SlideShare una empresa de Scribd logo
1 de 13
BIOMETRICS




                   BY:
             C.Rajeev Reddy
              08Q61A0516
MY PRESENTATION
•   INTRODUCTION
•   HISTORY
•   WORKING PROCESS
•   TECHNOLOGIES
•   ADVANTAGES & DIS-ADVANTAGES
•   CONCLUSION
•   BIBLIOGRAPHY
INTRODUCTION
• Biometrics are automated methods of
  recognizing a person based on a physiological or
  behavioral characteristic.
• As the level of security decreases and transaction
  fraud increases, the need for highly secure
  identification and personal verification
  technologies is more.
• Biometric-based solutions are able to provide for
  confidential financial transactions and personal
  data privacy.
HISTORY
• The term "biometrics" is derived from the Greek
  words bio (life) and metric (to measure).
• The first known example of biometrics in
  practice was a form of finger printing being used
  in China in the 14th century by “Joao de Barros.”
• “Bertillonage” a method of bodily measurement
  was used by police authorities.
• The police then used finger printing, which was
  developed by Richard Edward Henry of Scotland
  Yard.
WHY BIOMETRICS…?
•   Convenient
•   Passwords are not user-friendly
•   Perceived as more secured
•   Passive identification
WORKING
All biometric systems works in a four-stage process that consists of the
   following steps:

    • Capture: A biometric system collects the sample of biometric features
  like fingerprint, voice etc of the person who “LOGGS” in.

    • Extraction: The data extraction is done uniquely from the sample and a
  template is created for unique features. Templates stores in digital
  biometric code format.

   • Comparison: The template is then compared with a new sample.

  • Match/non-match: The system then decides whether the features
  extracted from the new sample are a match or a non-match with the
  template. When identity needs checking, the person interacts with the
  biometric system, a new biometric sample is taken and compared with the
  template.
TECHNOLOGIES
• Identification And Verification Systems
  Identification:Search a sample against a database
  of templates.
        Typical application: identifying fingerprints
  Verification:Compare a sample against a single
  stored template
       Typical application: voice lock
METHODS
BIOMETRIC METHODS:
1)Behavioral Biometrics
   a)Keystroke or Typing Recognition
   b)Speaker Identification or Recognition



2)Physical Biometrics
  a)Fingerprint Identification or Recognition
  b)Speaker or Voice Authentication
  c)Hand or Finger Geometry Recognition
  d) Facial Recognition
BEHAVIORAL BIOMETRICS

• Used for verification purpose
• Keystroke or Typing Recognition:Keystroke recognition
  measures the characteristics of an individual’s typing patterns,
  including the time spacing of words. It can be used for
  identifying people who may create inappropriate email or
  conduct.
• Speaker Identification or Recognition: Speaker
  identification and recognition is used to discover an
  unknown speaker’s identity based on patterns of voice
  pitch and speech style. Behavioral patterns of a voice
  differ with every individual.
PHYSICAL BIOMETRICS
• Used for Identification purpose
• Fingerprint Identification or Recognition: This type of
  biometrics compares two fingerprints to determine identification.
• Speaker or Voice Authentication: Speaker or voice
  authentication is the analysis of vocal behavior by matching it to a
  voice model template
• Hand or Finger Geometry Recognition:The method uses 3D
  analysis of the finger for tracking and identification purposes.
• Facial Recognition: Facial recognition uses algorithms to
  analyze features. These include the position/size/shape of the
  eyes, nose, cheekbones and jaw line.
ADVANTAGES
• Increase security
• Eliminate problems caused by lost IDs or
  forgotten passwords
• Reduce password administration costs.
• Make it possible, automatically, to know WHO
  did WHAT, WHERE and WHEN?
• Replace hard-to-remember passwords which
  may be shared or observed.
DISADVANTAGES
• The finger print of those people working in
  Chemical industries are often affected.
• It is found that with age, the voice of a person
  differs.
• For people affected with diabetes, the eyes
  get affected resulting in differences.
• Biometrics is an expensive security solution.
CONCLUSION
• Biometrics is a very interesting and exciting
  field that has be growing exponentially in
  recent years (especially 2001).
• The wide variety of physically unique traits
  our bodies give us will soon allow us to live in
  a very secure password-less world

Más contenido relacionado

La actualidad más candente

Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Biometric security system
Biometric security systemBiometric security system
Biometric security systemMithun Paul
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 

La actualidad más candente (20)

Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 

Similar a biometrics

23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdfVamshiKaram
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)AashishTanania
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxSundusKhan42
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technologyMaidaShahbaz3
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptxnagasukanya1
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxNareshKireedula
 

Similar a biometrics (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
biometric technology presentation.pptx
biometric technology presentation.pptxbiometric technology presentation.pptx
biometric technology presentation.pptx
 
Biometric
Biometric Biometric
Biometric
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biomatric
BiomatricBiomatric
Biomatric
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 

Más de Akhil Kumar

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solidsAkhil Kumar
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solidsAkhil Kumar
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planesAkhil Kumar
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of linesAkhil Kumar
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projectionAkhil Kumar
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersectionAkhil Kumar
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen methodAkhil Kumar
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solidsAkhil Kumar
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problemAkhil Kumar
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)Akhil Kumar
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 

Más de Akhil Kumar (20)

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solids
 
Edp scales
Edp  scalesEdp  scales
Edp scales
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solids
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planes
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of lines
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projection
 
Edp isometric
Edp  isometricEdp  isometric
Edp isometric
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersection
 
Edp excerciseeg
Edp  excerciseegEdp  excerciseeg
Edp excerciseeg
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen method
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solids
 
Edp curves2
Edp  curves2Edp  curves2
Edp curves2
 
Edp curve1
Edp  curve1Edp  curve1
Edp curve1
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problem
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
yii framework
yii frameworkyii framework
yii framework
 
cloud computing
cloud computingcloud computing
cloud computing
 
WORDPRESS
WORDPRESSWORDPRESS
WORDPRESS
 
AJAX
AJAXAJAX
AJAX
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

biometrics

  • 1. BIOMETRICS BY: C.Rajeev Reddy 08Q61A0516
  • 2. MY PRESENTATION • INTRODUCTION • HISTORY • WORKING PROCESS • TECHNOLOGIES • ADVANTAGES & DIS-ADVANTAGES • CONCLUSION • BIBLIOGRAPHY
  • 3. INTRODUCTION • Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. • As the level of security decreases and transaction fraud increases, the need for highly secure identification and personal verification technologies is more. • Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy.
  • 4. HISTORY • The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). • The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century by “Joao de Barros.” • “Bertillonage” a method of bodily measurement was used by police authorities. • The police then used finger printing, which was developed by Richard Edward Henry of Scotland Yard.
  • 5. WHY BIOMETRICS…? • Convenient • Passwords are not user-friendly • Perceived as more secured • Passive identification
  • 6. WORKING All biometric systems works in a four-stage process that consists of the following steps: • Capture: A biometric system collects the sample of biometric features like fingerprint, voice etc of the person who “LOGGS” in. • Extraction: The data extraction is done uniquely from the sample and a template is created for unique features. Templates stores in digital biometric code format. • Comparison: The template is then compared with a new sample. • Match/non-match: The system then decides whether the features extracted from the new sample are a match or a non-match with the template. When identity needs checking, the person interacts with the biometric system, a new biometric sample is taken and compared with the template.
  • 7. TECHNOLOGIES • Identification And Verification Systems Identification:Search a sample against a database of templates. Typical application: identifying fingerprints Verification:Compare a sample against a single stored template Typical application: voice lock
  • 8. METHODS BIOMETRIC METHODS: 1)Behavioral Biometrics a)Keystroke or Typing Recognition b)Speaker Identification or Recognition 2)Physical Biometrics a)Fingerprint Identification or Recognition b)Speaker or Voice Authentication c)Hand or Finger Geometry Recognition d) Facial Recognition
  • 9. BEHAVIORAL BIOMETRICS • Used for verification purpose • Keystroke or Typing Recognition:Keystroke recognition measures the characteristics of an individual’s typing patterns, including the time spacing of words. It can be used for identifying people who may create inappropriate email or conduct. • Speaker Identification or Recognition: Speaker identification and recognition is used to discover an unknown speaker’s identity based on patterns of voice pitch and speech style. Behavioral patterns of a voice differ with every individual.
  • 10. PHYSICAL BIOMETRICS • Used for Identification purpose • Fingerprint Identification or Recognition: This type of biometrics compares two fingerprints to determine identification. • Speaker or Voice Authentication: Speaker or voice authentication is the analysis of vocal behavior by matching it to a voice model template • Hand or Finger Geometry Recognition:The method uses 3D analysis of the finger for tracking and identification purposes. • Facial Recognition: Facial recognition uses algorithms to analyze features. These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
  • 11. ADVANTAGES • Increase security • Eliminate problems caused by lost IDs or forgotten passwords • Reduce password administration costs. • Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN? • Replace hard-to-remember passwords which may be shared or observed.
  • 12. DISADVANTAGES • The finger print of those people working in Chemical industries are often affected. • It is found that with age, the voice of a person differs. • For people affected with diabetes, the eyes get affected resulting in differences. • Biometrics is an expensive security solution.
  • 13. CONCLUSION • Biometrics is a very interesting and exciting field that has be growing exponentially in recent years (especially 2001). • The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world