SlideShare une entreprise Scribd logo
1  sur  17
BIOMETRICS
Table of Content
 Introduction
 History
 Importance of Biometrics
 Characteristics
 Biometrics Process
 Application of Biometrics
 Advantages & Disadvantages
 Future Prospects
 Conclusion
Introduction
 Biometrics is the science of technology of measuring and analyzing biological
data.
 Biometrics are automated methods of recognizing a person based on
physiological behavioral characteristics.
 As the level of security decreases and transaction fraud increases, the need for
highly secure identification and personal verification technologies is more.
 Biometrics-based solutions are able to provide for confidential financial
transactions and personal data privacy.
History
 The term “Biometrics” is derived from the Greek words bio (life) and metric(to
measure).
 The first known example of biometrics in practice was a form of finger printing
being used in China in the 14th century by “joao de barros”.
 In the 1890’s, “Bertillonage” a method of bodily measurement was used by police
authorities.
 The police then used finger printing, which was developed by Richard Edward
Henry of Scotland yard.
Importance of Biometrics
 The security is needed in every place.
 Reduce the existing problems, like those which can be taken, stolen, borrowed are
even forgotten.
 Improves convenience, security and privacy.
 The first and most critical link in the security chain.
 Presented to counteract security threats.
Characteristics
There are two characteristics of biometrics.
 Physical
 Behavioral
The common physical characteristics are:
 Finger Print
 Face
 Retina
 Iris
 Hand Geometry
Characteristics
The Behavioral characteristics are:
 Voice
 Keystroke Dynamics
 Signature Dynamics
Physical Biometrics
Finger Print
A fingerprint in its narrow sense is an
impression left by the friction ridges of a
human finger.
Fingerprint recognization is possible using
the finger scanner.
A fingerprint scanner has two basic
jobs.(get an image, matches pattern of
prescanned images)
Face
The identification of a person by their
facial image characteristics.
Matching algorithm uses the location and
shape of facial attributes.
Retina
Every eye has its own totally unique
pattern of blood vessels.
Retina scan machines are fairly
expensive.
Physical Characteristics
Iris
The iris is the colored ring of textured
tissue that surrounds the pupil of the
eyes.
Iris identification uses the unique
pattern of its texture to recognize an
individual.
Hand Geometry
This method uses hand images for
person identification.
Person using identification hand
geometry utilizes hand images to
extract a number of features such as
finger length, width, thickness and
finger area etc.
Behavioral Characteristics
Voice
Voice recognition is the
identification using the acoustic
features of speech that have been
found to differ between individuals.
Keystroke Dynamics
It is a method of verifying the
identity of an individual by their
typing rhythm which can cope
with trained typists.
Verify the user with the stored
template.
Signature Dynamics
The analysis of how an individual
signatures.
The process used by a biometric
system to verify a signature is called
dynamic signature verification.
Comparison of Biometric Type
Biometric Type Accuracy Easy to Use User Acceptance
Fingerprint High Medium Low
Hand Geometry Medium High Medium
Voice Medium High High
Retina High Low Low
Iris Medium Medium Medium
Signature Medium Medium High
Face Low High High
Transmission
Signal Processing
Feature
extractions
representations
Quality
Sufficient
Generate Template
Template Match
Decision
Confidence
Database
Biometric data
collection
Biometric Process
Application of Biometrics
Security:
• Government agencies
• Banks: facial recognition system equipped ATM machines.
• Airports: Heathrow airport had Iris recognition Immigration system facilitate
frequent travelers.
Time and Attendance Management
• Hospitals
• Banks
Access Control
• Personal computers, phone
Advantages of Biometrics
 Uniqueness
 Universality
 Permanence
 Measurability
 User Friendliness
 Accuracy
 Comfort
Disadvantages of Biometrics
 Costly
 Facial imagining can also hinder accurate identifications.
 Missing body part problem.
 False acceptances and rejections.
 The scanning of eye is fearful.
 The nervousness that people feel about the scanners identification.
Future Prospects
Biometry is one of the most promising and life-altering technologies in existence
today. It is all set to change the way we live in the future. Some of the emerging
biometrics technologies in the near future are:
 Ear shape identification.
 Body odor identification.
 Body salinity identification.
 EEG fingerprint.
 DNA matching
Conclusion
 Not perfect yet.
 Successful applications.
 Decreasing cost and increasing convenience.
 Increasing both privacy and identity security.
 The field of biometrics is evolving.
 Benefit from this technology.

Contenu connexe

Tendances

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 

Tendances (20)

Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 

En vedette (11)

Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric
Biometric Biometric
Biometric
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
3d internet
3d internet3d internet
3d internet
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 

Similaire à Biometrics

Similaire à Biometrics (20)

Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
biometrics
biometricsbiometrics
biometrics
 
Ai
AiAi
Ai
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)
 
Biometric
BiometricBiometric
Biometric
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Biometrics

  • 2. Table of Content  Introduction  History  Importance of Biometrics  Characteristics  Biometrics Process  Application of Biometrics  Advantages & Disadvantages  Future Prospects  Conclusion
  • 3. Introduction  Biometrics is the science of technology of measuring and analyzing biological data.  Biometrics are automated methods of recognizing a person based on physiological behavioral characteristics.  As the level of security decreases and transaction fraud increases, the need for highly secure identification and personal verification technologies is more.  Biometrics-based solutions are able to provide for confidential financial transactions and personal data privacy.
  • 4. History  The term “Biometrics” is derived from the Greek words bio (life) and metric(to measure).  The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century by “joao de barros”.  In the 1890’s, “Bertillonage” a method of bodily measurement was used by police authorities.  The police then used finger printing, which was developed by Richard Edward Henry of Scotland yard.
  • 5. Importance of Biometrics  The security is needed in every place.  Reduce the existing problems, like those which can be taken, stolen, borrowed are even forgotten.  Improves convenience, security and privacy.  The first and most critical link in the security chain.  Presented to counteract security threats.
  • 6. Characteristics There are two characteristics of biometrics.  Physical  Behavioral The common physical characteristics are:  Finger Print  Face  Retina  Iris  Hand Geometry
  • 7. Characteristics The Behavioral characteristics are:  Voice  Keystroke Dynamics  Signature Dynamics
  • 8. Physical Biometrics Finger Print A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. Fingerprint recognization is possible using the finger scanner. A fingerprint scanner has two basic jobs.(get an image, matches pattern of prescanned images) Face The identification of a person by their facial image characteristics. Matching algorithm uses the location and shape of facial attributes. Retina Every eye has its own totally unique pattern of blood vessels. Retina scan machines are fairly expensive.
  • 9. Physical Characteristics Iris The iris is the colored ring of textured tissue that surrounds the pupil of the eyes. Iris identification uses the unique pattern of its texture to recognize an individual. Hand Geometry This method uses hand images for person identification. Person using identification hand geometry utilizes hand images to extract a number of features such as finger length, width, thickness and finger area etc.
  • 10. Behavioral Characteristics Voice Voice recognition is the identification using the acoustic features of speech that have been found to differ between individuals. Keystroke Dynamics It is a method of verifying the identity of an individual by their typing rhythm which can cope with trained typists. Verify the user with the stored template. Signature Dynamics The analysis of how an individual signatures. The process used by a biometric system to verify a signature is called dynamic signature verification.
  • 11. Comparison of Biometric Type Biometric Type Accuracy Easy to Use User Acceptance Fingerprint High Medium Low Hand Geometry Medium High Medium Voice Medium High High Retina High Low Low Iris Medium Medium Medium Signature Medium Medium High Face Low High High
  • 12. Transmission Signal Processing Feature extractions representations Quality Sufficient Generate Template Template Match Decision Confidence Database Biometric data collection Biometric Process
  • 13. Application of Biometrics Security: • Government agencies • Banks: facial recognition system equipped ATM machines. • Airports: Heathrow airport had Iris recognition Immigration system facilitate frequent travelers. Time and Attendance Management • Hospitals • Banks Access Control • Personal computers, phone
  • 14. Advantages of Biometrics  Uniqueness  Universality  Permanence  Measurability  User Friendliness  Accuracy  Comfort
  • 15. Disadvantages of Biometrics  Costly  Facial imagining can also hinder accurate identifications.  Missing body part problem.  False acceptances and rejections.  The scanning of eye is fearful.  The nervousness that people feel about the scanners identification.
  • 16. Future Prospects Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are:  Ear shape identification.  Body odor identification.  Body salinity identification.  EEG fingerprint.  DNA matching
  • 17. Conclusion  Not perfect yet.  Successful applications.  Decreasing cost and increasing convenience.  Increasing both privacy and identity security.  The field of biometrics is evolving.  Benefit from this technology.