SlideShare a Scribd company logo
1 of 25
BIOMETRICS 
PRESENTED BY 
Priyanka Srivastava
INTRODUCTION 
“A biometric is a physiological or behavioral characteristic 
of a human being that can distinguish one person from 
another and that theoretically can be used for identification 
or verification of identity.”
AUTOMATED IDENTIFICATION 
BASED ON 
Physiological or behavioral characteristics 
 Physiological examples 
Fingerprints 
Face 
Eyes 
DNA 
 Behavioral examples 
 1-Voice 2-Keystroke
BIOMETRIC AS AUTHENTICATION 
Authentication Depends On 
 What you have 
 What you know 
 What you ARE !
PHYSIOLOGICAL EXAMPLES 
 Fingerprints 
 Face 
 Eyes 
 DNA
FINGERPRINTING
FINGERPRINT 
IDENTIFICATION 
Matching the 
characteristics of a 
fingerprint on file to 
the one presented to 
the system. 
 Reliability depends 
on how many 
“points” you match.
FINGERPRINT TECHNOLOGY 
USES 
Door Locks 
Access Control 
In room safes 
Payment Systems
FACE
FACE WORKS AS 
 A template is generated which is based on nodal 
points and compared against templates. 
 It’s software is- FACEIT® which can take 
someone’s face out of a crowd.
FACIAL RECOGNITION 
 Facial recognition 
systems are built 
on computer 
programs that 
analyze images 
of human faces 
for the purpose 
of identifying 
them. The 
programs take a 
facial image.
EYES WORKS ACCORDING TO 
 Retinal – measures the pattern of 
blood vessels 
• Iris – examines the 
unique patterns of ridges 
on colored portion of the 
eye
DNA WOKS AS- 
Length and protein sequence are 
analyized to generate a DNA 
profile and compared against 
other profiles where it is used.
BEHAVIORAL EXAMPLES 
1-Voice 2-Keystroke
HOW VOICE RECOGNITION 
WORKS 
 compares a pre-recorded 
voice 
message with the 
current user. 
 Can be a data-base 
system or a stand 
alone device
IT’S APPLICATION 
 In Banks 
 In Financial Firms
KEY STROKE 
 It works as 
The user types his password or phrase 
on keyboard. 
System then records the timing of the 
typing and compares the password 
itself .
APPLICATION OF KEY STROKE 
 In Recording Company 
 Technology for firms digital right 
management Company
ADVANTAGES 
Reduces cost within organizations 
 Increases security 
Competitive advantage 
Convenience to employees 
Non-repudiation 
 Eliminates a paper trail
DISADVANTAGES 
 Accuracy of Performance 
 Failure to enroll rate 
 Information Abuse 
May violate privacy
CONCLUSION 
 Biometrics is a technology that can simplify 
the process of authentication 
 Biometrics can be best used in situations 
where specific identity or exception identity 
is desired
Biometric presentation........

More Related Content

What's hot

Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
Hai Nguyen
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise Assessment
Prahlad Reddy
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
Nikhil Ravi
 
resume _jayendra Kadam
resume _jayendra Kadamresume _jayendra Kadam
resume _jayendra Kadam
Jayendra Kadam
 

What's hot (20)

Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration TestingAsegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
 
Android project-APP ENFORCEMENT LOCK
Android project-APP ENFORCEMENT LOCKAndroid project-APP ENFORCEMENT LOCK
Android project-APP ENFORCEMENT LOCK
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial IntelligenceFace and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial Intelligence
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
LDA presentation
LDA presentationLDA presentation
LDA presentation
 
Protection and Security-R.D.Sivakumar
Protection and Security-R.D.SivakumarProtection and Security-R.D.Sivakumar
Protection and Security-R.D.Sivakumar
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
face recognition
face recognitionface recognition
face recognition
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS  An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
An Introduction to Investigative Face Recognition and Animetrics ForensicaGPS
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise Assessment
 
VOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEMVOICE BASED SECURITY SYSTEM
VOICE BASED SECURITY SYSTEM
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
resume _jayendra Kadam
resume _jayendra Kadamresume _jayendra Kadam
resume _jayendra Kadam
 

Viewers also liked

Sumit Banik_presentation
Sumit Banik_presentationSumit Banik_presentation
Sumit Banik_presentation
Sumit Banik
 

Viewers also liked (19)

Le reseau des professionnels grecs
Le reseau des professionnels grecsLe reseau des professionnels grecs
Le reseau des professionnels grecs
 
Understanding the Quality of the Student Experience in Blended Learning Envir...
Understanding the Quality of the Student Experience in Blended Learning Envir...Understanding the Quality of the Student Experience in Blended Learning Envir...
Understanding the Quality of the Student Experience in Blended Learning Envir...
 
The Compass to Daniel 11
The Compass to Daniel 11The Compass to Daniel 11
The Compass to Daniel 11
 
Korus
KorusKorus
Korus
 
June 1 prescription for life
June 1 prescription for lifeJune 1 prescription for life
June 1 prescription for life
 
8/22國際研習會成果_workshop output
8/22國際研習會成果_workshop output8/22國際研習會成果_workshop output
8/22國際研習會成果_workshop output
 
برای تدریس زور الکی نزنید
برای تدریس زور الکی نزنیدبرای تدریس زور الکی نزنید
برای تدریس زور الکی نزنید
 
Canada
CanadaCanada
Canada
 
Sumit Banik_presentation
Sumit Banik_presentationSumit Banik_presentation
Sumit Banik_presentation
 
Chat box - Enterprises communications platform
Chat box - Enterprises communications platform Chat box - Enterprises communications platform
Chat box - Enterprises communications platform
 
пасха презентация
пасха презентацияпасха презентация
пасха презентация
 
пасха презентация
пасха презентацияпасха презентация
пасха презентация
 
Northeast school of agriculture
Northeast school of agricultureNortheast school of agriculture
Northeast school of agriculture
 
Blended Learning for Secondary School Teachers: Teaching a new programming en...
Blended Learning for Secondary School Teachers: Teaching a new programming en...Blended Learning for Secondary School Teachers: Teaching a new programming en...
Blended Learning for Secondary School Teachers: Teaching a new programming en...
 
Tutorial delicious (1)
Tutorial delicious (1)Tutorial delicious (1)
Tutorial delicious (1)
 
Conference and registration details
Conference and registration detailsConference and registration details
Conference and registration details
 
Passive house design resource efficient comfortable and healthy - Niwat Archi...
Passive house design resource efficient comfortable and healthy - Niwat Archi...Passive house design resource efficient comfortable and healthy - Niwat Archi...
Passive house design resource efficient comfortable and healthy - Niwat Archi...
 
Blended Learning in learner-centered environments – a case study
Blended Learning in learner-centered environments – a case studyBlended Learning in learner-centered environments – a case study
Blended Learning in learner-centered environments – a case study
 
Education
EducationEducation
Education
 

Similar to Biometric presentation........

SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
Anshuli Mittal
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
Anshuli Mittal
 

Similar to Biometric presentation........ (20)

NAVE.pptx
NAVE.pptxNAVE.pptx
NAVE.pptx
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Speaker recognition in android
Speaker recognition in androidSpeaker recognition in android
Speaker recognition in android
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Biometric presentation........

  • 1. BIOMETRICS PRESENTED BY Priyanka Srivastava
  • 2. INTRODUCTION “A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.”
  • 3. AUTOMATED IDENTIFICATION BASED ON Physiological or behavioral characteristics  Physiological examples Fingerprints Face Eyes DNA  Behavioral examples  1-Voice 2-Keystroke
  • 4. BIOMETRIC AS AUTHENTICATION Authentication Depends On  What you have  What you know  What you ARE !
  • 5. PHYSIOLOGICAL EXAMPLES  Fingerprints  Face  Eyes  DNA
  • 7. FINGERPRINT IDENTIFICATION Matching the characteristics of a fingerprint on file to the one presented to the system.  Reliability depends on how many “points” you match.
  • 8. FINGERPRINT TECHNOLOGY USES Door Locks Access Control In room safes Payment Systems
  • 10. FACE WORKS AS  A template is generated which is based on nodal points and compared against templates.  It’s software is- FACEIT® which can take someone’s face out of a crowd.
  • 11. FACIAL RECOGNITION  Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them. The programs take a facial image.
  • 12.
  • 13. EYES WORKS ACCORDING TO  Retinal – measures the pattern of blood vessels • Iris – examines the unique patterns of ridges on colored portion of the eye
  • 14.
  • 15. DNA WOKS AS- Length and protein sequence are analyized to generate a DNA profile and compared against other profiles where it is used.
  • 17.
  • 18. HOW VOICE RECOGNITION WORKS  compares a pre-recorded voice message with the current user.  Can be a data-base system or a stand alone device
  • 19. IT’S APPLICATION  In Banks  In Financial Firms
  • 20. KEY STROKE  It works as The user types his password or phrase on keyboard. System then records the timing of the typing and compares the password itself .
  • 21. APPLICATION OF KEY STROKE  In Recording Company  Technology for firms digital right management Company
  • 22. ADVANTAGES Reduces cost within organizations  Increases security Competitive advantage Convenience to employees Non-repudiation  Eliminates a paper trail
  • 23. DISADVANTAGES  Accuracy of Performance  Failure to enroll rate  Information Abuse May violate privacy
  • 24. CONCLUSION  Biometrics is a technology that can simplify the process of authentication  Biometrics can be best used in situations where specific identity or exception identity is desired