SlideShare una empresa de Scribd logo
1 de 20
INTRODUCTION  TO BIOMETRICS Q. THOMAZEAU 30/04/2009 CENTRAL PARK
WEAKNESSES OF ACCESS CONTROL SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT ARE THE MARKET NEEDS? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PHYSICAL ACCESS CONTROL SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BIOMETRICS TECHNOLOGIES ,[object Object],[object Object]
CHOOSING YOUR BIOMETRIC TECHNOLOGIES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],No technology is  100% reliable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TWO COMPLEMENTARY CONCEPTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BIOMETRICS ADDS SECURITY AND COMFORT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Some governmental organizations (CNIL in France) recommends to store biometric data on card for privacy issues
HOW BIOMETRICS WORK ?  Candidate List Acquisition Scanner Store ENROLMENT  VERIFICATION / IDENTIFICATION Store Encoding
ACQUISITION & FEATURE EXTRACTION ,[object Object],[object Object],Biometric Type of feature Representation  Fingerprint Minutiae points Easy to locate by humans (x,y,  ) IRIS Fiber location in the IRIS image Very difficult to locate for a human (phase of the fiber) FACIAL Projections in multi-dimensional space : Purely mathematical Not detectable by human
COMPARISON OF TWO BIOMETRIC TEMPLATES ,[object Object],[object Object],[object Object],[object Object],[object Object],Biometric  template 1 Biometric  template 2 Matcher Matching Score ,[object Object],Probability of Match  Biometric  template
COMPARISON OF TWO BIOMETRIC TEMPLATES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PERFORMANCE OF BIOMETRIC TECHNOLOGIES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TEST METHODOLOGY False Reject False Acceptance
PERFORMANCE: A MATTER OF TRADE OFF Requirements Error  rate % False Acceptance Rate (FAR) False Reject Rate (FRR) Types of authentication errors Comfort Security
TYPICAL ROC CURVE  % % False Reject 0,1 0,01 0,001 False Acceptance 0,0001 1 2 ROC curve: Receiving Operating Curve
PERFORMANCE EXTRAPOLATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TEST METHODOLOGY SAGEM  has collected  large databases ... …  and is able to evaluate accuratly its fingerprint solutions
WHAT DOES BIOMETRICS BRING TO EXISTING TECHNIQUES ?
AND THREE POSSIBLE APPROACHES To have 1 2 3 4 5 6 7 8 9 * 0 # To know To be

Más contenido relacionado

La actualidad más candente

Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
Piyush Mittal
 

La actualidad más candente (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 

Destacado

Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 

Destacado (17)

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Introduction to Analytics
Introduction to AnalyticsIntroduction to Analytics
Introduction to Analytics
 
Introduction To Analytics
Introduction To AnalyticsIntroduction To Analytics
Introduction To Analytics
 
Systematics Lecture: Phenetics
Systematics Lecture: PheneticsSystematics Lecture: Phenetics
Systematics Lecture: Phenetics
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometrics
biometricsbiometrics
biometrics
 
Introduction to Analytics
Introduction to AnalyticsIntroduction to Analytics
Introduction to Analytics
 
Data science and_analytics_for_ordinary_people_ebook
Data science and_analytics_for_ordinary_people_ebookData science and_analytics_for_ordinary_people_ebook
Data science and_analytics_for_ordinary_people_ebook
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 

Similar a Biometrics

Similar a Biometrics (20)

MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Security
SecuritySecurity
Security
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Uid security
Uid securityUid security
Uid security
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCAREBIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 

Más de senejug

Más de senejug (17)

SeneJug java_8_prez_122015
SeneJug java_8_prez_122015SeneJug java_8_prez_122015
SeneJug java_8_prez_122015
 
BIG DATA - Cloud Computing
BIG DATA - Cloud ComputingBIG DATA - Cloud Computing
BIG DATA - Cloud Computing
 
Demonstration of @mail@
Demonstration of @mail@Demonstration of @mail@
Demonstration of @mail@
 
L'approche par regles metier
L'approche par regles metierL'approche par regles metier
L'approche par regles metier
 
Archivage Electronique: Comment Ca Marche?
Archivage Electronique: Comment Ca Marche?Archivage Electronique: Comment Ca Marche?
Archivage Electronique: Comment Ca Marche?
 
Développement agile de logiciel avec la méthode SCRUM
Développement agile de logiciel avec la méthode SCRUMDéveloppement agile de logiciel avec la méthode SCRUM
Développement agile de logiciel avec la méthode SCRUM
 
West Africa Apple Development
West Africa Apple DevelopmentWest Africa Apple Development
West Africa Apple Development
 
Solution de gestion de paie : PAYOHR
Solution de gestion de paie : PAYOHRSolution de gestion de paie : PAYOHR
Solution de gestion de paie : PAYOHR
 
GMAO
GMAOGMAO
GMAO
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Intégration d\'applications pour call centers
Intégration d\'applications pour call centersIntégration d\'applications pour call centers
Intégration d\'applications pour call centers
 
Capital Risk & IT, The Perfect Connection?
Capital Risk & IT, The Perfect Connection?Capital Risk & IT, The Perfect Connection?
Capital Risk & IT, The Perfect Connection?
 
Telecom in West Africa: Trends and Challenges
Telecom in West Africa: Trends and ChallengesTelecom in West Africa: Trends and Challenges
Telecom in West Africa: Trends and Challenges
 
What is Ajax
What is AjaxWhat is Ajax
What is Ajax
 
Tips on Creating Web Content
Tips on Creating Web ContentTips on Creating Web Content
Tips on Creating Web Content
 
Using CMS Tool Drupal
Using CMS Tool DrupalUsing CMS Tool Drupal
Using CMS Tool Drupal
 
Web2 And Java
Web2 And JavaWeb2 And Java
Web2 And Java
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Biometrics

  • 1. INTRODUCTION TO BIOMETRICS Q. THOMAZEAU 30/04/2009 CENTRAL PARK
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. HOW BIOMETRICS WORK ? Candidate List Acquisition Scanner Store ENROLMENT VERIFICATION / IDENTIFICATION Store Encoding
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. TEST METHODOLOGY False Reject False Acceptance
  • 15. PERFORMANCE: A MATTER OF TRADE OFF Requirements Error rate % False Acceptance Rate (FAR) False Reject Rate (FRR) Types of authentication errors Comfort Security
  • 16. TYPICAL ROC CURVE % % False Reject 0,1 0,01 0,001 False Acceptance 0,0001 1 2 ROC curve: Receiving Operating Curve
  • 17.
  • 18. TEST METHODOLOGY SAGEM has collected large databases ... … and is able to evaluate accuratly its fingerprint solutions
  • 19. WHAT DOES BIOMETRICS BRING TO EXISTING TECHNIQUES ?
  • 20. AND THREE POSSIBLE APPROACHES To have 1 2 3 4 5 6 7 8 9 * 0 # To know To be