SlideShare a Scribd company logo
1 of 142
Download to read offline
Identification
  Simplified
What we need ?
What we need ?
a method to identify individuals which is -
What we need ?
a method to identify individuals which is -


                Secure
What we need ?
a method to identify individuals which is -


                Secure
            Convenient
How do we do that ?
How do we do that ?
ID Cards & Smart Cards
How do we do that ?
     RFID Cards




             • RFID – Radio Frequency Identification
How do we do that ?
     Passwords
How do we do that ?
    Wrist Bands
How do we do that ?
  Wrist Bands too !!
    Wrist Bands
     Passwords
ID Cards & Smart Cards
     RFID Cards
How do we do that ?
     Wrist Bands
     Passwords
ID Cards & Smart Cards
      RFID Cards
     Wow! So many ways to identify
    people! what could be wrong?
What’s wrong with all that ?
What’s wrong with all that ?
                  Can be Stolen!
 ID Cards
                Easily Duplicated
Smart Cards
                 Have got Limits
RFID Cards
Wrist Bands          BG107CS***
                    Allocates from
              BG107CS000 to BG107CS999
                Total 1000 students!
What’s wrong with all that ?
What’s wrong with all that ?
Passwords
What’s wrong with all that ?
                Easily Forgotten
Passwords
What’s wrong with all that ?
                Easily Forgotten
Passwords
              Needs to be Changed
What’s wrong with all that ?
                Easily Forgotten
Passwords
              Needs to be Changed
What’s wrong with all that ?
                   Easily Forgotten
Passwords
               Needs to be Changed

             The Password Is quot;Expensive“
             It typically costs a company $10
             to $13 to reset an employee
             password, according to Forrester
             Research
The answer to all this…
The answer to all this…


  Lies Within
      Us!
In the form of Biometrics
In the form of Biometrics

       Biometrics is the study of
       computerized methods to
        identify a person by their
                 unique
        physical or behavioural
             characteristics
In the form of Biometrics
What’s in store for you?
What’s in store for you?
     Iris Recognition
    Voice Recognition
    Face Recognition
Fingerprint Authentication
       Other Types
Iris Recognition




              S. Supraja
Iris Recognition
    The Basics
Iris Recognition
                  The Basics
• Colored portion of the
eye
• Unique
•Single enrollment for a
lifetime
• Can be used with
glasses or contacts
Iris Recognition
             The Process
1. Image Acquisition
Iris Recognition
             The Process
1. Image Acquisition
2. Iris Definition
Iris Recognition
              The Process
1. Image Acquisition
2. Iris Definition
3. Field Optimization
Iris Recognition
              The Process
1. Image Acquisition
2. Iris Definition
3. Field Optimization
4. Image Analysis
Iris Recognition
Iris Code Comparison
Iris Recognition
Iris Code Comparison
Iris Recognition
Iris Code Comparison
Iris Recognition
Iris Code Comparison




Mismatch = (204/2048)*100 = 10%
Iris Recognition
           It’s Fool-Proof

•   65.8% match
•   Un-modifiable
•   Pupil Dilation
•   No replacement
    for a live eye
Voice Recognition
   “Voice verification required.”


  “My voice is my password.
      Give me access.”




         “Voice Print verified.
          Identity confirmed.
           Access Granted.”

                                  Sahana V.
Voice Recognition
Voice Recognition
Voice Recognition
Voice Recognition
Voice Recognition
Voice Recognition
Voice Recognition
     Approach
Voice Recognition
                                   Approach
   Waveform
         Frequency Domain




                            Time

1. Text dependent-hidden markov model
2. Text independent-vector quantization
Voice Recognition
  How is it done ?
Voice Recognition
                      How is it done ?
                   Two Waveforms of same word
Amplitude




            Time

                          •Waveform - the shape of a wave illustrated graphically
                          • Amplitude - displacement of a periodic wave
Voice Recognition
                       How is it done ?
                    Two Waveforms of same word
                   “Sample”           “Sample”
Amplitude




            Time


                           Are Different
Voice Recognition
                       How is it done ?
                     But the Frequency-Time plots
                   “Sample”             “Sample”
Frequency




            Time

                                    •Frequency - The number of occurrences
                                    of an event within a given interval
Voice Recognition
                       How is it done ?
                     But the Frequency-Time plots
                   “Sample”             “Sample”
Frequency




            Time


                            Look Similar
Voice Recognition
                  Applications
1. Voice recognition for Authentication
  1.   Single pass phrase system
  2.   Text prompt system
  3.   Verification integrated in a dialogue system
Voice Recognition
                  Applications
1. Voice recognition for Authentication
  1.   Single pass phrase system
  2.   Text prompt system
  3.   Verification integrated in a dialogue system

2. Voice recognition for Surveillance
   Forensic Voice Recognition
Face Recognition




             Pooja Sastry
Face Recognition
               Features
•   Facial Features are Unique
Face Recognition
               Features
•   Facial Features are Unique
•   Passive Biometrics
Face Recognition
               Features
•   Facial Features are Unique
•   Passive Biometrics
•   Already Widespread
Face Recognition
               Features
•   Facial Features are Unique
•   Passive Biometrics
•   Already Widespread
•   Inexpensive
Face Recognition
    Categories
Face Recognition
            Categories
1. Face Geometry
Face Recognition
             Categories
1. Face Geometry
2. Facial Thermograms
Face Recognition
             Categories
1. Face Geometry
2. Facial Thermograms
3. Eigen Face Method
Face Recognition
             Categories
1. Face Geometry
2. Facial Thermograms
3. Eigen Face Method
4. Template Based
Face Recognition
     Process
Face Recognition
     Process



           Detection
Face Recognition
     Process



         Alignment &
         Measurement
Face Recognition
     Process



       Representation &
          Matching
Face Recognition
     Process



       Identity Confirmed
Face Recognition
   Identification



   WHO AM I?
Face Recognition
      Verification



AM I WHO I SAY I AM ?
Fingerprint Authentication




                   S. Krithika
Fingerprint Authentication
         Features
Fingerprint Authentication
              Features
•Ridges, Valleys
Fingerprint Authentication
              Features
•Ridges, Valleys




                   Ridges

                   Valleys
Fingerprint Authentication
              Features
•Ridges, Valleys
•Dark lines - Ridges
•Brighter lines -
Valleys
                Ridges

                Valleys
Fingerprint Authentication
   Discriminating Information
Fingerprint Authentication
     Discriminating Information




1. Ridge Termination
2. Ridge Bifurcation
Fingerprint Authentication
   Authentication Procedure
Fingerprint Authentication
   Authentication Procedure

    Two essential procedures
    • Enrollment
    • Authentication
Fingerprint Authentication
   Authentication Procedure
Fingerprint Authentication
   Authentication Procedure




                 Image Acquisition
             Classified roughly as
             • Optical
             • Non-Optical
Fingerprint Authentication
   Authentication Procedure
Fingerprint Authentication
   Authentication Procedure




                 Feature Extraction
               • Direct
               • Feature or Minutia
               based
Fingerprint Authentication
   Authentication Procedure
Fingerprint Authentication
      Authentication Procedure




      Matching
• 1 : 1 Matching
• 1 : N Matching
Fingerprint Authentication
   Authentication Procedure
Fingerprint Authentication
   Authentication Procedure
Fingerprint Authentication
        Applications
Fingerprint Authentication
        Applications
            • Biometric Smart Gun
Fingerprint Authentication
        Applications
            • Biometric Smart Gun
            • Olympic Summer
            Games - Athens, Greece
            2004
Fingerprint Authentication
         Drawback
Fingerprint Authentication
         Drawback
            • Skin Diseases
              prevent normal
              formation
            • Magali (Naegeli)
              syndrome
            • The HuangTien
              family in Taiwan
Fingerprint Authentication
         Drawback
            • Skin Diseases
              prevent normal
              formation
            • Magali (Naegeli)
              syndrome
            • The HuangTien
              family in Taiwan
Other Types




         Subhash Choudhary
Other Types
Palm/Hand Geometry
Other Types
       Palm/Hand Geometry
• Full-Hand Geometry
Other Types
       Palm/Hand Geometry
• Full-Hand Geometry
• Two Finger Scan
Other Types
        Palm/Hand Geometry
• Full-Hand Geometry
• Two Finger Scan




 Image Acquisition
Other Types
        Palm/Hand Geometry
• Full-Hand Geometry
• Two Finger Scan




 Image Acquisition   Outline
Other Types
        Palm/Hand Geometry
• Full-Hand Geometry
• Two Finger Scan




 Image Acquisition   Outline   Geometry
Other Types
   DNA
Other Types
                    DNA
• Requires Actual
  Physical Sample
Other Types
                  DNA
• Requires Actual
  Physical Sample
• Not fully automated
Other Types
                  DNA
• Requires Actual
  Physical Sample
• Not fully automated
Other Types
                  DNA
• Requires Actual
  Physical Sample
• Not fully automated
• Expensive
Other Types
                  DNA
• Requires Actual
  Physical Sample
• Not fully automated
• Expensive
• Privacy Issues
Other Types
    Gait
Other Types
                    Gait
• Study of Animal
  Locomotion
Other Types
                    Gait
• Study of Animal
  Locomotion
• Helps Athletes
Other Types
                 Gait
• Study of Animal
  Locomotion
• Helps Athletes
• Standard Camera – any
  condition
Other Types
                 Gait
• Study of Animal
  Locomotion
• Helps Athletes
• Standard Camera – any
  condition
• Identification at a
  Distance
Other Types
Skin Reflection
Other Types
           Skin Reflection
• Absorption Spectrum of
  Skin varies
Other Types
           Skin Reflection
• Absorption Spectrum of
  Skin varies
• LEDs send Light into
  Skin
Other Types
           Skin Reflection
• Absorption Spectrum of
  Skin varies
• LEDs send Light into
  Skin
• Photodiodes read
  reflected light
Future of Biometrics




               Ratnala Srikanth
The Past & The Present
Future of Biometrics
   Security & Privacy

  Biometrics in Action

    Cost & Accuracy
Security & Privacy
Biometric Systems must be Fool-Proof
Security of Collected Biometric Data
Biometrics In Action
Biometrics In Action
  Immigration Control
Biometrics In Action
       Immigration Control




Biometric Data is embedded in UK Passports
Biometrics In Action
Transactional Authentication
Biometrics In Action
Transactional Authentication




A Biometric ATM in Malawi (South Africa)
Biometrics In Action
   Computer Security
Biometrics In Action
   Computer Security




 Finger Scan In Modern Laptops
Biometrics In Action
     Smart Doors
Biometrics In Action
          Smart Doors




A New way for Physical Access Control
Biometrics In Action
  Time and Attendance
Biometrics In Action
  Time and Attendance




  A New Tamper-Proof way…
Cost & Accuracy
More Accuracy = More Cost
Cost & Accuracy
More Accuracy = More Cost
Conclusion
Conclusion
End of Paper based Identity
Conclusion
End of Identity Theft
Conclusion
 Reduces Expenditure on Security
            Saves Time
      Helps us Fight Terrorism
Comfortable life + Improved Security
Conclusion
We need to -

  • do Research in Biometrics
  • bring Awareness amongst people
  • Be ready for the change
  • Bring about a change
  • Become Smart
Further Reading
• Paul Reid . Biometrics for Network Security . Prentice Hall
PTR . December 30, 2003

• Nalini K Ratha . Advances in Biometrics . Springer . 2007

• Biometrics Consortium -
•http://www.biometrics.org/resources.php

• Biometrics Products –
 http://www.biometricsproducts.com/

• Introduction to Biometrics -
http://biometrics.gov/ReferenceRoom/Introduction.aspx
Thank You!

 Abhishek Mishra       S. Krithika

   Pooja Sastry     Ratnala Srikanth

    Sahana V.          S. Supraja

Subhash Choudhary
Questions ?

More Related Content

What's hot

Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniquesjackofhearty1
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 

What's hot (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometrics
BiometricsBiometrics
Biometrics
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 

Viewers also liked

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Building strings in 1 minute
Building strings in 1 minuteBuilding strings in 1 minute
Building strings in 1 minuteAkshay Gupta
 
GUN CONTROL SMART GUN ALTERNATION
GUN CONTROL SMART GUN ALTERNATIONGUN CONTROL SMART GUN ALTERNATION
GUN CONTROL SMART GUN ALTERNATIONTony TRAN
 
Tsunami Detector
Tsunami DetectorTsunami Detector
Tsunami DetectorRahul Patil
 
weapon authentication
weapon authenticationweapon authentication
weapon authenticationamrutadixit
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsAnivar Aravind
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Introduction to Analytics
Introduction to AnalyticsIntroduction to Analytics
Introduction to AnalyticsMichael Bloom
 
Painel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy ExperiencePainel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy ExperienceUKinBrazilNetwork
 
Introduction To Analytics
Introduction To AnalyticsIntroduction To Analytics
Introduction To AnalyticsAlex Meadows
 
Scraping with Python for Fun and Profit - PyCon India 2010
Scraping with Python for Fun and Profit - PyCon India 2010Scraping with Python for Fun and Profit - PyCon India 2010
Scraping with Python for Fun and Profit - PyCon India 2010Abhishek Mishra
 
Tsunami detection system
Tsunami detection systemTsunami detection system
Tsunami detection systemsrinithiv
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopGhassan Al-Yafie
 

Viewers also liked (20)

Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Building strings in 1 minute
Building strings in 1 minuteBuilding strings in 1 minute
Building strings in 1 minute
 
GUN CONTROL SMART GUN ALTERNATION
GUN CONTROL SMART GUN ALTERNATIONGUN CONTROL SMART GUN ALTERNATION
GUN CONTROL SMART GUN ALTERNATION
 
Tsunami Detector
Tsunami DetectorTsunami Detector
Tsunami Detector
 
weapon authentication
weapon authenticationweapon authentication
weapon authentication
 
India's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & ExploitsIndia's UID Project: Biometrics Vulnerabilities & Exploits
India's UID Project: Biometrics Vulnerabilities & Exploits
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction to Analytics
Introduction to AnalyticsIntroduction to Analytics
Introduction to Analytics
 
Painel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy ExperiencePainel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy Experience
 
Introduction To Analytics
Introduction To AnalyticsIntroduction To Analytics
Introduction To Analytics
 
Scraping with Python for Fun and Profit - PyCon India 2010
Scraping with Python for Fun and Profit - PyCon India 2010Scraping with Python for Fun and Profit - PyCon India 2010
Scraping with Python for Fun and Profit - PyCon India 2010
 
Tsunami detection system
Tsunami detection systemTsunami detection system
Tsunami detection system
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
 

Similar to Identification Simplified - An Introduction to Biometrics

Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technologyDinesh Ediga
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric PresentationAnand Yadav
 
L05-biometrics best for the lresentation
L05-biometrics best for the lresentationL05-biometrics best for the lresentation
L05-biometrics best for the lresentationsaugatmainali9
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 

Similar to Identification Simplified - An Introduction to Biometrics (20)

Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
BIO-METRICS
BIO-METRICSBIO-METRICS
BIO-METRICS
 
Biometrics
BiometricsBiometrics
Biometrics
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
Bio metrics
Bio metricsBio metrics
Bio metrics
 
Zhenan sun
Zhenan sunZhenan sun
Zhenan sun
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
L05-biometrics best for the lresentation
L05-biometrics best for the lresentationL05-biometrics best for the lresentation
L05-biometrics best for the lresentation
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 

More from Abhishek Mishra

Introduction to Game programming with PyGame Part 1
Introduction to Game programming with PyGame Part 1Introduction to Game programming with PyGame Part 1
Introduction to Game programming with PyGame Part 1Abhishek Mishra
 
Amritadhara - Issues, Challenges, and a Solution
Amritadhara - Issues, Challenges, and a SolutionAmritadhara - Issues, Challenges, and a Solution
Amritadhara - Issues, Challenges, and a SolutionAbhishek Mishra
 
Project SpaceLock - Architecture & Design
Project SpaceLock - Architecture & DesignProject SpaceLock - Architecture & Design
Project SpaceLock - Architecture & DesignAbhishek Mishra
 
The Beginning - Jan 20 2009
The Beginning - Jan 20 2009The Beginning - Jan 20 2009
The Beginning - Jan 20 2009Abhishek Mishra
 
SpaceLock Meetup - Plan 25 Jan 09
SpaceLock Meetup - Plan 25 Jan 09SpaceLock Meetup - Plan 25 Jan 09
SpaceLock Meetup - Plan 25 Jan 09Abhishek Mishra
 

More from Abhishek Mishra (10)

Paddles at pelham
Paddles at pelhamPaddles at pelham
Paddles at pelham
 
All in a day
All in a dayAll in a day
All in a day
 
Introduction to Game programming with PyGame Part 1
Introduction to Game programming with PyGame Part 1Introduction to Game programming with PyGame Part 1
Introduction to Game programming with PyGame Part 1
 
Introducing BugBase 1.0
Introducing BugBase 1.0Introducing BugBase 1.0
Introducing BugBase 1.0
 
Amritadhara - Issues, Challenges, and a Solution
Amritadhara - Issues, Challenges, and a SolutionAmritadhara - Issues, Challenges, and a Solution
Amritadhara - Issues, Challenges, and a Solution
 
Gibson Guitar Robot
Gibson Guitar RobotGibson Guitar Robot
Gibson Guitar Robot
 
Space Lock Web UI
Space Lock Web UISpace Lock Web UI
Space Lock Web UI
 
Project SpaceLock - Architecture & Design
Project SpaceLock - Architecture & DesignProject SpaceLock - Architecture & Design
Project SpaceLock - Architecture & Design
 
The Beginning - Jan 20 2009
The Beginning - Jan 20 2009The Beginning - Jan 20 2009
The Beginning - Jan 20 2009
 
SpaceLock Meetup - Plan 25 Jan 09
SpaceLock Meetup - Plan 25 Jan 09SpaceLock Meetup - Plan 25 Jan 09
SpaceLock Meetup - Plan 25 Jan 09
 

Recently uploaded

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

Identification Simplified - An Introduction to Biometrics

Editor's Notes

  1. Hi everyone and welcome to our presentation – “Identification Simplified”<number>
  2. What we need today<number>
  3. is a method to identify individuals which<number>
  4. is secure and convenient.<number>
  5. Lets look at what methods we use today to identify people…<number>
  6. We have ID cards and Smart cards today<number>
  7. We have even started using RFID cards which is a slightly more advanced type of card.<number>
  8. We use passwords to protect our identity at work and internet<number>
  9. We even use wristbands, you can find these in amusement parks mostly<number>
  10. So, as you can see we have done a lot to solve the problem of identification… <number>
  11. but yet we feel something is missing…<number>
  12. You must be wondering what’s wrong with all these great methods of identification…<number>
  13. With Card Type of identities, we got serious problems {click}The can be stolen {click}Can be duplicated {click}Have got limits {click}This ID card that I’m holding, Identifies me in the form of BG107CS***, which means it can address people from bg107cs000 to bg107cs999. Now that means we can address only 1000 people with it. You can clearly see that as the CS batch increases in size beyond 1000, this ID card needs to be replaced.<number>
  14. Now that! Is how a modern professional’s wallet looks like today. Isn’t that loaded with cards!!<number>
  15. Now passwords! Yes, even they’ve got problems<number>
  16. Easily forgotten<number>
  17. They need to be changed time to time. This ensures security and limits eavesdropping. many organizations have a policy to change everyone’s password after a fixed time.<number>
  18. Now that comes at a cost. Here is a businessweek report saying that “Password is expensive”<number>
  19. And a researchsers at forrester research have estimated this cost to be $10-$13 per employee.<number>
  20. Not secure not convenient… we HAVE to find an answer to all these problems! and it won’t be some space-age technology… will it be in a chip embedded into us…No!!<number>
  21. the answer is none of those… but the answer simply lies within us!<number>
  22. In the form of biometrics…<number>
  23. Now Biometrics is the… {definition }<number>
  24. As I said, biometrics is the answer to the problems, you must be wondering how ?<number>
  25. For that, we will now take you through various technologies that help us identify people under Biometircs.<number>
  26. These are some of the techniques we would be discussing today. We would also talk about the Future and draw some conclusions based on our findings.<number>
  27. I would now call upon Supraja to explain you how Iris Recognition is helpful in Biometrics.<number>