SlideShare une entreprise Scribd logo
1  sur  20
INTRODUCTION  TO BIOMETRICS Q. THOMAZEAU 30/04/2009 CENTRAL PARK
WEAKNESSES OF ACCESS CONTROL SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT ARE THE MARKET NEEDS? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PHYSICAL ACCESS CONTROL SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BIOMETRICS TECHNOLOGIES ,[object Object],[object Object]
CHOOSING YOUR BIOMETRIC TECHNOLOGIES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],No technology is  100% reliable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TWO COMPLEMENTARY CONCEPTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BIOMETRICS ADDS SECURITY AND COMFORT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Some governmental organizations (CNIL in France) recommends to store biometric data on card for privacy issues
HOW BIOMETRICS WORK ?  Candidate List Acquisition Scanner Store ENROLMENT  VERIFICATION / IDENTIFICATION Store Encoding
ACQUISITION & FEATURE EXTRACTION ,[object Object],[object Object],Biometric Type of feature Representation  Fingerprint Minutiae points Easy to locate by humans (x,y,  ) IRIS Fiber location in the IRIS image Very difficult to locate for a human (phase of the fiber) FACIAL Projections in multi-dimensional space : Purely mathematical Not detectable by human
COMPARISON OF TWO BIOMETRIC TEMPLATES ,[object Object],[object Object],[object Object],[object Object],[object Object],Biometric  template 1 Biometric  template 2 Matcher Matching Score ,[object Object],Probability of Match  Biometric  template
COMPARISON OF TWO BIOMETRIC TEMPLATES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PERFORMANCE OF BIOMETRIC TECHNOLOGIES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TEST METHODOLOGY False Reject False Acceptance
PERFORMANCE: A MATTER OF TRADE OFF Requirements Error  rate % False Acceptance Rate (FAR) False Reject Rate (FRR) Types of authentication errors Comfort Security
TYPICAL ROC CURVE  % % False Reject 0,1 0,01 0,001 False Acceptance 0,0001 1 2 ROC curve: Receiving Operating Curve
PERFORMANCE EXTRAPOLATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TEST METHODOLOGY SAGEM  has collected  large databases ... …  and is able to evaluate accuratly its fingerprint solutions
WHAT DOES BIOMETRICS BRING TO EXISTING TECHNIQUES ?
AND THREE POSSIBLE APPROACHES To have 1 2 3 4 5 6 7 8 9 * 0 # To know To be

Contenu connexe

Tendances

Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 

Tendances (20)

Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognization
Face recognizationFace recognization
Face recognization
 

En vedette

Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 

En vedette (17)

Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Introduction to Analytics
Introduction to AnalyticsIntroduction to Analytics
Introduction to Analytics
 
Introduction To Analytics
Introduction To AnalyticsIntroduction To Analytics
Introduction To Analytics
 
Systematics Lecture: Phenetics
Systematics Lecture: PheneticsSystematics Lecture: Phenetics
Systematics Lecture: Phenetics
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometrics
biometricsbiometrics
biometrics
 
Introduction to Analytics
Introduction to AnalyticsIntroduction to Analytics
Introduction to Analytics
 
Data science and_analytics_for_ordinary_people_ebook
Data science and_analytics_for_ordinary_people_ebookData science and_analytics_for_ordinary_people_ebook
Data science and_analytics_for_ordinary_people_ebook
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 

Similaire à Biometrics

Similaire à Biometrics (20)

MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Security
SecuritySecurity
Security
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Uid security
Uid securityUid security
Uid security
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCAREBIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 

Plus de senejug

Plus de senejug (17)

SeneJug java_8_prez_122015
SeneJug java_8_prez_122015SeneJug java_8_prez_122015
SeneJug java_8_prez_122015
 
BIG DATA - Cloud Computing
BIG DATA - Cloud ComputingBIG DATA - Cloud Computing
BIG DATA - Cloud Computing
 
Demonstration of @mail@
Demonstration of @mail@Demonstration of @mail@
Demonstration of @mail@
 
L'approche par regles metier
L'approche par regles metierL'approche par regles metier
L'approche par regles metier
 
Archivage Electronique: Comment Ca Marche?
Archivage Electronique: Comment Ca Marche?Archivage Electronique: Comment Ca Marche?
Archivage Electronique: Comment Ca Marche?
 
Développement agile de logiciel avec la méthode SCRUM
Développement agile de logiciel avec la méthode SCRUMDéveloppement agile de logiciel avec la méthode SCRUM
Développement agile de logiciel avec la méthode SCRUM
 
West Africa Apple Development
West Africa Apple DevelopmentWest Africa Apple Development
West Africa Apple Development
 
Solution de gestion de paie : PAYOHR
Solution de gestion de paie : PAYOHRSolution de gestion de paie : PAYOHR
Solution de gestion de paie : PAYOHR
 
GMAO
GMAOGMAO
GMAO
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Intégration d\'applications pour call centers
Intégration d\'applications pour call centersIntégration d\'applications pour call centers
Intégration d\'applications pour call centers
 
Capital Risk & IT, The Perfect Connection?
Capital Risk & IT, The Perfect Connection?Capital Risk & IT, The Perfect Connection?
Capital Risk & IT, The Perfect Connection?
 
Telecom in West Africa: Trends and Challenges
Telecom in West Africa: Trends and ChallengesTelecom in West Africa: Trends and Challenges
Telecom in West Africa: Trends and Challenges
 
What is Ajax
What is AjaxWhat is Ajax
What is Ajax
 
Tips on Creating Web Content
Tips on Creating Web ContentTips on Creating Web Content
Tips on Creating Web Content
 
Using CMS Tool Drupal
Using CMS Tool DrupalUsing CMS Tool Drupal
Using CMS Tool Drupal
 
Web2 And Java
Web2 And JavaWeb2 And Java
Web2 And Java
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Biometrics

  • 1. INTRODUCTION TO BIOMETRICS Q. THOMAZEAU 30/04/2009 CENTRAL PARK
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. HOW BIOMETRICS WORK ? Candidate List Acquisition Scanner Store ENROLMENT VERIFICATION / IDENTIFICATION Store Encoding
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. TEST METHODOLOGY False Reject False Acceptance
  • 15. PERFORMANCE: A MATTER OF TRADE OFF Requirements Error rate % False Acceptance Rate (FAR) False Reject Rate (FRR) Types of authentication errors Comfort Security
  • 16. TYPICAL ROC CURVE % % False Reject 0,1 0,01 0,001 False Acceptance 0,0001 1 2 ROC curve: Receiving Operating Curve
  • 17.
  • 18. TEST METHODOLOGY SAGEM has collected large databases ... … and is able to evaluate accuratly its fingerprint solutions
  • 19. WHAT DOES BIOMETRICS BRING TO EXISTING TECHNIQUES ?
  • 20. AND THREE POSSIBLE APPROACHES To have 1 2 3 4 5 6 7 8 9 * 0 # To know To be