SlideShare une entreprise Scribd logo
1  sur  29
BIO-METRIC
TECHNOLOGY
Main Types Of Authentication
By using passwords, PIN-Code.
By using smart card or swipe card
By using Biometric
Introduction Bio-Metric Technology
 History About Biometric Technology.
 Definition of Bio-Metric Technology
Why Bio-Metric Technology?
 Leading Bio-Metric Technology
 How its Works?
 Types Of Bio-Metric Technology.
 Comparison Of Various Bio-Metric
Technology
 Advantage & Disadvantage Of Bio-Metric
Technology
 Conclusion
History About Biometric Technology
The ancient Egyptians and the Chinese played a
large role in biometrics history.
Biometrics in practice was a form of finger printing
being used in china in the 14th century.
Bertillon developed a technique of multiple body
measurements .
A system called “Indentimat” which measured
shape of the hand and length of fingers was
introduced in 1970s.
What is Biometrics ?
 Biometrics the science with technology to measure and
analyze biological data.
 Meaning of Biometrics comes from the Greeks.
Biometry = bio(life) + metry(to measure).
 Biometrics refers to automated methods or technologies
that measure and analyze human body characteristics
like DNA, fingerprints, eye retinas and irises, voice
patterns, facial patterns and hand measurements for
authentication purposes.
Leading Biometrics Technologies
Feature
Extraction
Acquired
Biometric
Sample
Matching Decision
Database
Flowchart of Typical Biometrics Systems
Why Bio Metric-Technology
• Identity theft is not possible.
• password remembrance problem does
not exist.
• Cannot be predicted or hacked.
• Cannot be shared.
• More secure.
 Physiological  Behavioral
Face
Iris Recognition
Retina Scan
Fingerprint
Signature
Voice
Face Recognition
 Principle: analysis of the unique
shape, pattern and positioning of
facial features.
 A automated software for
identifying or verifying a person
from a digital image or a video
frame from a video source.
Typically used in security
systems.
 Uses an image or series of images
either from a camera or
photograph to recognize a person.
 Highly complex technology.
Iris Recognition
 The iris of each eye of each
person is absolutely unique.
 The false acceptance rate
for iris recognition systems
is 1 in 1.2 million.
 Iris pattern is not changed
over years or by glasses,
contact lens
Problems to Iris Scanning
 Scanning difficult from a larger distance.
 It uses INFRARED light which may cause damage to our
eyes.
 An eye photograph can also be used to gaining the access.
Retina scan
 It analyzing the layer of blood
vessels situated at the back of
the eye.
 The machine takes around ten
seconds to shine a “low intensity
coherent light source” onto the
retina to illuminate the blood
vessels.
 Once the machine has a copy of
the scan, it compares the picture
to all the different scans of
databases, looks for a match,
and identifies the individual.
 Retina scan machines are fairly
expensive.
Fingerprint Recognition
 A fingerprint in its narrow sense is an
impression left by the friction ridges
of a human finger.
 Biometrics refers to that measure and
analyze human body characteristics
such as fingerprints recognition.
 Fingerprint recognition is possible
using the fingerprint scanner.
 A fingerprint scanner has two basic
jobs.
 It needs to get an image of your
finger.
Sensor
[Fingerprint
Sensor]
Pre-Processing
Matched
Profile
BIO-METRIC SYSTEM
Fingerprint
Extraction
Profile
Search
Stored
Profiles
Application
Activation
How Finger-Print Works?
Problem to Finger Print System
 Finger prints can be easily
copied.
 Wrong result is shown if
the finger is not placed
properly.
 If the software is not
sufficiently god negative
result is shown.
Advantages of fingerprint Recognition
 Oldest form of Biometrics
 Highly Reliable
 Uses easily features of fingers
 High Security access
 Reduce cost
 Instance Report
Voice Recognition
It’s a habitual speaking recognition.
Voice recognition systems analyze differences
such as in pitch, and tone.
This biometric is also sensitive to environmental
conditions such as background noise.
Template size can vary significantly according to
the length of the pass phrase.
Signature Recognition
Static Dynamic
In this mode, users write their signature on
paper, digitize it through an optical scanner or
a camera, and the biometric system recognizes
the signature by analyzing its shape. It is also
known as “off-line”.
In this mode, users write their signature in a
digitizing tablet, which acquires the signature
in real time. Dynamic recognition is also
known as “on-line”.
 One of behavioral biometric:
Signature recognition
 Operated in two different mode:
Signature Recognition Application
 Criminal identification
 Prison security
 ATM and other Financial Transactions
 PC/LAN Login
 Database access
 Border crossing controls
Advantages of Biometrics
 Biometrics are generally used for
authentication.
 It provides higher security .e.g. Iris
recognition .
 Voice Recognition works well over the
telephone
 User friendly
 e.g. Hand geometry recognition,
 finger print recognition
Disadvantages of Biometrics
Retina recognition requires close physical contact
of the scanning device, may not be generally
accepted by public
This technology is little Costly.
Voice recognition requires large amount of
computer storage, people's voices can change,
background noises can interfere.
Biometrics features may change over time.
Signature recognition has poor long-term
reliability, accuracy difficult to ensure.
A biometric system can operate in two
modes
Identification:
• A one to many comparison of the captured biometric against a
biometric database in attempt to identify an unknown
individual.
Verification:
• A one to one comparison of a captured biometric with a stored
template to verify that the individual is who he claims to be.
• Verification is faster and performs better.
• In a verification, the user must first enter his or her identity to
the biometric system. User ID's can be forgotten and cards can
be lost, making access impossible.
Application Of Biometric Technology
Criminal identification
Internet banking
Attendance system
Airport, Bank security
PC login security
Prevents unauthorized access to private data
Financial transaction management
Conclusion
 Not to remember passwords.
 User friendliness.
 A new way to interact with devices.
References
www.biometric leading
technology.com
www.matrixcomsec.com
matrixsecusol.com
www.Youtube.com
WWW.wikipedia.com
Bio-Metric Technology

Contenu connexe

Tendances

Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsAbhishek Mishra
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System Sadan Khan
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 
Biometric technology
Biometric technology Biometric technology
Biometric technology r1o9h9i6t
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication finalAshok Kuikel
 

Tendances (20)

Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Bio-metric Security System
Bio-metric Security System Bio-metric Security System
Bio-metric Security System
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric technology
Biometric technology Biometric technology
Biometric technology
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication final
 

En vedette

Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...FIDO Alliance
 
Light tree
Light tree Light tree
Light tree Priya K
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaFIDO Alliance
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsArun Kumar
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 

En vedette (6)

Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
 
Light tree
Light tree Light tree
Light tree
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in Korea
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Similaire à Bio-Metric Technology

Similaire à Bio-Metric Technology (20)

Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometric
BiometricBiometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Biometrics
BiometricsBiometrics
Biometrics
 

Dernier

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 

Dernier (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

Bio-Metric Technology

  • 2. Main Types Of Authentication By using passwords, PIN-Code. By using smart card or swipe card By using Biometric
  • 3. Introduction Bio-Metric Technology  History About Biometric Technology.  Definition of Bio-Metric Technology Why Bio-Metric Technology?  Leading Bio-Metric Technology  How its Works?  Types Of Bio-Metric Technology.  Comparison Of Various Bio-Metric Technology  Advantage & Disadvantage Of Bio-Metric Technology  Conclusion
  • 4. History About Biometric Technology The ancient Egyptians and the Chinese played a large role in biometrics history. Biometrics in practice was a form of finger printing being used in china in the 14th century. Bertillon developed a technique of multiple body measurements . A system called “Indentimat” which measured shape of the hand and length of fingers was introduced in 1970s.
  • 5. What is Biometrics ?  Biometrics the science with technology to measure and analyze biological data.  Meaning of Biometrics comes from the Greeks. Biometry = bio(life) + metry(to measure).  Biometrics refers to automated methods or technologies that measure and analyze human body characteristics like DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements for authentication purposes.
  • 7.
  • 9. Why Bio Metric-Technology • Identity theft is not possible. • password remembrance problem does not exist. • Cannot be predicted or hacked. • Cannot be shared. • More secure.
  • 10.  Physiological  Behavioral Face Iris Recognition Retina Scan Fingerprint Signature Voice
  • 11. Face Recognition  Principle: analysis of the unique shape, pattern and positioning of facial features.  A automated software for identifying or verifying a person from a digital image or a video frame from a video source. Typically used in security systems.  Uses an image or series of images either from a camera or photograph to recognize a person.  Highly complex technology.
  • 12.
  • 13. Iris Recognition  The iris of each eye of each person is absolutely unique.  The false acceptance rate for iris recognition systems is 1 in 1.2 million.  Iris pattern is not changed over years or by glasses, contact lens
  • 14. Problems to Iris Scanning  Scanning difficult from a larger distance.  It uses INFRARED light which may cause damage to our eyes.  An eye photograph can also be used to gaining the access.
  • 15. Retina scan  It analyzing the layer of blood vessels situated at the back of the eye.  The machine takes around ten seconds to shine a “low intensity coherent light source” onto the retina to illuminate the blood vessels.  Once the machine has a copy of the scan, it compares the picture to all the different scans of databases, looks for a match, and identifies the individual.  Retina scan machines are fairly expensive.
  • 16. Fingerprint Recognition  A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.  Biometrics refers to that measure and analyze human body characteristics such as fingerprints recognition.  Fingerprint recognition is possible using the fingerprint scanner.  A fingerprint scanner has two basic jobs.  It needs to get an image of your finger.
  • 18. Problem to Finger Print System  Finger prints can be easily copied.  Wrong result is shown if the finger is not placed properly.  If the software is not sufficiently god negative result is shown.
  • 19. Advantages of fingerprint Recognition  Oldest form of Biometrics  Highly Reliable  Uses easily features of fingers  High Security access  Reduce cost  Instance Report
  • 20. Voice Recognition It’s a habitual speaking recognition. Voice recognition systems analyze differences such as in pitch, and tone. This biometric is also sensitive to environmental conditions such as background noise. Template size can vary significantly according to the length of the pass phrase.
  • 21. Signature Recognition Static Dynamic In this mode, users write their signature on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the signature by analyzing its shape. It is also known as “off-line”. In this mode, users write their signature in a digitizing tablet, which acquires the signature in real time. Dynamic recognition is also known as “on-line”.  One of behavioral biometric: Signature recognition  Operated in two different mode:
  • 22. Signature Recognition Application  Criminal identification  Prison security  ATM and other Financial Transactions  PC/LAN Login  Database access  Border crossing controls
  • 23. Advantages of Biometrics  Biometrics are generally used for authentication.  It provides higher security .e.g. Iris recognition .  Voice Recognition works well over the telephone  User friendly  e.g. Hand geometry recognition,  finger print recognition
  • 24. Disadvantages of Biometrics Retina recognition requires close physical contact of the scanning device, may not be generally accepted by public This technology is little Costly. Voice recognition requires large amount of computer storage, people's voices can change, background noises can interfere. Biometrics features may change over time. Signature recognition has poor long-term reliability, accuracy difficult to ensure.
  • 25. A biometric system can operate in two modes Identification: • A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. Verification: • A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. • Verification is faster and performs better. • In a verification, the user must first enter his or her identity to the biometric system. User ID's can be forgotten and cards can be lost, making access impossible.
  • 26. Application Of Biometric Technology Criminal identification Internet banking Attendance system Airport, Bank security PC login security Prevents unauthorized access to private data Financial transaction management
  • 27. Conclusion  Not to remember passwords.  User friendliness.  A new way to interact with devices.