SlideShare a Scribd company logo
1 of 19
Welcome To Our presentation
Prepared by
Group Of MIRRORS
“Biometric
Systems”
Presentation Topic
•Biometric Systems are automated methods
of verifying or recognizing the identity of a
living person on the basis of some
physiological characteristics, like a fingerprint
or face pattern, or some aspects of behavior,
like handwriting or keystroke patterns. Some
of the most used biometric characteristics are
shown in the picture below. A biometric
system based on physiological characteristics
is more reliable than one which
adopts behavioral features, even if the latter
may be easier to integrate within certain
specific applications.
Introduction
1.2.1.1 Broad Objective
• The broad objective of this report is to exploring the Biometric
application in management.
1.2.1.2 Specific Objectives
• To find out the internal and external Biometric systems application
management
• To identify the Biometric systems.
• To identify the depth of knowledge of the employee who serve.
• How Biometric systems deals with future course of action of pre-
determined goals.
• How Biometric systems helps to achievement of organizational
• To know Biometric systems facilities for various management.
Objectives:
2.2.1 Population: The population of this research project is defined as fallow:
A. Element: Existing some clients of Biometric systems.
B. Unit: Individual clients of Biometric systems.
C. Extent: Al over the world.
D. Time: 28 Nov 2014 to 06 Feb 2015.
2.2.2 Data sources
The information and data for this report have been collected from both the primary and
sources.
a. Primary Data Sources
b. Secondary Data Sources
2.2.3 Data collection Method
Relevant data for this report will be collected primarily by direct investigations of
papers, documents, operational process and different personnel.
Methodology of the Study:
Biometrics is an authentication method that uses fingerprint or facial scans
and iris or voice recognition to identify users. A biometric scanning device
takes a user's biometric data, such as an iris pattern or fingerprint scan,
and converts it into digital information a computer can interpret and verify.
Since it is more difficult for a malicious hacker to gain access to a person's
biometric data, and it is unlikely that a user will.
A biometric system is a technological system that uses information about a
person (or other biological organism) to identify that person. Biometric
systems rely on specific data about unique biological traits in order to work
effectively. A biometric system will involve running data through
algorithms for a particular result, usually related to a positive identification
of a user or other individual.
BIOMETRIC SYSTEMS
Biometrics systems work by recording and comparing biometric characteristics. In many cases,
characteristics are recorded as images, but for speaker recognition a waveform is recorded, and
for signature recognition, time series data. For efficiency reasons, rather than using recorded
characteristics directly, it is usual to extract identifying features from the samples and encode
these features in a form that facilitates storage and comparison.
When an individual first uses a biometric system, their identifying features are enrolled as a
reference for future comparison.This reference may be stored in a central database or on a card
(or both) depending on the needs of the application.
When biometric recognition is required, the individual's biometric characteristics are recorded
again.This time however, the identifying features are compared by the system with the stored
reference to determine if there is a close match.
Work of biometric systems:
Types of Biometrics:
 Accurate
Identification
 Accountability
 Easy and Safe for Use
 Time Saving
 User Friendly Systems
 Security
 Convenience
 Versatility
 Scalability
Biometric System in Management
1 Unique: The various biometrics systems have been developed
around unique characteristics of individuals. The probability of 2
sharing the same biometric data is virtually nil.
2 Cannot be shared: Because a biometric property is an intrinsic
property of an individual, it is extremely difficult to duplicate or
cannot give a copy of your face or your hand to someone!).
3 Cannot be copied: Biometric characteristics are nearly
impossible to forge or spoof, especially with new technologies
that the biometric being identified is from a live person.
4 Cannot be lost: A biometric property of an individual can be lost
only in case of serious accident.
Biometrics secure for Management
The Biometric System may easily be
applicable to Library System
Management in three ways:
It maintains library patron records
very quickly, accurately, orderly.
It acts as a helpful management
tool for the librarian and other
managerial staff of the library.
It may continue for years together
without any further adding cost
after its installation.
Biometric System in Library
The major library areas where the biometric system can be used
successfully:
• Gate Checking
• Circulation Section
• Stack Entry Record
• Internet Searching
The day-to-day library operation and managements may easily be
covered with the application and use of biometric system. Some of
the major areas are:
 Surveillance
 Staff Attendance
 Staff movement record
Biometric System in Library
Evidence Planting
Copying
Technical Vulnerability--
Unauthorized Use
Locks are More Economical
A Subtle Presumption
Undermined
Notoriously Expensive
Major Finding
SWOT Analysis of Biometric systems
RECOMMENDATION
 Information types :biometric systems convert analog information into digital information
that computers can read. Though difficult to do, just like any other authentication
data captured from biometrics systems can be sniffed along the wire of insecure networks
replayed for malicious access.
 Very difficult: Biometric imprints that are more esoteric and harder to duplicate present the
least risk of compromise. Iris patterns or electrophysiological signals are very difficult to
making devices using this type of biometrics harder to crack.
 Can duplicates: Fingerprints, on the other hand, can be lifted from an everyday object and
used to gain access to a fingerprint reader. Fingerprints can also be copied and molded into
material, like chewing gum or putty. The same goes for voice and facial recognition, which
recorded or photographed to create duplicates for fooling biometric systems.
 Typing speed: Other biometrics devices, such as the Bio-Password, measures a user's typing
speed and style to create a unique profile.
 Secure servers: Despite the different levels of risk for different biometrics systems, the best
recommendation is to remain device agnostic. Also make sure all biometric data is stored on
Concluding Remarks
Biometrics is not a panacea. Implementation should be the result of
cost/benefit analysis stemming from a risk assessment. However, regulatory
constraints sometimes make our decision easy.The only thing possible at that
point is to select the solution that makes sense.
Making sense, or the reasonable and appropriate implementation of
biometrics, includes consideration of several factors.
 Understand the limitations of the target operating environments.
 Ensure the overall security context supports reference template safety.
 Understand the probability of forgery and match it to the importance of that
which you are trying to protect.
 Do not implement a biometrics solution that exposes business processes to a
potential business continuity event in the form of sensor or backend
authentication server loss.
 Ask each vendor to provide reasonable proof of error rates for the products
Biometric Systems
Biometric Systems

More Related Content

What's hot

What's hot (20)

biometrics
biometricsbiometrics
biometrics
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 

Viewers also liked

Fingerprint EVM
Fingerprint EVMFingerprint EVM
Fingerprint EVMPranay Raj
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
DIDÁCTICA Y MAPA CONCEPTUAL
DIDÁCTICA Y MAPA CONCEPTUALDIDÁCTICA Y MAPA CONCEPTUAL
DIDÁCTICA Y MAPA CONCEPTUALMagdalena Guirau
 
Overview of Virgin Islands Energy Issues
Overview of Virgin Islands Energy IssuesOverview of Virgin Islands Energy Issues
Overview of Virgin Islands Energy IssuesDon Buchanan
 
Zuzulich, de la Maza. Desafío de enseñar a jóvenes universitarios hoy.
Zuzulich, de la Maza. Desafío de enseñar a jóvenes universitarios hoy.Zuzulich, de la Maza. Desafío de enseñar a jóvenes universitarios hoy.
Zuzulich, de la Maza. Desafío de enseñar a jóvenes universitarios hoy.Cristian Arce
 
Scotland the global home of oil and gas
Scotland the global home of oil and gasScotland the global home of oil and gas
Scotland the global home of oil and gasscottishenterprise
 
การสังเกตในการจัดทัศนสังคมศึกษา
การสังเกตในการจัดทัศนสังคมศึกษาการสังเกตในการจัดทัศนสังคมศึกษา
การสังเกตในการจัดทัศนสังคมศึกษาSomprasong friend Ka Nuamboonlue
 
About digital storytelling
About digital storytellingAbout digital storytelling
About digital storytellingLoukia Orfanou
 
Guurrbi's 10th Birthday Album
Guurrbi's 10th Birthday AlbumGuurrbi's 10th Birthday Album
Guurrbi's 10th Birthday AlbumGuurrbi Cooktown
 
Газовый напольный котел Protherm Гризли 65 KLO
Газовый напольный котел Protherm Гризли 65 KLOГазовый напольный котел Protherm Гризли 65 KLO
Газовый напольный котел Protherm Гризли 65 KLOAl Maks
 
Dispositivos de entrada y salida presentación
Dispositivos de entrada y salida presentaciónDispositivos de entrada y salida presentación
Dispositivos de entrada y salida presentaciónKattia Rodriguez
 

Viewers also liked (20)

MATRIX Biometrics Technology New
MATRIX Biometrics Technology NewMATRIX Biometrics Technology New
MATRIX Biometrics Technology New
 
Fingerprint EVM
Fingerprint EVMFingerprint EVM
Fingerprint EVM
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Apple supply chain analysis
Apple supply chain analysisApple supply chain analysis
Apple supply chain analysis
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
алескерова
алескероваалескерова
алескерова
 
DIDÁCTICA Y MAPA CONCEPTUAL
DIDÁCTICA Y MAPA CONCEPTUALDIDÁCTICA Y MAPA CONCEPTUAL
DIDÁCTICA Y MAPA CONCEPTUAL
 
Overview of Virgin Islands Energy Issues
Overview of Virgin Islands Energy IssuesOverview of Virgin Islands Energy Issues
Overview of Virgin Islands Energy Issues
 
Zuzulich, de la Maza. Desafío de enseñar a jóvenes universitarios hoy.
Zuzulich, de la Maza. Desafío de enseñar a jóvenes universitarios hoy.Zuzulich, de la Maza. Desafío de enseñar a jóvenes universitarios hoy.
Zuzulich, de la Maza. Desafío de enseñar a jóvenes universitarios hoy.
 
Scotland the global home of oil and gas
Scotland the global home of oil and gasScotland the global home of oil and gas
Scotland the global home of oil and gas
 
Blixtjobb
BlixtjobbBlixtjobb
Blixtjobb
 
Stepway
StepwayStepway
Stepway
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
การสังเกตในการจัดทัศนสังคมศึกษา
การสังเกตในการจัดทัศนสังคมศึกษาการสังเกตในการจัดทัศนสังคมศึกษา
การสังเกตในการจัดทัศนสังคมศึกษา
 
About digital storytelling
About digital storytellingAbout digital storytelling
About digital storytelling
 
Daftarhadir&nilai statistik1112
Daftarhadir&nilai statistik1112Daftarhadir&nilai statistik1112
Daftarhadir&nilai statistik1112
 
Guurrbi's 10th Birthday Album
Guurrbi's 10th Birthday AlbumGuurrbi's 10th Birthday Album
Guurrbi's 10th Birthday Album
 
Газовый напольный котел Protherm Гризли 65 KLO
Газовый напольный котел Protherm Гризли 65 KLOГазовый напольный котел Protherm Гризли 65 KLO
Газовый напольный котел Protherm Гризли 65 KLO
 
Dispositivos de entrada y salida presentación
Dispositivos de entrada y salida presentaciónDispositivos de entrada y salida presentación
Dispositivos de entrada y salida presentación
 
What Is Design Thinking
What Is Design ThinkingWhat Is Design Thinking
What Is Design Thinking
 

Similar to Biometric Systems

Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detectionMudit Mishra
 
Importance of Biometrics data security.pdf
Importance of Biometrics data security.pdfImportance of Biometrics data security.pdf
Importance of Biometrics data security.pdfSarahLee434084
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionIOSR Journals
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxLol36
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfshivagreenevv
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access controlArsalan Mohammad
 

Similar to Biometric Systems (20)

Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Importance of Biometrics data security.pdf
Importance of Biometrics data security.pdfImportance of Biometrics data security.pdf
Importance of Biometrics data security.pdf
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
74560 computer controlled biometric based access control
74560 computer controlled biometric based access control74560 computer controlled biometric based access control
74560 computer controlled biometric based access control
 

Recently uploaded

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 

Recently uploaded (20)

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 

Biometric Systems

  • 1. Welcome To Our presentation
  • 4. •Biometric Systems are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristics, like a fingerprint or face pattern, or some aspects of behavior, like handwriting or keystroke patterns. Some of the most used biometric characteristics are shown in the picture below. A biometric system based on physiological characteristics is more reliable than one which adopts behavioral features, even if the latter may be easier to integrate within certain specific applications. Introduction
  • 5. 1.2.1.1 Broad Objective • The broad objective of this report is to exploring the Biometric application in management. 1.2.1.2 Specific Objectives • To find out the internal and external Biometric systems application management • To identify the Biometric systems. • To identify the depth of knowledge of the employee who serve. • How Biometric systems deals with future course of action of pre- determined goals. • How Biometric systems helps to achievement of organizational • To know Biometric systems facilities for various management. Objectives:
  • 6. 2.2.1 Population: The population of this research project is defined as fallow: A. Element: Existing some clients of Biometric systems. B. Unit: Individual clients of Biometric systems. C. Extent: Al over the world. D. Time: 28 Nov 2014 to 06 Feb 2015. 2.2.2 Data sources The information and data for this report have been collected from both the primary and sources. a. Primary Data Sources b. Secondary Data Sources 2.2.3 Data collection Method Relevant data for this report will be collected primarily by direct investigations of papers, documents, operational process and different personnel. Methodology of the Study:
  • 7. Biometrics is an authentication method that uses fingerprint or facial scans and iris or voice recognition to identify users. A biometric scanning device takes a user's biometric data, such as an iris pattern or fingerprint scan, and converts it into digital information a computer can interpret and verify. Since it is more difficult for a malicious hacker to gain access to a person's biometric data, and it is unlikely that a user will. A biometric system is a technological system that uses information about a person (or other biological organism) to identify that person. Biometric systems rely on specific data about unique biological traits in order to work effectively. A biometric system will involve running data through algorithms for a particular result, usually related to a positive identification of a user or other individual. BIOMETRIC SYSTEMS
  • 8. Biometrics systems work by recording and comparing biometric characteristics. In many cases, characteristics are recorded as images, but for speaker recognition a waveform is recorded, and for signature recognition, time series data. For efficiency reasons, rather than using recorded characteristics directly, it is usual to extract identifying features from the samples and encode these features in a form that facilitates storage and comparison. When an individual first uses a biometric system, their identifying features are enrolled as a reference for future comparison.This reference may be stored in a central database or on a card (or both) depending on the needs of the application. When biometric recognition is required, the individual's biometric characteristics are recorded again.This time however, the identifying features are compared by the system with the stored reference to determine if there is a close match. Work of biometric systems:
  • 10.  Accurate Identification  Accountability  Easy and Safe for Use  Time Saving  User Friendly Systems  Security  Convenience  Versatility  Scalability Biometric System in Management
  • 11. 1 Unique: The various biometrics systems have been developed around unique characteristics of individuals. The probability of 2 sharing the same biometric data is virtually nil. 2 Cannot be shared: Because a biometric property is an intrinsic property of an individual, it is extremely difficult to duplicate or cannot give a copy of your face or your hand to someone!). 3 Cannot be copied: Biometric characteristics are nearly impossible to forge or spoof, especially with new technologies that the biometric being identified is from a live person. 4 Cannot be lost: A biometric property of an individual can be lost only in case of serious accident. Biometrics secure for Management
  • 12. The Biometric System may easily be applicable to Library System Management in three ways: It maintains library patron records very quickly, accurately, orderly. It acts as a helpful management tool for the librarian and other managerial staff of the library. It may continue for years together without any further adding cost after its installation. Biometric System in Library
  • 13. The major library areas where the biometric system can be used successfully: • Gate Checking • Circulation Section • Stack Entry Record • Internet Searching The day-to-day library operation and managements may easily be covered with the application and use of biometric system. Some of the major areas are:  Surveillance  Staff Attendance  Staff movement record Biometric System in Library
  • 14. Evidence Planting Copying Technical Vulnerability-- Unauthorized Use Locks are More Economical A Subtle Presumption Undermined Notoriously Expensive Major Finding
  • 15. SWOT Analysis of Biometric systems
  • 16. RECOMMENDATION  Information types :biometric systems convert analog information into digital information that computers can read. Though difficult to do, just like any other authentication data captured from biometrics systems can be sniffed along the wire of insecure networks replayed for malicious access.  Very difficult: Biometric imprints that are more esoteric and harder to duplicate present the least risk of compromise. Iris patterns or electrophysiological signals are very difficult to making devices using this type of biometrics harder to crack.  Can duplicates: Fingerprints, on the other hand, can be lifted from an everyday object and used to gain access to a fingerprint reader. Fingerprints can also be copied and molded into material, like chewing gum or putty. The same goes for voice and facial recognition, which recorded or photographed to create duplicates for fooling biometric systems.  Typing speed: Other biometrics devices, such as the Bio-Password, measures a user's typing speed and style to create a unique profile.  Secure servers: Despite the different levels of risk for different biometrics systems, the best recommendation is to remain device agnostic. Also make sure all biometric data is stored on
  • 17. Concluding Remarks Biometrics is not a panacea. Implementation should be the result of cost/benefit analysis stemming from a risk assessment. However, regulatory constraints sometimes make our decision easy.The only thing possible at that point is to select the solution that makes sense. Making sense, or the reasonable and appropriate implementation of biometrics, includes consideration of several factors.  Understand the limitations of the target operating environments.  Ensure the overall security context supports reference template safety.  Understand the probability of forgery and match it to the importance of that which you are trying to protect.  Do not implement a biometrics solution that exposes business processes to a potential business continuity event in the form of sensor or backend authentication server loss.  Ask each vendor to provide reasonable proof of error rates for the products