SlideShare une entreprise Scribd logo
1  sur  18
Biometrics Authentication
      Technology
                   Submitted By:
                    Navin Kumar
                    09EAXEC075
                    Navin Kumar
Three main types of authentication
           available today are:

•   Something you know, like a password, PIN,
    or code.


•   Something you have, like a swipe card, smart
    card, token, or key.


•   Something you are, which is biometrics.
What is a biometric?

   Biometrics are automated methods of identifying a
    person or verifying the identity of a person based on
    a physiological or behavioural characteristic.

   Most definitive, real-time tool available today.

   Can be combined with other tools to form more
    secure, easier to use verification solutions.

   Recognizes individuals definitively.
Characteristics

The common Physical characteristics are:

   Fingerprint
   Face
   Retina
   Iris
   Vein pattern
   Hand and finger geometry
Characteristics
Behavioral characteristics are:

   Keystroke dynamics


   Voice


   Gait


   Signature dynamics
Biometrics Process

                  new biometric sample is requested.
                                                           No

                                  Signal Processing,       Quality
  Biometric       Transmission   Feature Extraction,      Sufficient?
Data Collection                     Representation

                                                                Yes

                                                       Generate Template


                                       Database         Template Match


                                         Yes              Decision
                                                         Confidence?
                                          No
Fingerprint Recognition steps:




                          Database
Face recognition process:

Input face                                     Extraction of
                               Extraction of   face features
  image                         face image




                             Positive

                                                Database
                            Negative
Iris Identification Steps:

Input of face                                           Recognition of
                     Detection of
   image                            Put iris in focus    iris pattern
                     eye regions




                                      Accept

                                                             Database
                                       Reject
Vein Recognition System:

 Input of palm   The output   Generate veins
    picture       picture       structure




                     Match

                                 Database
                  Not match
Signature Verification Process




 the angle at which the pen is held,
 the number of times the pen is lifted,
 the time it takes to write the entire signature,    Biometric
                                                        trait
 the pressure exerted by the person while signing,

 the variations in the speed with which different
  parts of the signature are written.
Aadhaar

One-time standardized Aadhaar enrollment establishes uniqueness of resident via
„biometric de-duplication‟
  • Only one Aadhaar number per eligible individual

Online Authentication is provided by UIDAI
 • Demographic Data (Name, Address, DOB, Gender)
 • Biometric Data (Fingerprint, Iris, Face)

Aadhaar :subject to online authentication is proof of ID

   Aadhaar enrollment / Update =    Aadhaar No. Issued,     “Verification” of KYC
               KYC                 stored in Auth. Server     (Authentication)




                                                                                    13
Applications Area of Biometric


Enterprise and E-Government services

National Security

Airport, Bank, Offices

Recently implemented in ATM, Voting Machine

Internet Banking

Biometric Time Attendance System
Advantages of biometrics
Disadvantages of Biometrics

Costly.


Facial imaging can also hinder accurate identifications.


Missing body part problem.


False acceptances and rejections.


The scanning of eye is fearful.

The nervousness that people feel about the scanners
identification.
Conclusion

                  Not perfect yet.

              Successful applications.

    Decreasing costs and increasing convenience.

    Increasing both privacy and identity security.

         The field of biometrics is evolving.

           Benefit from this technology .
Biometric authentication ppt by navin 6 feb

Contenu connexe

Tendances

Tendances (20)

Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Signature verification
Signature verificationSignature verification
Signature verification
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 

Similaire à Biometric authentication ppt by navin 6 feb

Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Presentation F7 corporation_en
Presentation F7 corporation_enPresentation F7 corporation_en
Presentation F7 corporation_engaviles01
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
How AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive OverviewHow AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive OverviewFTx Identity
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasTenet Systems Pvt Ltd
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBirkumarJana
 

Similaire à Biometric authentication ppt by navin 6 feb (20)

Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Biomatric
BiomatricBiomatric
Biomatric
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
Presentation F7 corporation_en
Presentation F7 corporation_enPresentation F7 corporation_en
Presentation F7 corporation_en
 
Biometrics
Biometrics Biometrics
Biometrics
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
biomatric system
biomatric systembiomatric system
biomatric system
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Face and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial IntelligenceFace and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial Intelligence
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
How AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive OverviewHow AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive Overview
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Biometric
Biometric Biometric
Biometric
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 

Plus de Navin Kumar

Fat indian wedding
Fat indian weddingFat indian wedding
Fat indian weddingNavin Kumar
 
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)Navin Kumar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)Navin Kumar
 
Encoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper pptEncoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper pptNavin Kumar
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyNavin Kumar
 
Embedded Systems
Embedded SystemsEmbedded Systems
Embedded SystemsNavin Kumar
 

Plus de Navin Kumar (10)

Fat indian wedding
Fat indian weddingFat indian wedding
Fat indian wedding
 
Axis bank
Axis bankAxis bank
Axis bank
 
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)
 
Encoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper pptEncoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper ppt
 
Nanogenerator
NanogeneratorNanogenerator
Nanogenerator
 
Image Converter
Image ConverterImage Converter
Image Converter
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Embedded Systems
Embedded SystemsEmbedded Systems
Embedded Systems
 

Dernier

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Dernier (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Biometric authentication ppt by navin 6 feb

  • 1. Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075 Navin Kumar
  • 2. Three main types of authentication available today are: • Something you know, like a password, PIN, or code. • Something you have, like a swipe card, smart card, token, or key. • Something you are, which is biometrics.
  • 3. What is a biometric?  Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioural characteristic.  Most definitive, real-time tool available today.  Can be combined with other tools to form more secure, easier to use verification solutions.  Recognizes individuals definitively.
  • 4. Characteristics The common Physical characteristics are:  Fingerprint  Face  Retina  Iris  Vein pattern  Hand and finger geometry
  • 5. Characteristics Behavioral characteristics are:  Keystroke dynamics  Voice  Gait  Signature dynamics
  • 6.
  • 7. Biometrics Process new biometric sample is requested. No Signal Processing, Quality Biometric Transmission Feature Extraction, Sufficient? Data Collection Representation Yes Generate Template Database Template Match Yes Decision Confidence? No
  • 9. Face recognition process: Input face Extraction of Extraction of face features image face image Positive Database Negative
  • 10. Iris Identification Steps: Input of face Recognition of Detection of image Put iris in focus iris pattern eye regions Accept Database Reject
  • 11. Vein Recognition System: Input of palm The output Generate veins picture picture structure Match Database Not match
  • 12. Signature Verification Process  the angle at which the pen is held,  the number of times the pen is lifted,  the time it takes to write the entire signature, Biometric trait  the pressure exerted by the person while signing,  the variations in the speed with which different parts of the signature are written.
  • 13. Aadhaar One-time standardized Aadhaar enrollment establishes uniqueness of resident via „biometric de-duplication‟ • Only one Aadhaar number per eligible individual Online Authentication is provided by UIDAI • Demographic Data (Name, Address, DOB, Gender) • Biometric Data (Fingerprint, Iris, Face) Aadhaar :subject to online authentication is proof of ID Aadhaar enrollment / Update = Aadhaar No. Issued, “Verification” of KYC KYC stored in Auth. Server (Authentication) 13
  • 14. Applications Area of Biometric Enterprise and E-Government services National Security Airport, Bank, Offices Recently implemented in ATM, Voting Machine Internet Banking Biometric Time Attendance System
  • 16. Disadvantages of Biometrics Costly. Facial imaging can also hinder accurate identifications. Missing body part problem. False acceptances and rejections. The scanning of eye is fearful. The nervousness that people feel about the scanners identification.
  • 17. Conclusion Not perfect yet. Successful applications. Decreasing costs and increasing convenience. Increasing both privacy and identity security. The field of biometrics is evolving. Benefit from this technology .