SlideShare a Scribd company logo
1 of 28
Submitted By:
NAME - PREETI
Roll No -1219531098
BRANCH - ELECTRONICS AND
COMMUNICATION & ENGG.
March 27, 2015
1
GUIDED BY:
VIPIN KUMAR & SUNIL TIWARI.
CONTENT
Definiton of biometrics
Terms of biometrics
History of biometrics
Biometrics characteristics
Biometrics recognition techniques
Applications
Advantages & Disadvantages
conclusion
References
March27,2015
2
Biometrics refers to the automatic identification
of a person based on his or her physiological or
behavioral characteristics .
WhaT Is BIOMETRICs ?
INTODUCTION
March 27, 2015 3
Why BIOMETRICs ?
March 27, 2015 4
Level of Security
hIsTORy
March 27, 2015 5
The ancient Egyptians and the Chinese played
a large role in biometrics history.
Biometrics in practice was a form of finger
printing being used in china in the 14th
century.
Bertillon developed a technique of multiple
body measurements .
A system called “Indentimat” which measured
shape of the hand and length of fingers was
introduced in 1970s.
ChaRaCTERsTICs Of
BIOMETRICs
 Any human characteristic can qualify as a
biometric characteristic as long as it satisfies the
following requirements:-
Universality
Distinctiveness
Permanence
Collectability
hOW BIOMETRICs WORks ?
March 27, 2015 7
No
Yes
Biometric
Data Collection
Transmission
Quality
Sufficient?
Ye
s
Template Match
Signal Processing,
Feature Extraction,
Representation
Database
Generate Template
Decision
Confidence?
new biometric sample is
requested. No
All biometric systems
works in a four-stage
process:
Capture
Extraction
Comparison
Match/Non-match
A biometric system cAn operAte
in two modes
1.Identification: A one to many comparison of the captured
biometric against a biometric database in attempt to identify
an unknown individual.
2.Verification: A one to one comparison of a captured
biometric with a stored template to verify that the individual
is who he claims to be.
March 27, 2015 8
types of biometrics
 Physiological
 Face
 Fingerprint
 Hand geometry
 Retina
 Iris recognition
 Behavioral
 Signature
 Voice
March 27, 2015 9
fingerprint recognition
 A live acquisition of a person’s fingerprint.
 Dots (very small ridges),
 Space between two divergent ridges,
 Spurs (a notch protruding from a ridge),
 Bridges (small ridges joining two longer
adjacent ridges), crossovers (two ridges
that cross each other).
 One of the largest fingerprint recognization
system is integrated automated fingerprint
identification system, maintained by FBI in
the US since 1999.
March 27, 2015 10
fAce recognition:
• Face recognition uses the visible
physical structure of the face and
analyses the spatial geometry of
distinguishing features in it to identify
an individual.
March 27, 2015 11
Database
Input face image Extraction of
face image
Extraction of
face features
Positive
Negative
Hand or finger geometry is an automated
measurement of many dimensions of the hand and
fingers.
HAnd geometry
March 27, 2015 12
March 27, 2015 13
Based on a number of measurements taken from
the human hand.
The technique is very simple, relatively easy to use,
and inexpensive.
The physical size of a hand geometry-based system
is large.
iris recognition
March 27, 2015 14
Database
Input of face
image
Detection of
eye regions
Put iris in focus
Recognition of
iris pattern
accept
reject
•Iris scanning measures the iris pattern in the colored part of the
eye.
•Iris recognition uses camera technology with subtle infrared
illumination to acquire images of the detail-rich, intricate structures
of the iris.
Retina Recognition
• It analyzing the layer of blood vessels situated at the back of
the eye.
• The machine takes around ten seconds to shine a “low
intensity coherent light source” onto the retina to illuminate
the blood vessels.
• Once the machine has a copy of the scan, it compares the
picture to all the different scans on file, looks for a match, and
identifies the individual.
• Retina scan machines are fairly expensive.
March 27, 2015 15
SpeakeR / Voice Recognition
Voice or speaker recognition uses vocal characteristics
to identify individuals using a pass-phrase.
A telephone or microphone can serve as a sensor,
March 27, 2015 16
SignatuRe VeRification
Signature identification: is the analyses of the way a user signs
his or her name.
This technology examines :
• speed.
• direction .
• pressure of writing.
• the angle at which the pen is held.
• the number of times the pen is lifted.
• the time it takes to write the entire signature.
The process used by a biometric system to verify a signature is
called dynamic signature verification (DSV).
March 27, 2015 17
March 27, 2015 18
compaRiSon of BiometRicS
technology
futuRe pRoSpectS
Biometry is one of the most promising and life-altering
technologies in existence today. It is all set to change the way
we live in the future. Some of the emerging biometrics
technologies in the near future are:
1. Ear shape identification.
2. Body odor identification.
3. Body salinity identification.
4. EEG Fingerprint
5. DNA matching
March 27, 2015 20
Prevent unauthorized access to ATMs, Cellular phones
Desktop PCs
Criminal identification
In automobiles biometrics can replace keys with keyless
entry devices
Airport security
applicationS
March 27, 2015 21
March 27, 2015 22
Eliminate problems caused by lost IDs or forgotten
passwords.
Reduce password administration costs.
Make it possible, automatically, to know WHO did WHAT,
WHERE and WHEN?
Replace hard-to-remember passwords which may be shared
or observed.
AdvAntAges of biometrics
Increase security.
multimodAl biometrics
system
It utilize more than one physiological or
behavioral characteristic for enrollment,
verification or identification.
This system takes advantage of the
capabilities of each individual biometric.
It can be used to overcome some of
the limitations of a single biometrics.
disAdvAntAges of biometrics
1. costly.
2. Facial imaging can also hinder
accurate identification.
3. The scanning of eye is fearful.
4. Missing body part problem.
5. False acceptances and rejections.
6. The nervousness that people feel about the scanners
identification.March 27, 2015 24
conclusion
Biometric is an emerging area with many
opportunities for growth.
Decreasing costs and increasing convenience.
Increasing both privacy and identity security.
Possibly in the near future, you will not have to
remember PINs and passwords and keys in your bags
or pockets will be things of the past.
March 27, 2015 25
references
•www.biometrics.com
•www.google.com
•www.facerecognization.com
•www.fingerprintscanner.com
•www.irisrecognization.com
March 27, 2015 26
March 27, 2015 27
March 27, 2015 28
Any Questions

More Related Content

What's hot

Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
deepu427
 

What's hot (20)

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Pill camera presentation
Pill camera presentationPill camera presentation
Pill camera presentation
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 

Viewers also liked

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
'Atikah Khalil
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
syamil91
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics
 

Viewers also liked (20)

Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometric Technology And The Strategy Behind
Biometric Technology And The Strategy BehindBiometric Technology And The Strategy Behind
Biometric Technology And The Strategy Behind
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics--The Technology of Tomorrow
Biometrics--The Technology of TomorrowBiometrics--The Technology of Tomorrow
Biometrics--The Technology of Tomorrow
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 

Similar to Biometrics Technology Intresting PPT

SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 

Similar to Biometrics Technology Intresting PPT (20)

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics methods...
Biometrics methods...Biometrics methods...
Biometrics methods...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Biometric
Biometric Biometric
Biometric
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Recently uploaded (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 

Biometrics Technology Intresting PPT

  • 1. Submitted By: NAME - PREETI Roll No -1219531098 BRANCH - ELECTRONICS AND COMMUNICATION & ENGG. March 27, 2015 1 GUIDED BY: VIPIN KUMAR & SUNIL TIWARI.
  • 2. CONTENT Definiton of biometrics Terms of biometrics History of biometrics Biometrics characteristics Biometrics recognition techniques Applications Advantages & Disadvantages conclusion References March27,2015 2
  • 3. Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics . WhaT Is BIOMETRICs ? INTODUCTION March 27, 2015 3
  • 4. Why BIOMETRICs ? March 27, 2015 4 Level of Security
  • 5. hIsTORy March 27, 2015 5 The ancient Egyptians and the Chinese played a large role in biometrics history. Biometrics in practice was a form of finger printing being used in china in the 14th century. Bertillon developed a technique of multiple body measurements . A system called “Indentimat” which measured shape of the hand and length of fingers was introduced in 1970s.
  • 6. ChaRaCTERsTICs Of BIOMETRICs  Any human characteristic can qualify as a biometric characteristic as long as it satisfies the following requirements:- Universality Distinctiveness Permanence Collectability
  • 7. hOW BIOMETRICs WORks ? March 27, 2015 7 No Yes Biometric Data Collection Transmission Quality Sufficient? Ye s Template Match Signal Processing, Feature Extraction, Representation Database Generate Template Decision Confidence? new biometric sample is requested. No All biometric systems works in a four-stage process: Capture Extraction Comparison Match/Non-match
  • 8. A biometric system cAn operAte in two modes 1.Identification: A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. 2.Verification: A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. March 27, 2015 8
  • 9. types of biometrics  Physiological  Face  Fingerprint  Hand geometry  Retina  Iris recognition  Behavioral  Signature  Voice March 27, 2015 9
  • 10. fingerprint recognition  A live acquisition of a person’s fingerprint.  Dots (very small ridges),  Space between two divergent ridges,  Spurs (a notch protruding from a ridge),  Bridges (small ridges joining two longer adjacent ridges), crossovers (two ridges that cross each other).  One of the largest fingerprint recognization system is integrated automated fingerprint identification system, maintained by FBI in the US since 1999. March 27, 2015 10
  • 11. fAce recognition: • Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual. March 27, 2015 11 Database Input face image Extraction of face image Extraction of face features Positive Negative
  • 12. Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers. HAnd geometry March 27, 2015 12
  • 13. March 27, 2015 13 Based on a number of measurements taken from the human hand. The technique is very simple, relatively easy to use, and inexpensive. The physical size of a hand geometry-based system is large.
  • 14. iris recognition March 27, 2015 14 Database Input of face image Detection of eye regions Put iris in focus Recognition of iris pattern accept reject •Iris scanning measures the iris pattern in the colored part of the eye. •Iris recognition uses camera technology with subtle infrared illumination to acquire images of the detail-rich, intricate structures of the iris.
  • 15. Retina Recognition • It analyzing the layer of blood vessels situated at the back of the eye. • The machine takes around ten seconds to shine a “low intensity coherent light source” onto the retina to illuminate the blood vessels. • Once the machine has a copy of the scan, it compares the picture to all the different scans on file, looks for a match, and identifies the individual. • Retina scan machines are fairly expensive. March 27, 2015 15
  • 16. SpeakeR / Voice Recognition Voice or speaker recognition uses vocal characteristics to identify individuals using a pass-phrase. A telephone or microphone can serve as a sensor, March 27, 2015 16
  • 17. SignatuRe VeRification Signature identification: is the analyses of the way a user signs his or her name. This technology examines : • speed. • direction . • pressure of writing. • the angle at which the pen is held. • the number of times the pen is lifted. • the time it takes to write the entire signature. The process used by a biometric system to verify a signature is called dynamic signature verification (DSV). March 27, 2015 17
  • 20. futuRe pRoSpectS Biometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future. Some of the emerging biometrics technologies in the near future are: 1. Ear shape identification. 2. Body odor identification. 3. Body salinity identification. 4. EEG Fingerprint 5. DNA matching March 27, 2015 20
  • 21. Prevent unauthorized access to ATMs, Cellular phones Desktop PCs Criminal identification In automobiles biometrics can replace keys with keyless entry devices Airport security applicationS March 27, 2015 21
  • 22. March 27, 2015 22 Eliminate problems caused by lost IDs or forgotten passwords. Reduce password administration costs. Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN? Replace hard-to-remember passwords which may be shared or observed. AdvAntAges of biometrics Increase security.
  • 23. multimodAl biometrics system It utilize more than one physiological or behavioral characteristic for enrollment, verification or identification. This system takes advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics.
  • 24. disAdvAntAges of biometrics 1. costly. 2. Facial imaging can also hinder accurate identification. 3. The scanning of eye is fearful. 4. Missing body part problem. 5. False acceptances and rejections. 6. The nervousness that people feel about the scanners identification.March 27, 2015 24
  • 25. conclusion Biometric is an emerging area with many opportunities for growth. Decreasing costs and increasing convenience. Increasing both privacy and identity security. Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past. March 27, 2015 25
  • 28. March 27, 2015 28 Any Questions

Editor's Notes

  1. http://www.hhsc.state.tx.us/Consolidation/Consl_home.html. www.rediris.es/cert/doc/ unixsec/node14.html