SlideShare une entreprise Scribd logo
1  sur  20
Biometrics-Security Boon or Yet Another Technology Mistake? Group 7 Gagan Rajalekshmi  Sunil
What we need? A Method to identify Individuals which is
A Method to identify Individuals which is Secure Convenient Unique
How do we do that? Something you Know: Passwords
How do we do that? Something You have: ID cards and Smart Cards
How do we do that? RFID Cards
How do we do that? Wrist Bands
What’s Wrong with all these? ID Cards Smart Cards RFID cards Wrist Bands Passwords Can be stolenEasily Duplicated Have got Limits Forgotten Stolen
Answer to all this is…….……
Biometrics     Biometrics is the study of computerized methods to identify a person by their unique physical or behavioral characteristics
Types of Biometrics Biometrics can be Divided into two classes: Physiological  			Examples:   face, fingerprint, hand geometry and iris recognition Behavioral  			Examples:   signature and voice
Application of Biometrics Access control Immigration checks Police records Customer identification, Loyalty programs Security systems Patient management in hospitals Public welfare programs management Preventing identity theft  Membership management in clubs, libraries etc. Enterprise network security Transaction management Banking, ATMs
Advantages Unique Increase security No need to carry ID’s the pattern in iris, retina or fingerprint remain the same throughout our life. No duplication of individuals identity (no impersonation)
Reduce Burden e.g. no car keys , house keys, no passwords
UID - Aadhar three pieces of biometric data- Consist of individuals biometric information finger print, iris scans and picture of face. Biggest implementation of biometrics in the world
Disadvantages False rejection False acceptance One password ‘ever’ Physical damage Biometric database compromised Corrupt matcher Changed feature set
Ethical issues Personal data used for something other than its advertised purpose. Privacy issues Who can access data Misuse of personal data Public concern What happens to biometric data after the intended use is over Security of biometric data assured during transmission and storage
Some case studies Biometric passports hacked – Britain "Vietnamese researchers have cracked the facial recognition technology used for authentication in Lenovo, Asus, and Toshiba laptops
Biometrics-Security Boon or Yet Another Technology Mistake?
Thank you !!

Contenu connexe

Tendances

Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
Privacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsPrivacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsFrancesco Bonadiman
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIVR Technology Group
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 

Tendances (20)

Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Privacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsPrivacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric Systems
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric
Biometric Biometric
Biometric
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 

En vedette

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Thermography.ppt
Thermography.pptThermography.ppt
Thermography.pptsohitkc
 

En vedette (6)

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Thermography.ppt
Thermography.pptThermography.ppt
Thermography.ppt
 

Similaire à Biometrics Pros & cons

BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMRoy Awais
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE Roy Awais
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometricszia balti
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 
What is biometric identification.pdf
What is biometric identification.pdfWhat is biometric identification.pdf
What is biometric identification.pdfBahaa Abdulhadi
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)mounika117
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Biometric security system
Biometric security systemBiometric security system
Biometric security systemMithun Paul
 

Similaire à Biometrics Pros & cons (20)

BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
What is biometric identification.pdf
What is biometric identification.pdfWhat is biometric identification.pdf
What is biometric identification.pdf
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Shamaas
ShamaasShamaas
Shamaas
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 

Dernier

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Dernier (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Biometrics Pros & cons

  • 1. Biometrics-Security Boon or Yet Another Technology Mistake? Group 7 Gagan Rajalekshmi Sunil
  • 2. What we need? A Method to identify Individuals which is
  • 3. A Method to identify Individuals which is Secure Convenient Unique
  • 4. How do we do that? Something you Know: Passwords
  • 5. How do we do that? Something You have: ID cards and Smart Cards
  • 6. How do we do that? RFID Cards
  • 7. How do we do that? Wrist Bands
  • 8. What’s Wrong with all these? ID Cards Smart Cards RFID cards Wrist Bands Passwords Can be stolenEasily Duplicated Have got Limits Forgotten Stolen
  • 9. Answer to all this is…….……
  • 10. Biometrics Biometrics is the study of computerized methods to identify a person by their unique physical or behavioral characteristics
  • 11. Types of Biometrics Biometrics can be Divided into two classes: Physiological Examples: face, fingerprint, hand geometry and iris recognition Behavioral Examples: signature and voice
  • 12. Application of Biometrics Access control Immigration checks Police records Customer identification, Loyalty programs Security systems Patient management in hospitals Public welfare programs management Preventing identity theft Membership management in clubs, libraries etc. Enterprise network security Transaction management Banking, ATMs
  • 13. Advantages Unique Increase security No need to carry ID’s the pattern in iris, retina or fingerprint remain the same throughout our life. No duplication of individuals identity (no impersonation)
  • 14. Reduce Burden e.g. no car keys , house keys, no passwords
  • 15. UID - Aadhar three pieces of biometric data- Consist of individuals biometric information finger print, iris scans and picture of face. Biggest implementation of biometrics in the world
  • 16. Disadvantages False rejection False acceptance One password ‘ever’ Physical damage Biometric database compromised Corrupt matcher Changed feature set
  • 17. Ethical issues Personal data used for something other than its advertised purpose. Privacy issues Who can access data Misuse of personal data Public concern What happens to biometric data after the intended use is over Security of biometric data assured during transmission and storage
  • 18. Some case studies Biometric passports hacked – Britain "Vietnamese researchers have cracked the facial recognition technology used for authentication in Lenovo, Asus, and Toshiba laptops
  • 19. Biometrics-Security Boon or Yet Another Technology Mistake?