SlideShare une entreprise Scribd logo
1  sur  13
BIOMETRICS




                   BY:
             C.Rajeev Reddy
              08Q61A0516
MY PRESENTATION
•   INTRODUCTION
•   HISTORY
•   WORKING PROCESS
•   TECHNOLOGIES
•   ADVANTAGES & DIS-ADVANTAGES
•   CONCLUSION
•   BIBLIOGRAPHY
INTRODUCTION
• Biometrics are automated methods of
  recognizing a person based on a physiological or
  behavioral characteristic.
• As the level of security decreases and transaction
  fraud increases, the need for highly secure
  identification and personal verification
  technologies is more.
• Biometric-based solutions are able to provide for
  confidential financial transactions and personal
  data privacy.
HISTORY
• The term "biometrics" is derived from the Greek
  words bio (life) and metric (to measure).
• The first known example of biometrics in
  practice was a form of finger printing being used
  in China in the 14th century by “Joao de Barros.”
• “Bertillonage” a method of bodily measurement
  was used by police authorities.
• The police then used finger printing, which was
  developed by Richard Edward Henry of Scotland
  Yard.
WHY BIOMETRICS…?
•   Convenient
•   Passwords are not user-friendly
•   Perceived as more secured
•   Passive identification
WORKING
All biometric systems works in a four-stage process that consists of the
   following steps:

    • Capture: A biometric system collects the sample of biometric features
  like fingerprint, voice etc of the person who “LOGGS” in.

    • Extraction: The data extraction is done uniquely from the sample and a
  template is created for unique features. Templates stores in digital
  biometric code format.

   • Comparison: The template is then compared with a new sample.

  • Match/non-match: The system then decides whether the features
  extracted from the new sample are a match or a non-match with the
  template. When identity needs checking, the person interacts with the
  biometric system, a new biometric sample is taken and compared with the
  template.
TECHNOLOGIES
• Identification And Verification Systems
  Identification:Search a sample against a database
  of templates.
        Typical application: identifying fingerprints
  Verification:Compare a sample against a single
  stored template
       Typical application: voice lock
METHODS
BIOMETRIC METHODS:
1)Behavioral Biometrics
   a)Keystroke or Typing Recognition
   b)Speaker Identification or Recognition



2)Physical Biometrics
  a)Fingerprint Identification or Recognition
  b)Speaker or Voice Authentication
  c)Hand or Finger Geometry Recognition
  d) Facial Recognition
BEHAVIORAL BIOMETRICS

• Used for verification purpose
• Keystroke or Typing Recognition:Keystroke recognition
  measures the characteristics of an individual’s typing patterns,
  including the time spacing of words. It can be used for
  identifying people who may create inappropriate email or
  conduct.
• Speaker Identification or Recognition: Speaker
  identification and recognition is used to discover an
  unknown speaker’s identity based on patterns of voice
  pitch and speech style. Behavioral patterns of a voice
  differ with every individual.
PHYSICAL BIOMETRICS
• Used for Identification purpose
• Fingerprint Identification or Recognition: This type of
  biometrics compares two fingerprints to determine identification.
• Speaker or Voice Authentication: Speaker or voice
  authentication is the analysis of vocal behavior by matching it to a
  voice model template
• Hand or Finger Geometry Recognition:The method uses 3D
  analysis of the finger for tracking and identification purposes.
• Facial Recognition: Facial recognition uses algorithms to
  analyze features. These include the position/size/shape of the
  eyes, nose, cheekbones and jaw line.
ADVANTAGES
• Increase security
• Eliminate problems caused by lost IDs or
  forgotten passwords
• Reduce password administration costs.
• Make it possible, automatically, to know WHO
  did WHAT, WHERE and WHEN?
• Replace hard-to-remember passwords which
  may be shared or observed.
DISADVANTAGES
• The finger print of those people working in
  Chemical industries are often affected.
• It is found that with age, the voice of a person
  differs.
• For people affected with diabetes, the eyes
  get affected resulting in differences.
• Biometrics is an expensive security solution.
CONCLUSION
• Biometrics is a very interesting and exciting
  field that has be growing exponentially in
  recent years (especially 2001).
• The wide variety of physically unique traits
  our bodies give us will soon allow us to live in
  a very secure password-less world

Contenu connexe

Tendances

Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
VisualBee.com
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 

Tendances (20)

biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 

Similaire à biometrics

BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
SundusKhan42
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 

Similaire à biometrics (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
 
Biometric
Biometric Biometric
Biometric
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 

Plus de Akhil Kumar

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solids
Akhil Kumar
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solids
Akhil Kumar
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planes
Akhil Kumar
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of lines
Akhil Kumar
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projection
Akhil Kumar
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersection
Akhil Kumar
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen method
Akhil Kumar
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solids
Akhil Kumar
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problem
Akhil Kumar
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)
Akhil Kumar
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
Akhil Kumar
 

Plus de Akhil Kumar (20)

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solids
 
Edp scales
Edp  scalesEdp  scales
Edp scales
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solids
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planes
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of lines
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projection
 
Edp isometric
Edp  isometricEdp  isometric
Edp isometric
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersection
 
Edp excerciseeg
Edp  excerciseegEdp  excerciseeg
Edp excerciseeg
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen method
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solids
 
Edp curves2
Edp  curves2Edp  curves2
Edp curves2
 
Edp curve1
Edp  curve1Edp  curve1
Edp curve1
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problem
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
yii framework
yii frameworkyii framework
yii framework
 
cloud computing
cloud computingcloud computing
cloud computing
 
WORDPRESS
WORDPRESSWORDPRESS
WORDPRESS
 
AJAX
AJAXAJAX
AJAX
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

biometrics

  • 1. BIOMETRICS BY: C.Rajeev Reddy 08Q61A0516
  • 2. MY PRESENTATION • INTRODUCTION • HISTORY • WORKING PROCESS • TECHNOLOGIES • ADVANTAGES & DIS-ADVANTAGES • CONCLUSION • BIBLIOGRAPHY
  • 3. INTRODUCTION • Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. • As the level of security decreases and transaction fraud increases, the need for highly secure identification and personal verification technologies is more. • Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy.
  • 4. HISTORY • The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). • The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century by “Joao de Barros.” • “Bertillonage” a method of bodily measurement was used by police authorities. • The police then used finger printing, which was developed by Richard Edward Henry of Scotland Yard.
  • 5. WHY BIOMETRICS…? • Convenient • Passwords are not user-friendly • Perceived as more secured • Passive identification
  • 6. WORKING All biometric systems works in a four-stage process that consists of the following steps: • Capture: A biometric system collects the sample of biometric features like fingerprint, voice etc of the person who “LOGGS” in. • Extraction: The data extraction is done uniquely from the sample and a template is created for unique features. Templates stores in digital biometric code format. • Comparison: The template is then compared with a new sample. • Match/non-match: The system then decides whether the features extracted from the new sample are a match or a non-match with the template. When identity needs checking, the person interacts with the biometric system, a new biometric sample is taken and compared with the template.
  • 7. TECHNOLOGIES • Identification And Verification Systems Identification:Search a sample against a database of templates. Typical application: identifying fingerprints Verification:Compare a sample against a single stored template Typical application: voice lock
  • 8. METHODS BIOMETRIC METHODS: 1)Behavioral Biometrics a)Keystroke or Typing Recognition b)Speaker Identification or Recognition 2)Physical Biometrics a)Fingerprint Identification or Recognition b)Speaker or Voice Authentication c)Hand or Finger Geometry Recognition d) Facial Recognition
  • 9. BEHAVIORAL BIOMETRICS • Used for verification purpose • Keystroke or Typing Recognition:Keystroke recognition measures the characteristics of an individual’s typing patterns, including the time spacing of words. It can be used for identifying people who may create inappropriate email or conduct. • Speaker Identification or Recognition: Speaker identification and recognition is used to discover an unknown speaker’s identity based on patterns of voice pitch and speech style. Behavioral patterns of a voice differ with every individual.
  • 10. PHYSICAL BIOMETRICS • Used for Identification purpose • Fingerprint Identification or Recognition: This type of biometrics compares two fingerprints to determine identification. • Speaker or Voice Authentication: Speaker or voice authentication is the analysis of vocal behavior by matching it to a voice model template • Hand or Finger Geometry Recognition:The method uses 3D analysis of the finger for tracking and identification purposes. • Facial Recognition: Facial recognition uses algorithms to analyze features. These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
  • 11. ADVANTAGES • Increase security • Eliminate problems caused by lost IDs or forgotten passwords • Reduce password administration costs. • Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN? • Replace hard-to-remember passwords which may be shared or observed.
  • 12. DISADVANTAGES • The finger print of those people working in Chemical industries are often affected. • It is found that with age, the voice of a person differs. • For people affected with diabetes, the eyes get affected resulting in differences. • Biometrics is an expensive security solution.
  • 13. CONCLUSION • Biometrics is a very interesting and exciting field that has be growing exponentially in recent years (especially 2001). • The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world