SlideShare uma empresa Scribd logo
1 de 13
Biometrics
Zabrenna Grffiths
Fingerprints
 A fingerprint is a series of dark lines that represent the high
  portions and valleys of friction ridge skin.
 This technology uses the fact that no two people have
  identical fingerprints.
 Fingerprint recognition devices create an image of these
  prints and compare them with fingerprints that are already on
  file on the system.
 A variety of sensor types-optical, thermal, capacitive and
  ultrasound- are used for collecting the digital image of a
  fingerprint. Optical scanners take a picture of the image and
  are the most common hardware used. Other devices use pixel
  value, high frequency devices that detect the change in light
  reflection or the difference in temperature to produce an
  image.
Face Recognition
 Facial recognition software uses the ability to recognize a
  face and then pinpoint various features of the face. Every
  face has distinguishable landmarks, peaks and valleys, that
  make up facial features. These are measured by the
  software.
 Face recognition works by using a computer to analyze an
  individual’s facial structure. The points measured include
  distances between key characteristics such as eyes, nose
  and mouth, angles of key features such as the jaw and
  forehead, and lengths of various portions of the face.
 With this information, the program creates a unique
  template, called a face print, using all of the numerical
  data. This face print may then be compared to a database
  of facial images to identify the subject
Speaker Recognition
• This is a type of biometric input that uses an individual’s
  voice for recognition purposes.
• It comes in two forms: identification and verification
• Speech identification recognizes who is speaking by using
  the specific information included in speech waves to verify
  identities being claimed by people accessing systems .
• Speech verification utilizes a computer program to
  anticipate certain specific patterns of speech and then
  verify that those patterns in a voice recording or live person
  speaking.
• Text dependent systems requires predetermined utterances
  while text independent do not
Iris Recognition
• The iris is a muscle in the eye that controls the size of
  the pupil
• This system is able to localise the circular iris and the
  pupil region excluding other regions around the eyes.
  It then analyzes the random structure of the iris
• The iris is unique because there is a certain degree of
  randomness in their structure
• First, a black-and-white video camera zooms in on
  the iris and records a sharp image of it. The iris is lit
  by a low-level light to aid the camera in focusing.
Hand and Finger Geometry
• Hands and fingers are unique but not as unique as other
  traits (fingerprints, irises). Because of this they are used
  to authenticate users rather than identify them.
• Biometric hand recognition systems measure and analyze
  the structure, shape and proportions of the hand such as
  length, width and thickness of hand, fingers and joints;
  creases and ridges on the skin’s surface.
• The user places the palm of his or her hand on the
  reader's surface and aligns it with the guidance pegs on
  the device. The device captures the image using a camera
  and light and checks its database for verification of the
  user.
Signature Verification
• This analyzes the way a person signs their name.
  Signature characteristics are absolutely unique to
  an individual and virtually impossible to
  duplicate.
• Features analyzed include speed, acceleration,
  deceleration, stroke sequencing and length, pen
  pressure and signature shape.
• In signature verification the signature in question
  is scrutinized and compared against a reference
  signature kept on file to determine the
  signature's genuineness.
Biometrics

Mais conteúdo relacionado

Mais procurados

Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationIJCSES Journal
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemThe_Archer
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionMesbah Uddin Khan
 

Mais procurados (20)

Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Chapter 5 - input ( IT )
Chapter 5 - input ( IT )Chapter 5 - input ( IT )
Chapter 5 - input ( IT )
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Iris scan.ppt 1
Iris scan.ppt 1Iris scan.ppt 1
Iris scan.ppt 1
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Hand Gesture recognition
Hand Gesture recognitionHand Gesture recognition
Hand Gesture recognition
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classification
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Gesture recognition1
Gesture recognition1Gesture recognition1
Gesture recognition1
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 

Semelhante a Biometrics

Semelhante a Biometrics (20)

Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Seminar
SeminarSeminar
Seminar
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Mais de VerronBriscoe

Mais de VerronBriscoe (12)

Logic gates
Logic gatesLogic gates
Logic gates
 
Video confrencing
Video confrencingVideo confrencing
Video confrencing
 
Telemarketing2
Telemarketing2Telemarketing2
Telemarketing2
 
Telecommuting
TelecommutingTelecommuting
Telecommuting
 
Outline trends in tech (part1)
Outline   trends in tech (part1)Outline   trends in tech (part1)
Outline trends in tech (part1)
 
New robotics
New roboticsNew robotics
New robotics
 
Expert systems
Expert systemsExpert systems
Expert systems
 
Expert system
Expert systemExpert system
Expert system
 
Current trends in technology
Current trends in technologyCurrent trends in technology
Current trends in technology
 
Current trends in technology 7
Current trends in technology 7Current trends in technology 7
Current trends in technology 7
 
Computers in banking
Computers in bankingComputers in banking
Computers in banking
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 

Biometrics

  • 2. Fingerprints  A fingerprint is a series of dark lines that represent the high portions and valleys of friction ridge skin.  This technology uses the fact that no two people have identical fingerprints.  Fingerprint recognition devices create an image of these prints and compare them with fingerprints that are already on file on the system.  A variety of sensor types-optical, thermal, capacitive and ultrasound- are used for collecting the digital image of a fingerprint. Optical scanners take a picture of the image and are the most common hardware used. Other devices use pixel value, high frequency devices that detect the change in light reflection or the difference in temperature to produce an image.
  • 3.
  • 4. Face Recognition  Facial recognition software uses the ability to recognize a face and then pinpoint various features of the face. Every face has distinguishable landmarks, peaks and valleys, that make up facial features. These are measured by the software.  Face recognition works by using a computer to analyze an individual’s facial structure. The points measured include distances between key characteristics such as eyes, nose and mouth, angles of key features such as the jaw and forehead, and lengths of various portions of the face.  With this information, the program creates a unique template, called a face print, using all of the numerical data. This face print may then be compared to a database of facial images to identify the subject
  • 5.
  • 6. Speaker Recognition • This is a type of biometric input that uses an individual’s voice for recognition purposes. • It comes in two forms: identification and verification • Speech identification recognizes who is speaking by using the specific information included in speech waves to verify identities being claimed by people accessing systems . • Speech verification utilizes a computer program to anticipate certain specific patterns of speech and then verify that those patterns in a voice recording or live person speaking. • Text dependent systems requires predetermined utterances while text independent do not
  • 7.
  • 8. Iris Recognition • The iris is a muscle in the eye that controls the size of the pupil • This system is able to localise the circular iris and the pupil region excluding other regions around the eyes. It then analyzes the random structure of the iris • The iris is unique because there is a certain degree of randomness in their structure • First, a black-and-white video camera zooms in on the iris and records a sharp image of it. The iris is lit by a low-level light to aid the camera in focusing.
  • 9.
  • 10. Hand and Finger Geometry • Hands and fingers are unique but not as unique as other traits (fingerprints, irises). Because of this they are used to authenticate users rather than identify them. • Biometric hand recognition systems measure and analyze the structure, shape and proportions of the hand such as length, width and thickness of hand, fingers and joints; creases and ridges on the skin’s surface. • The user places the palm of his or her hand on the reader's surface and aligns it with the guidance pegs on the device. The device captures the image using a camera and light and checks its database for verification of the user.
  • 11.
  • 12. Signature Verification • This analyzes the way a person signs their name. Signature characteristics are absolutely unique to an individual and virtually impossible to duplicate. • Features analyzed include speed, acceleration, deceleration, stroke sequencing and length, pen pressure and signature shape. • In signature verification the signature in question is scrutinized and compared against a reference signature kept on file to determine the signature's genuineness.