SlideShare a Scribd company logo
1 of 26
In the terms of computer security, biometrics refers
to authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified.
 A Biometric System is a system for the automated
recognition of individuals based on their behavioral
and biological characteristics.
 Depending on the context, in a biometric system, there
are two different ways to resolve a person’s identity
 I) verification
 Ii) identification



Verification:- Comparing a sample against a single
stored template is called verification

?

1

 Input

stored Template
Identification :- Search a sample against a database of
templates.

1

input data
database
1) Physical biometrics:










Fingerprint—Analyzing fingertip patterns
Facial recognition/face location—Measuring facial
characteristics
Hand geometry—Measuring the shape of the hand
Iris scan—Analyzing features of colored ring of the eye.
Retinal scan—Analyzing blood vessels in the eye
Vascular patterns—Analyzing vein patterns
DNA—Analyzing genetic makeup.
Earprint—this method is based on geometric distances, force
field transformation
It actually have
 Crossovers
 Core
 Islands
 Delta
 Pore

The distance between eyes
 Size of mouth
 It is sensitive to environmental variables such as dust
and lighting and other factors such as facial expression,
facial hair, hats and spectacles.
 Templates are typically between 80 and 1,000 bytes in
size.

The colored ring surrounding
 The pupil of the eye
 Iris patterns are formed in the eighth month of age and,
remain stable throughout the life of the individual
 The iris can have approximately 270 distinct
characteristics including meshwork, striations, rings,
freckles.
 high-quality black and white image of the iris is taken
for processing into a template that is typically around
256 bytes in size.

Retinal scans record the pattern of blood vessels at the
back of the eyeball
 The biometric sensor projects a light into the eye and
requires close proximity and a high degree of user cooperation.
 Retinal patterns are affected by medical conditions, for
example high blood pressure or eye disease
 Retinal scan templates are typically 40 to 100 bytes in
size.

2) Behavioral biometrics:
 Speaker/voice recognition—Analyzing vocal
behavior
 Signature/handwriting—Analyzing signature
dynamics
 Keystroke/patterning—Measuring the time spacing of
typed words
It’s a habitual speaking recognition.
 Voice recognition systems analyze differences such as
in pitch, and tone.
 This biometric is also sensitive to environmental
conditions such as background noise.
 Template size can vary significantly according to the
length of the pass phrase.

This biometric analyses signature characteristics such
as total time, speed, acceleration, character direction,
stroke order, stroke count, pressure and contact with
the writing surface.
 These templates are typically 50 to 300 bytes in size.

Similar to signature verification, this measures the
characteristics of an individual’s input of a pass phrase
or password. Characteristics may include total time,
speed with particular keys and pressure.
 Again the template size can vary significantly
depending on the length of the password or phrase.

1. Sensing
◦ User’s characteristic must be presented to a sensor
◦ Output is a function of:
 Biometric measure
 The way it is presented
 Technical characteristics of sensor

2. Signal Processing
◦ Feature extraction
◦ Extract the desired biometric pattern

 remove noise and signal losses
 discard qualities that are not distinctive/repeatable
 Determine if feature is of “good quality”
3. Pattern matching
◦ Sample compared to original signal in database
◦ Closely matched patterns have “small distances” between them
◦ Distances will hardly ever be 0 (perfect match)
4. Decisions
◦ Decide if the match is close enough
◦ Trade-off:
↓ false non-matches leads to ↑false matches
 Something

you have:
(token: key, card)
 Something you know:
(Password, Pin )
 Something you are:
(biometric :physiological, behavioral)
Biometric
representation

Capture &
processing

Feature
extraction

Template
creation

Storage
Or database
Location
 Security
 Task( identification, verification)
 Number of users
 Circumstances(user’s)
 Existing data








Biometrics is a rapidly evolving technology that is being
widely used in forensics, such as criminal identification and
prison security, and that has the potential to be used in a large
range of civilian application areas.
Biometrics can be used to prevent unauthorized access to
ATMs, cellular phones, smart cards, desktop PCs,
workstations, and computer networks.
It can be used during transactions conducted by telephone and
Internet (electronic commerce and electronic banking).
In automobiles, biometrics can replace keys with keyless entry
devices.


Vertical markets that are using biometrics:

Government—Passports, national identification (ID) cards, voter cards,
driver’s licenses, social services, and so on
 ✓ Transportation—Airport security, boarding passes, and commercial
driver’s licenses
 ✓ Healthcare—Medical insurance cards, patient/employee identity cards
 ✓ Financial—Bankcards, ATM cards, credit cards, and debit cards
 ✓ Security—Access control and identity verifications, including time and
attendance
 ✓ Education—Student/teacher identity verification and access control.
Biometrics are now being implemented in large-scale ID systems around
the globe.
Biometrics cannot be lost, stolen or forgotten. Barring
disease or serious physical injury, the biometric is
consistent and permanent.
 It is also secure in that the biometric itself cannot be
socially engineered, shared or used by others.
 There is no requirement to remember passwords, or
PINs, thus eliminating an overhead cost. The biometric
is always available to the individual;

Coupled with a smart card, biometrics provide strong
security for any credentials on the smart card.
 Biometric system provide a high degree of confidence
in user identity.
 Organizations can implement recognition systems to
obviate the need to log onto a system manually.

 Lack

of standardization
 While the reliability and the accuracy of biometric
devices continues to improve.
 Biometric systems must be able to accommodate
changes to the biometric over time which may be
caused by ageing, illness or injury.
 The effectiveness of the sample collection process is
strongly influenced by environmental conditions, user
training and usability. For example, lighting, facial
orientations, expression, image resolution and the
wearing of hats can affect the quality of the sample.
Biometric Security advantages and disadvantages

More Related Content

What's hot

What's hot (20)

Retinal Recognition
Retinal RecognitionRetinal Recognition
Retinal Recognition
 
Biometric
Biometric Biometric
Biometric
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ear recognition system
Ear recognition systemEar recognition system
Ear recognition system
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 

Viewers also liked

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 

Viewers also liked (14)

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Geoforensic
Geoforensic Geoforensic
Geoforensic
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometrics
biometricsbiometrics
biometrics
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 

Similar to Biometric Security advantages and disadvantages

Similar to Biometric Security advantages and disadvantages (20)

Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Biometrics
BiometricsBiometrics
Biometrics
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Biometric Security advantages and disadvantages

  • 1.
  • 2. In the terms of computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified.  A Biometric System is a system for the automated recognition of individuals based on their behavioral and biological characteristics.  Depending on the context, in a biometric system, there are two different ways to resolve a person’s identity  I) verification  Ii) identification 
  • 3.  Verification:- Comparing a sample against a single stored template is called verification ? 1  Input stored Template
  • 4. Identification :- Search a sample against a database of templates. 1 input data database
  • 5. 1) Physical biometrics:         Fingerprint—Analyzing fingertip patterns Facial recognition/face location—Measuring facial characteristics Hand geometry—Measuring the shape of the hand Iris scan—Analyzing features of colored ring of the eye. Retinal scan—Analyzing blood vessels in the eye Vascular patterns—Analyzing vein patterns DNA—Analyzing genetic makeup. Earprint—this method is based on geometric distances, force field transformation
  • 6. It actually have  Crossovers  Core  Islands  Delta  Pore 
  • 7. The distance between eyes  Size of mouth  It is sensitive to environmental variables such as dust and lighting and other factors such as facial expression, facial hair, hats and spectacles.  Templates are typically between 80 and 1,000 bytes in size. 
  • 8. The colored ring surrounding  The pupil of the eye  Iris patterns are formed in the eighth month of age and, remain stable throughout the life of the individual  The iris can have approximately 270 distinct characteristics including meshwork, striations, rings, freckles.  high-quality black and white image of the iris is taken for processing into a template that is typically around 256 bytes in size. 
  • 9. Retinal scans record the pattern of blood vessels at the back of the eyeball  The biometric sensor projects a light into the eye and requires close proximity and a high degree of user cooperation.  Retinal patterns are affected by medical conditions, for example high blood pressure or eye disease  Retinal scan templates are typically 40 to 100 bytes in size. 
  • 10. 2) Behavioral biometrics:  Speaker/voice recognition—Analyzing vocal behavior  Signature/handwriting—Analyzing signature dynamics  Keystroke/patterning—Measuring the time spacing of typed words
  • 11. It’s a habitual speaking recognition.  Voice recognition systems analyze differences such as in pitch, and tone.  This biometric is also sensitive to environmental conditions such as background noise.  Template size can vary significantly according to the length of the pass phrase. 
  • 12. This biometric analyses signature characteristics such as total time, speed, acceleration, character direction, stroke order, stroke count, pressure and contact with the writing surface.  These templates are typically 50 to 300 bytes in size. 
  • 13. Similar to signature verification, this measures the characteristics of an individual’s input of a pass phrase or password. Characteristics may include total time, speed with particular keys and pressure.  Again the template size can vary significantly depending on the length of the password or phrase. 
  • 14. 1. Sensing ◦ User’s characteristic must be presented to a sensor ◦ Output is a function of:  Biometric measure  The way it is presented  Technical characteristics of sensor 2. Signal Processing ◦ Feature extraction ◦ Extract the desired biometric pattern  remove noise and signal losses  discard qualities that are not distinctive/repeatable  Determine if feature is of “good quality”
  • 15. 3. Pattern matching ◦ Sample compared to original signal in database ◦ Closely matched patterns have “small distances” between them ◦ Distances will hardly ever be 0 (perfect match) 4. Decisions ◦ Decide if the match is close enough ◦ Trade-off: ↓ false non-matches leads to ↑false matches
  • 16.
  • 17.  Something you have: (token: key, card)  Something you know: (Password, Pin )  Something you are: (biometric :physiological, behavioral)
  • 19.
  • 20. Location  Security  Task( identification, verification)  Number of users  Circumstances(user’s)  Existing data 
  • 21.     Biometrics is a rapidly evolving technology that is being widely used in forensics, such as criminal identification and prison security, and that has the potential to be used in a large range of civilian application areas. Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks. It can be used during transactions conducted by telephone and Internet (electronic commerce and electronic banking). In automobiles, biometrics can replace keys with keyless entry devices.
  • 22.  Vertical markets that are using biometrics: Government—Passports, national identification (ID) cards, voter cards, driver’s licenses, social services, and so on  ✓ Transportation—Airport security, boarding passes, and commercial driver’s licenses  ✓ Healthcare—Medical insurance cards, patient/employee identity cards  ✓ Financial—Bankcards, ATM cards, credit cards, and debit cards  ✓ Security—Access control and identity verifications, including time and attendance  ✓ Education—Student/teacher identity verification and access control. Biometrics are now being implemented in large-scale ID systems around the globe.
  • 23. Biometrics cannot be lost, stolen or forgotten. Barring disease or serious physical injury, the biometric is consistent and permanent.  It is also secure in that the biometric itself cannot be socially engineered, shared or used by others.  There is no requirement to remember passwords, or PINs, thus eliminating an overhead cost. The biometric is always available to the individual; 
  • 24. Coupled with a smart card, biometrics provide strong security for any credentials on the smart card.  Biometric system provide a high degree of confidence in user identity.  Organizations can implement recognition systems to obviate the need to log onto a system manually. 
  • 25.  Lack of standardization  While the reliability and the accuracy of biometric devices continues to improve.  Biometric systems must be able to accommodate changes to the biometric over time which may be caused by ageing, illness or injury.  The effectiveness of the sample collection process is strongly influenced by environmental conditions, user training and usability. For example, lighting, facial orientations, expression, image resolution and the wearing of hats can affect the quality of the sample.