SlideShare a Scribd company logo
1 of 34
[object Object]
[object Object],Biometrics - Which ? - How ? - Where ? - Who ? - When ? Content The Need For Biometrics Biometrics Technologies: Which is Better How It Works Applications of Biometrics Our Customers Evolution of Biometrics
[object Object],[object Object],[object Object],[object Object],Need For Biometrics Why Biometrics ?
[object Object],[object Object],[object Object],[object Object],Need For Biometrics Why Biometrics ?
A Survey Report in BBC News Any Security Procedure Is Only As Strong As The Weakest Link The Users Are The Weakest Link ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source / Reference: BBC News : Please Click This Need For Biometric Why Biometrics ?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Benefits of  Biometrics Why Biometrics ?
"The most successful businessman is one, who holds on to the old just as long as  it is good and, grabs the new just as soon as it is better.“ - Robert P. Vanderpoel. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Benefits of  Biometrics Why Biometrics ?
[object Object],Others: DNA Retina recognition Thermograms Gait Keystroke Ear Geometry Skin reflection Lip motion Dynamic Grip Recognition Common: Fingerprint Recognition Face Recognition Voice Recognition Iris Recognition Hand Geometry Signature verification Which Biometrics ?
Universality   describes how commonly a biometric is found in each individual.  Uniqueness   how well the biometric separates one individual from another.   Permanence   measures how well a biometric resists aging.  Collectability   explains how easy it is to acquire a biometric for measurement.  Performance   indicates the accuracy, speed, and robustness of the system capturing the biometric.   Acceptability   indicates the degree of approval of a technology by the public in everyday life.  Circumvention   is how hard it is to fool the authentication system.  ,[object Object],The following seven parameters have to be analyzed to find out  which biometric  technology would suit your requirement better.  (As Suggested by Dr. A.K Jain, Michigan State University)‏ Which Biometrics ?
[object Object],The Measurement Medium High Medium Medium High Medium Medium Ear Recognition Medium High Low High Low Low Medium Gait Low Low High Low High High High DNA Low Medium Low Low High High High Odor High High Medium High Low High High Facial Thermograph Medium Medium Medium High Medium Medium Medium Hand Geometry Medium Medium Low Medium Low Low Low Keystrokes High Medium Medium Medium Medium Medium Medium Hand Veins High Low High Low Medium High High Retinal Scan Low High Low Medium Low Low Medium Voice Low High Low High Medium Low High Face High Low High Medium High High High Iris Medium Medium High Medium High High Medium Fingerprint Low High Low High Low Low Low Signature Circumvention *  Acceptability   Performance   Collectability   Permanence   Uniqueness  Universality   Which Biometrics:    Which Biometrics ?
Various Biometric Technologies :   Market Distribution in 2007 Which Biometrics ?
April 14, 2010 Biometric Technology ,[object Object],RF  Optical Capacitive Pressure Swipe Touch Swipe Touch Swipe Touch Swipe Touch Which Biometrics ?
April 14, 2010 Biometric Technology Advantages of RF  vs. Capacitive Wider range of Skin density  Works well with the Softest and also the  Hardest finger Skin conditions Not subject to dirt pollution. Thicker coating for better resistance to shocks and abrasion  Complete encapsulation of the sensor Advantages of RF  vs. Optical:  Much cheaper and smaller. Advantages of Swipe vs. Touch: Self-cleaning process = No latent print : don’t leave the key on the lock! Longer image for more data and better performance Legend Scanners Use the Most Reliable and Durable Technology RF - Swipe ,[object Object],Which Biometrics ?
How Biometric Works   ,[object Object],[object Object],[object Object],[object Object],April 14, 2010 Biometric Technology Different Fingerprint Classes How Biometrics ?
Different Matching Paradigms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],April 14, 2010 Biometric Technology How Biometrics ?
[object Object],[object Object],[object Object],April 14, 2010 Biometric Technology Different Ridge Characteristics  How Biometrics ?
The Technology – Step by Step  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],April 14, 2010 Biometric Technology How Biometrics ?
[object Object],April 14, 2010 Biometric Technology Ridge Detection How Biometrics ?
[object Object],[object Object],April 14, 2010 Biometric Technology Image Enhancement and Binarization How Biometrics ?
[object Object],[object Object],April 14, 2010 Biometric Technology Thinning  How Biometrics ?
[object Object],April 14, 2010 Biometric Technology Minutiae Detection  How Biometrics ?
Challenges – Non-linear Distortion April 14, 2010 Legend Systems How Biometrics ?
Challenges – Quality and Intra user variance April 14, 2010 Variation in quality Intra-user variation Biometric Technology How Biometrics ?
Fingerprint scanning  ( Minutiae based approach )‏ How Biometrics ?
Fingerprint Matching Software   Enrollment Process Authentication Process How Biometrics ?
Legend Scanners Allow only Live Fingers - They Cannot be Fooled by any of these
A Brief History of The evolution of Biometric  Fingerprints have been used for a long time… Babylonians used them to sign contracts in 2000BC Fingerprints have been used as signatures in India, Japan and China. The fingerprint was recognized in Ancient China Where it was used to forge contracts. The technique of using fingerprints to identify a person  was developed by Henry Faulds. William James Herschel used fingerprints to identify Indian pension claimants in the 1860s. However he failed to get his approach adopted by the British administration Henry Faulds When Biometrics ?
Juan Vucetich developed the first criminal ID system in Argentina in 1891. Francis Galton made the first attempt at the scientific study of fingerprints and corresponded extensively with Herschel.  He published his book on fingerprints in 1892.  Influenced by Galton’s work Edward Henry reintroduced fingerprints as a means of identification in India in 1893.  In conjunction with two Indian co-workers he devised an ingenious classification system that made handling large fingerprint collections feasible.  He went to found the Fingerprint Bureau at Scotland Yard. A Brief History of The evolution of Biometric  When Biometrics ?
Fingerprints  Important Milestones Crossed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1870 1880s 1903 1904 1924 1933 When Biometrics ?
[object Object],[object Object],Identification Picture of  Will West who was wrongly booked, but was released by the court just because his fingerprints did not match.   Identification Picture of William West Who committed the act and was found many years later Will West is NOT William West   When Biometrics ?
Various Applications of Finger Print Biometrics Where Biometrics ?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Various Applications of Finger Print Biometrics Where Biometrics ?
Few of Our Valued Customers Where Biometrics ?
For More Details Please Contact :   R.Subramanian Consultant – Technical E- mail : subbhu@legendsystems.co.in  Mobile : 09283137349 LEGEND SYSTEMS Pvt LIMITED www.legendsystems.co.in Any Questions Please….

More Related Content

What's hot

Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometrics
BiometricsBiometrics
Biometrics
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 

Viewers also liked

Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEMxiaomi5
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 

Viewers also liked (15)

Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Geoforensic
Geoforensic Geoforensic
Geoforensic
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 

Similar to Biometric Presentation

Similar to Biometric Presentation (20)

BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Seetu
SeetuSeetu
Seetu
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 

Biometric Presentation

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Various Biometric Technologies : Market Distribution in 2007 Which Biometrics ?
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Challenges – Non-linear Distortion April 14, 2010 Legend Systems How Biometrics ?
  • 23. Challenges – Quality and Intra user variance April 14, 2010 Variation in quality Intra-user variation Biometric Technology How Biometrics ?
  • 24. Fingerprint scanning ( Minutiae based approach )‏ How Biometrics ?
  • 25. Fingerprint Matching Software Enrollment Process Authentication Process How Biometrics ?
  • 26. Legend Scanners Allow only Live Fingers - They Cannot be Fooled by any of these
  • 27. A Brief History of The evolution of Biometric Fingerprints have been used for a long time… Babylonians used them to sign contracts in 2000BC Fingerprints have been used as signatures in India, Japan and China. The fingerprint was recognized in Ancient China Where it was used to forge contracts. The technique of using fingerprints to identify a person was developed by Henry Faulds. William James Herschel used fingerprints to identify Indian pension claimants in the 1860s. However he failed to get his approach adopted by the British administration Henry Faulds When Biometrics ?
  • 28. Juan Vucetich developed the first criminal ID system in Argentina in 1891. Francis Galton made the first attempt at the scientific study of fingerprints and corresponded extensively with Herschel. He published his book on fingerprints in 1892. Influenced by Galton’s work Edward Henry reintroduced fingerprints as a means of identification in India in 1893. In conjunction with two Indian co-workers he devised an ingenious classification system that made handling large fingerprint collections feasible. He went to found the Fingerprint Bureau at Scotland Yard. A Brief History of The evolution of Biometric When Biometrics ?
  • 29.
  • 30.
  • 31. Various Applications of Finger Print Biometrics Where Biometrics ?
  • 32.
  • 33. Few of Our Valued Customers Where Biometrics ?
  • 34. For More Details Please Contact : R.Subramanian Consultant – Technical E- mail : subbhu@legendsystems.co.in Mobile : 09283137349 LEGEND SYSTEMS Pvt LIMITED www.legendsystems.co.in Any Questions Please….