SlideShare a Scribd company logo
1 of 25
Biometrics
Overview
• What is biometrics ?
• How biometrics system works ?
• Type of biometrics
• Identification & Verification
• Advantages & Disadvantages
• Comparison
• Face Recognization
• Retina Scan
• Fingerprint Recognization
• Iris Recognization
• Signature Recognization
• Application of biometrics
• Some Biometrics Still In Development
• Conclusion
• References
Biometrics
What is Biometrics ?
• The meaning of Biometrics comes from the Greeks.
Biometry = bio(life) + metry(to measure).
• Biometrics is the science and technology of measuring and analyzing
biological data.
• Biometrics refers to technologies that measure and analyze human body
characteristics such as DNA, fingerprints, eye retinas and irises, voice
patterns,facial patterns and hand measurments for authentication purposes.
• Biometrics are automated methods of recognizing a person based on a
physiological or behavioral characteristic.
Biometrics
How Biometrics Works ?
Biometrics
Types of Biometrics
 Physiological
 Face
 Fingerprint
 Hand geometry
 Retina
 Iris recognition
 Behavioral
 Signature
 Voice
Biometrics
A biometric system can operate in two modes
Identification:
• A one to many comparison of the captured biometric against a
biometric database in attempt to identify an unknown individual.
Verification:
• A one to one comparison of a captured biometric with a stored template
to verify that the individual is who he claims to be.
• Verification is faster and performs better.
• In a verification, the user must first enter his or her identity to the
biometric system. User ID's can be forgotten and cards can be lost,
making access impossible.
Biometrics
Advantages of Biometrics
• Biometrics are generally used for authentication.
• It provides higher security .e.g. Iris recognition .
• Voice Recognition works well over the telephone
• User friendly
e.g. Hand geometry recognization,
finger print recognition.
Biometrics
Disadvantages of Biometrics
• Retina recognization requires close physical contact of the
scanning device, may not be generally accepted by public
• Costly
• Voice recognization requires large amount of computer
storage, people's voices can change, background noises can
interfere.
• Biometrics features may change over time.
• Signature recognization has poor long-term reliability,
accuracy difficult to ensure.
Biometrics
Comparision of Biometrics Type
Biometric Type Accuracy Easy to use User Acceptance
Fingerprint High Medium Low
Hand Geometry Medium High Medium
Voice Medium High High
Retina High Low Low
Iris Medium Medium Medium
Signature Medium Medium High
Face Low High High
Biometrics
Face Recognization
• A facial recognization system is a computer application for automatically
identifying or verifying a person from a digital image or a video frame from a video
source. One of the ways to do this is by comparing selected facial features from the
image and a facial database.
• It is typically used in security systems and can be compared to other biometrics
such as fingerprint or eye iris recognition systems.
• Uses an image or series of images either from a camera or photograph to recognize
a person.
• Principle: analysis of the unique shape, pattern and positioning of facial features.
• Passive biometrics and does not require a persons cooperation.
• Highly complex technology and largely software based.
Face Recognization (cont…)
Biometrics
Retina scan
• It analyzing the layer of blood vessels situated at the back of the eye.
• The machine takes around ten seconds to shine a “low intensity coherent
light source” onto the retina to illuminate the blood vessels.
• Once the machine has a copy of the scan, it compares the picture to all the
different scans on file, looks for a match, and identifies the individual.
• retina scan machines are fairly expensive.
Biometrics
Fingerprint Recognization
Biometrics
Fingerprint Recognization (cont…)
• A fingerprint in its narrow sense is an impression left by the friction ridges of a
human finger.
• Biometrics reffers to that measure and analyze human body characteristics such as
fingerprints recognization.
• Fingerprint recognization is possible using the fingerprint scanner.
• A fingerprint scanner has two basic jobs.
• It needs to get an image of your finger.
• It needs to determine whether the pattern of ridges and vellys in this image matches
pattern of ridges and valleys in pre-scanned images.
Biometrics
Fingerprint Recognization (cont…)
Image
Acquistition
Template(s)
MatchingFeature
Extraction
Image
Acquistition
Template(s)
Feature
Extraction
A. Enrollment
B. Authentication
Biometrics
Fingerprint Recognization (cont…)
• There are a number of different ways to get an image of somebody’s finger.
• The most common method todays are optical scanning and capacitance
scanning.
• The heart of an optical scanner is a charge coupled device (CCD).
• The CCD scanning process strats when you place your finger on a glass
plate and a CCD camera takes a picture.
• one of the largest fingerprint recognization system is integrated automated
fingerprint identification system, maintained by FBI in the US since 1999.
Biometrics
Advatages of fingerprint Recognization
• Oldest form of Biometrics
• Highly Reliable
• Uses distinctive features of fingers
• High Security access
• Reduce cost
• Instance Report
Biometrics
Disadvatages of fingerprint Recognization
• It is not a right tool for the ones who is work in the Chemical
Industries.
• If a person loses his/her fingerprint identity then that person
will never be able to use or replace their fingerprint as their
identity.
Biometrics
Iris Recognization
• Iris recognition is an automated method of biometric identification that
uses mathematical pattern-recognition techniques on video images of the
irises of an individual's eyes, whose complex random patterns are unique
and can be seen from some distance.
• retina scanning, iris recognition uses camera technology with subtle
infrared illumination to acquire images of the detail-rich, intricate
structures of the iris.
Biometrics
Signature Recognization
• Signature recognition is a behavioural biometric.
• It can be operated in two different ways:
• Static: In this mode, users write their signature on paper, digitize it through
an optical scanner or a camera, and the biometric system recognizes the
signature analyzing its shape. This group is also known as “off-line”.
• Dynamic: In this mode, users write their signature in a digitizing tablet,
which acquires the signature in real time. Another possibility is the
acquisition by means of stylus-operated PDAs. Dynamic recognition is
also known as “on-line”.
Application
• Criminal identification
• Prison security
• ATM and other Financial Transactions
• PC/LAN Login
• Database access
• Border crossing controls
Biometrics
Some Biometrics Still In Development
• Scent
• Ear Shape
• Finger nail bed
• Facial 3D
Biometrics
Conclusion
• Technology is growing rapidly, but at the same time security
breaches and transactions frauds are also in the increase world
over.
• All agencies including libraries who are in need of security
and safety have to adopt biometrics
• Let us hope for safe and secure future.
Biometrics
References
• www.biometrics.com
• www.google.com
• www.facerecognization.com
• www.fingerprintscanner.com
• www.irisrecognization.com
Biometrics
Avani & Dharmishtha
That’s all for biometrics…..

More Related Content

What's hot

Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 

What's hot (20)

Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 

Similar to Bio-metrics Technology

Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
BirkumarJana
 

Similar to Bio-metrics Technology (20)

Biomatric
BiomatricBiomatric
Biomatric
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptxBiometrics new by rahul mondal made .pptx
Biometrics new by rahul mondal made .pptx
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
biomatric system
biomatric systembiomatric system
biomatric system
 
Biometric
Biometric Biometric
Biometric
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Bio-metrics Technology

  • 2. Overview • What is biometrics ? • How biometrics system works ? • Type of biometrics • Identification & Verification • Advantages & Disadvantages • Comparison • Face Recognization • Retina Scan • Fingerprint Recognization • Iris Recognization • Signature Recognization • Application of biometrics • Some Biometrics Still In Development • Conclusion • References Biometrics
  • 3. What is Biometrics ? • The meaning of Biometrics comes from the Greeks. Biometry = bio(life) + metry(to measure). • Biometrics is the science and technology of measuring and analyzing biological data. • Biometrics refers to technologies that measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, voice patterns,facial patterns and hand measurments for authentication purposes. • Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometrics
  • 4. How Biometrics Works ? Biometrics
  • 5. Types of Biometrics  Physiological  Face  Fingerprint  Hand geometry  Retina  Iris recognition  Behavioral  Signature  Voice Biometrics
  • 6. A biometric system can operate in two modes Identification: • A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. Verification: • A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. • Verification is faster and performs better. • In a verification, the user must first enter his or her identity to the biometric system. User ID's can be forgotten and cards can be lost, making access impossible. Biometrics
  • 7. Advantages of Biometrics • Biometrics are generally used for authentication. • It provides higher security .e.g. Iris recognition . • Voice Recognition works well over the telephone • User friendly e.g. Hand geometry recognization, finger print recognition. Biometrics
  • 8. Disadvantages of Biometrics • Retina recognization requires close physical contact of the scanning device, may not be generally accepted by public • Costly • Voice recognization requires large amount of computer storage, people's voices can change, background noises can interfere. • Biometrics features may change over time. • Signature recognization has poor long-term reliability, accuracy difficult to ensure. Biometrics
  • 9. Comparision of Biometrics Type Biometric Type Accuracy Easy to use User Acceptance Fingerprint High Medium Low Hand Geometry Medium High Medium Voice Medium High High Retina High Low Low Iris Medium Medium Medium Signature Medium Medium High Face Low High High Biometrics
  • 10. Face Recognization • A facial recognization system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. • It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems. • Uses an image or series of images either from a camera or photograph to recognize a person. • Principle: analysis of the unique shape, pattern and positioning of facial features. • Passive biometrics and does not require a persons cooperation. • Highly complex technology and largely software based.
  • 12. Retina scan • It analyzing the layer of blood vessels situated at the back of the eye. • The machine takes around ten seconds to shine a “low intensity coherent light source” onto the retina to illuminate the blood vessels. • Once the machine has a copy of the scan, it compares the picture to all the different scans on file, looks for a match, and identifies the individual. • retina scan machines are fairly expensive. Biometrics
  • 14. Fingerprint Recognization (cont…) • A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. • Biometrics reffers to that measure and analyze human body characteristics such as fingerprints recognization. • Fingerprint recognization is possible using the fingerprint scanner. • A fingerprint scanner has two basic jobs. • It needs to get an image of your finger. • It needs to determine whether the pattern of ridges and vellys in this image matches pattern of ridges and valleys in pre-scanned images. Biometrics
  • 16. Fingerprint Recognization (cont…) • There are a number of different ways to get an image of somebody’s finger. • The most common method todays are optical scanning and capacitance scanning. • The heart of an optical scanner is a charge coupled device (CCD). • The CCD scanning process strats when you place your finger on a glass plate and a CCD camera takes a picture. • one of the largest fingerprint recognization system is integrated automated fingerprint identification system, maintained by FBI in the US since 1999. Biometrics
  • 17. Advatages of fingerprint Recognization • Oldest form of Biometrics • Highly Reliable • Uses distinctive features of fingers • High Security access • Reduce cost • Instance Report Biometrics
  • 18. Disadvatages of fingerprint Recognization • It is not a right tool for the ones who is work in the Chemical Industries. • If a person loses his/her fingerprint identity then that person will never be able to use or replace their fingerprint as their identity. Biometrics
  • 19. Iris Recognization • Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of the irises of an individual's eyes, whose complex random patterns are unique and can be seen from some distance. • retina scanning, iris recognition uses camera technology with subtle infrared illumination to acquire images of the detail-rich, intricate structures of the iris. Biometrics
  • 20. Signature Recognization • Signature recognition is a behavioural biometric. • It can be operated in two different ways: • Static: In this mode, users write their signature on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the signature analyzing its shape. This group is also known as “off-line”. • Dynamic: In this mode, users write their signature in a digitizing tablet, which acquires the signature in real time. Another possibility is the acquisition by means of stylus-operated PDAs. Dynamic recognition is also known as “on-line”.
  • 21. Application • Criminal identification • Prison security • ATM and other Financial Transactions • PC/LAN Login • Database access • Border crossing controls Biometrics
  • 22. Some Biometrics Still In Development • Scent • Ear Shape • Finger nail bed • Facial 3D Biometrics
  • 23. Conclusion • Technology is growing rapidly, but at the same time security breaches and transactions frauds are also in the increase world over. • All agencies including libraries who are in need of security and safety have to adopt biometrics • Let us hope for safe and secure future. Biometrics
  • 24. References • www.biometrics.com • www.google.com • www.facerecognization.com • www.fingerprintscanner.com • www.irisrecognization.com Biometrics Avani & Dharmishtha
  • 25. That’s all for biometrics…..