakistan Biometric
devices are also being used in several areas of life.
➲Educational Institute
➲Hospital
➲Offices Libraries
➲Shopping Malls
➲Housing societies etc.
How Biometric devices Work

➲   Biometrics is a word that comes from two Greek words bios,
    which means life, and metron, which means measure.
    Biometrics then are a measure of some aspect of life. A
    biometric device uses physical or behavioral traits and
    identifies people with those traits. In reality, a biometric
    devices scans the aspect of life – such as a fingerprint or
    voice pattern – and extracts data from it which it stores
    and then uses to compare the next time you want to access
    whatever the biometric device is keeping secure.
Card Swapping


Several    Authorities    like
shopping          Mall,housing
authorities and hostels are
using card scanner, these
scanner      provide     them
sufficient information about
the existing individual and
enables registration for the
new ones, This act reduce
the probability of theft and
robbery         but       this
Information has to be kept
save and secure.
Fingerprint Scanner

Its Very difficult to keep
and maintain hard data about
the attendance of individual
in offices, Some offices
Calculate there employees
salaries . Finger print
scanner enables us to keep
incoming     and     outgoing
timings of Individuals. These
devices are often attach
with     software’s     which
prepare evaluation reports it
self.
Security policy


Some people claim that
personal data will be used
because when these devices
attach    with    software’s
contain several information
about individual and some
time      very      personal
information, so there must
be security policy to keep
the data safe and secure
Effects on Society



These devices effect positively on society they
reduce human efforts and create a sense of
synchronization and they provide easy reports to
evaluate businesses and individuals.
Thank You

Contenu connexe

Tendances

Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materialsyasmeenreem
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical educationArhind Gautam
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Biometric technology
Biometric technology Biometric technology
Biometric technology r1o9h9i6t
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 

Tendances (20)

Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materials
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Final report
Final reportFinal report
Final report
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric technology
Biometric technology Biometric technology
Biometric technology
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 

Similaire à Shamaas

Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systemsnishiyath
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Biometric security system
Biometric security systemBiometric security system
Biometric security systemMithun Paul
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 

Similaire à Shamaas (19)

Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systems
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Ai
AiAi
Ai
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Shamaas

  • 2. Group Members Presented By: Ahmed Rehan (14-10003) Shamaas LaalDin (15-11022)
  • 3. Biometric Device Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Computer science, biometrics to be specific, is used as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
  • 4. Biometric Identifiers Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. The two categories of biometric identifiers include physiological and behavioral characteristics. A biometric would identify by one's ➲voice ➲DNA ➲hand print ➲behavior.
  • 5. Types Of Biometric Device  Fingerprint Scanner  Retinal/Iris Scanner  Facial Scanner  Hand Geometry  Voice print  DNA Fingerprint  Deep Tissue Illumination  Keystroke Pattern
  • 6. Danger to owner of secured items When thieves cannot get access to secure properties, there is a chance that the thieves will stalk and assault the property owner to gain access. If the item is secured with a biometric device, the damage to the owner could be irreversible, and potentially cost more than the secured property. For example, in 2005, Malaysian car thieves cut off the finger of a Mercedes-Benz S-Class owner when attempting to steal the car.
  • 7. Use of Biometric Devices Biometric devices are used all over the world like India,Canada, Australia etc. In Pakistan Biometric devices are also being used in several areas of life. ➲Educational Institute ➲Hospital ➲Offices Libraries ➲Shopping Malls ➲Housing societies etc.
  • 8. How Biometric devices Work ➲ Biometrics is a word that comes from two Greek words bios, which means life, and metron, which means measure. Biometrics then are a measure of some aspect of life. A biometric device uses physical or behavioral traits and identifies people with those traits. In reality, a biometric devices scans the aspect of life – such as a fingerprint or voice pattern – and extracts data from it which it stores and then uses to compare the next time you want to access whatever the biometric device is keeping secure.
  • 9. Card Swapping Several Authorities like shopping Mall,housing authorities and hostels are using card scanner, these scanner provide them sufficient information about the existing individual and enables registration for the new ones, This act reduce the probability of theft and robbery but this Information has to be kept save and secure.
  • 10. Fingerprint Scanner Its Very difficult to keep and maintain hard data about the attendance of individual in offices, Some offices Calculate there employees salaries . Finger print scanner enables us to keep incoming and outgoing timings of Individuals. These devices are often attach with software’s which prepare evaluation reports it self.
  • 11. Security policy Some people claim that personal data will be used because when these devices attach with software’s contain several information about individual and some time very personal information, so there must be security policy to keep the data safe and secure
  • 12. Effects on Society These devices effect positively on society they reduce human efforts and create a sense of synchronization and they provide easy reports to evaluate businesses and individuals.