SlideShare uma empresa Scribd logo
1 de 17
 Outline
   Introduction
   Biometrics techniques
   Strengths, and weaknesses
   FAR/FRR
   Major Players
   Summary
What Is Biometrics ?

 Biometrics is the reading of a unique human
 physical attribute as data, which is then
 applied to authenticate a system.
Passwords -“something we know”

Tokens and Cards –”something we possess”
(e.g., ID cards, smart cards, digital certificates)

Biometrics –”something that is part of
               us”
(e.g., retina scan, fingerprints, facial recognition )
WORKING PRINCIPLE OF
BIOMETRIC’S
Biometrics Techniques

 Retina scanning
 Iris scanning
 Fingerprint scanning
 Hand scanning
 Face recognition
 Voice recognition &
  DSV
 Signature recognition
 Keystroke recognition
Retinal
Scanning
        User Looks Into a
         Viewer and
         Focuses on a Point;
         Infrared Light
         Scans Retina

Iris Scanning
       User looks at a camera
       (distance from camera
       increasing rapidly to
       2-3 feet)
User Places Finger on
Scanning Device
User Places Hand on
Device
User Looks at Camera , it is based on the
face geometry
SIGNATURE RECOGNITION




This is done by analyzing the shape,
speed, stroke, pen pressure and timing
information during the act of signing.
Other Techniques

Voice Recognition & DSV

User speaks into a microphone or other
device, such as a telephone handset


Keystroke Recognition
 User types standard sample
 on keyboard
Strengths, and Weakness
          Retina
          Iris

          Fingerprint
          Hand/Finger Geometry
          Face Recognition
          Voice Recognition
          Signature Recognition
          Keystroke Recognition
Technique               Strengths

Retina                  Highly accurate

Iris                    Highly accurate; works with
                        eyeglasses; more acceptable to
                        users than retina scan
Fingerprint             Mature technology; highly
                        accurate; low cost; small size,
                        becoming widely acceptable
Hand/Finger Geometry    accurate and flexible; widely
                        acceptable to users
Face Recognition        Widely acceptable to users; low
                        cost; no direct contact; passive
                        monitoring possible
Voice Recognition       Usable over existing telephone
                        system; good for remote access
                        and monitoring;
Signature Recognition   Widely acceptable to users

Keystroke Recognition   Widely acceptable to users; low
                        cost; uses existing hardware
Technique               Weaknesses
Retina                  Inconvenient for persons with
                        eyeglasses; dislike contact with
                        device and light beam
Iris                    New technology, cost, although
                        this is rapidly changing
Fingerprint             Users can create high FRR; some
                        persons dislike contact with
                        device

Hand/Finger Geometry    User interface is bulky; dislike
                        contact with device
Face Recognition        Face recognition is less accurate
                        than other methods
Voice Recognition       Less accuracy; subject to
                        background noise
Signature Recognition   Less accuracy; not widely used
                        yet, but has potential with PDAs
Keystroke Recognition   Less accuracy;
FAR & FRR

 FAR(False Acceptance rate) – refers to how
 often the system accepts someone it should
 reject

 AND

 FRR(False Rejection Rate) is how often the
 system rejects someone it shouldn’t.
Major Players
    Computer access
    Physical access
    Handheld devices
    Military/Govt. Agencies/DOD
    Financial services
    Hospitals
    Telecommunication
Summary
  As biometric technology advances, the cost of systems
   will decrease.
  At the same time, biometrics systems will become
   increasingly sophisticated and accurate.
  Scientist will physical and behavioral traits will
   increase the usefulness of biometrics.
  The general public will gradually come to accept
   biometric system.

Mais conteúdo relacionado

Mais procurados

How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 

Mais procurados (20)

Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 

Destaque

Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniquesjackofhearty1
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
GWC2012 - Tom Chatfield - Más allá de la diversión
GWC2012 - Tom Chatfield - Más allá de la diversiónGWC2012 - Tom Chatfield - Más allá de la diversión
GWC2012 - Tom Chatfield - Más allá de la diversióngamificationworldcongress
 
GWC14: An Coppens - Taking a fast train down memory lane
GWC14: An Coppens - Taking a fast train down memory laneGWC14: An Coppens - Taking a fast train down memory lane
GWC14: An Coppens - Taking a fast train down memory lanegamificationworldcongress
 
„Stykówka” – miasto na wyciągnięcie smartfona
„Stykówka” – miasto na wyciągnięcie smartfona„Stykówka” – miasto na wyciągnięcie smartfona
„Stykówka” – miasto na wyciągnięcie smartfonaJacek Szlak
 
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...gamificationworldcongress
 
Chapter 8 presentation
Chapter 8 presentationChapter 8 presentation
Chapter 8 presentationmeganmcleod
 
GWC2013 - Bart Briers - The Freakonomics of Fun
GWC2013 - Bart Briers - The Freakonomics of FunGWC2013 - Bart Briers - The Freakonomics of Fun
GWC2013 - Bart Briers - The Freakonomics of Fungamificationworldcongress
 
El consum de productes bàsics baixa per primera
El consum de productes bàsics baixa per primeraEl consum de productes bàsics baixa per primera
El consum de productes bàsics baixa per primeraLaura Rubio Funes
 
Cfsa maximizing small spaces 2 of 3
Cfsa maximizing small spaces 2 of 3Cfsa maximizing small spaces 2 of 3
Cfsa maximizing small spaces 2 of 3ffbroadwell
 
Holistic Large Animal Veterinary Treatments
Holistic Large Animal Veterinary TreatmentsHolistic Large Animal Veterinary Treatments
Holistic Large Animal Veterinary Treatmentsffbroadwell
 
Presentasjon om biler2
Presentasjon om biler2Presentasjon om biler2
Presentasjon om biler2Abdelhay1961
 
Radio advert evaluation
Radio advert evaluationRadio advert evaluation
Radio advert evaluationRickyHart
 

Destaque (20)

Expected Question AITT
Expected Question AITTExpected Question AITT
Expected Question AITT
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
GWC2012 - Tom Chatfield - Más allá de la diversión
GWC2012 - Tom Chatfield - Más allá de la diversiónGWC2012 - Tom Chatfield - Más allá de la diversión
GWC2012 - Tom Chatfield - Más allá de la diversión
 
2011 Palo Alto County Iowa Laborshed Summary
2011 Palo Alto County Iowa Laborshed Summary2011 Palo Alto County Iowa Laborshed Summary
2011 Palo Alto County Iowa Laborshed Summary
 
Seta de-che-aio-09-2012
Seta de-che-aio-09-2012Seta de-che-aio-09-2012
Seta de-che-aio-09-2012
 
GWC14: An Coppens - Taking a fast train down memory lane
GWC14: An Coppens - Taking a fast train down memory laneGWC14: An Coppens - Taking a fast train down memory lane
GWC14: An Coppens - Taking a fast train down memory lane
 
Grunt
GruntGrunt
Grunt
 
„Stykówka” – miasto na wyciągnięcie smartfona
„Stykówka” – miasto na wyciągnięcie smartfona„Stykówka” – miasto na wyciągnięcie smartfona
„Stykówka” – miasto na wyciągnięcie smartfona
 
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
 
C2 bird
C2 birdC2 bird
C2 bird
 
Variation
VariationVariation
Variation
 
Chapter 8 presentation
Chapter 8 presentationChapter 8 presentation
Chapter 8 presentation
 
GWC2013 - Bart Briers - The Freakonomics of Fun
GWC2013 - Bart Briers - The Freakonomics of FunGWC2013 - Bart Briers - The Freakonomics of Fun
GWC2013 - Bart Briers - The Freakonomics of Fun
 
El consum de productes bàsics baixa per primera
El consum de productes bàsics baixa per primeraEl consum de productes bàsics baixa per primera
El consum de productes bàsics baixa per primera
 
Cfsa maximizing small spaces 2 of 3
Cfsa maximizing small spaces 2 of 3Cfsa maximizing small spaces 2 of 3
Cfsa maximizing small spaces 2 of 3
 
Holistic Large Animal Veterinary Treatments
Holistic Large Animal Veterinary TreatmentsHolistic Large Animal Veterinary Treatments
Holistic Large Animal Veterinary Treatments
 
Presentasjon om biler2
Presentasjon om biler2Presentasjon om biler2
Presentasjon om biler2
 
Radio advert evaluation
Radio advert evaluationRadio advert evaluation
Radio advert evaluation
 

Semelhante a biometrics (20)

Introduction to biomectrics_kaushal_shah
Introduction to biomectrics_kaushal_shahIntroduction to biomectrics_kaushal_shah
Introduction to biomectrics_kaushal_shah
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 
GRT.pptx
GRT.pptxGRT.pptx
GRT.pptx
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
gesture recognition!
gesture recognition!gesture recognition!
gesture recognition!
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
VP-II X VascularBiometrics
VP-II X VascularBiometricsVP-II X VascularBiometrics
VP-II X VascularBiometrics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Signature capture technical
Signature capture technicalSignature capture technical
Signature capture technical
 
SEMINAR.pptx
SEMINAR.pptxSEMINAR.pptx
SEMINAR.pptx
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

biometrics

  • 1.
  • 2.  Outline  Introduction  Biometrics techniques  Strengths, and weaknesses  FAR/FRR  Major Players  Summary
  • 3. What Is Biometrics ? Biometrics is the reading of a unique human physical attribute as data, which is then applied to authenticate a system. Passwords -“something we know” Tokens and Cards –”something we possess” (e.g., ID cards, smart cards, digital certificates) Biometrics –”something that is part of us” (e.g., retina scan, fingerprints, facial recognition )
  • 5. Biometrics Techniques  Retina scanning  Iris scanning  Fingerprint scanning  Hand scanning  Face recognition  Voice recognition & DSV  Signature recognition  Keystroke recognition
  • 6. Retinal Scanning  User Looks Into a Viewer and Focuses on a Point; Infrared Light Scans Retina Iris Scanning User looks at a camera (distance from camera increasing rapidly to 2-3 feet)
  • 7. User Places Finger on Scanning Device
  • 8. User Places Hand on Device
  • 9. User Looks at Camera , it is based on the face geometry
  • 10. SIGNATURE RECOGNITION This is done by analyzing the shape, speed, stroke, pen pressure and timing information during the act of signing.
  • 11. Other Techniques Voice Recognition & DSV User speaks into a microphone or other device, such as a telephone handset Keystroke Recognition User types standard sample on keyboard
  • 12. Strengths, and Weakness Retina Iris Fingerprint Hand/Finger Geometry Face Recognition Voice Recognition Signature Recognition Keystroke Recognition
  • 13. Technique Strengths Retina Highly accurate Iris Highly accurate; works with eyeglasses; more acceptable to users than retina scan Fingerprint Mature technology; highly accurate; low cost; small size, becoming widely acceptable Hand/Finger Geometry accurate and flexible; widely acceptable to users Face Recognition Widely acceptable to users; low cost; no direct contact; passive monitoring possible Voice Recognition Usable over existing telephone system; good for remote access and monitoring; Signature Recognition Widely acceptable to users Keystroke Recognition Widely acceptable to users; low cost; uses existing hardware
  • 14. Technique Weaknesses Retina Inconvenient for persons with eyeglasses; dislike contact with device and light beam Iris New technology, cost, although this is rapidly changing Fingerprint Users can create high FRR; some persons dislike contact with device Hand/Finger Geometry User interface is bulky; dislike contact with device Face Recognition Face recognition is less accurate than other methods Voice Recognition Less accuracy; subject to background noise Signature Recognition Less accuracy; not widely used yet, but has potential with PDAs Keystroke Recognition Less accuracy;
  • 15. FAR & FRR FAR(False Acceptance rate) – refers to how often the system accepts someone it should reject AND FRR(False Rejection Rate) is how often the system rejects someone it shouldn’t.
  • 16. Major Players  Computer access  Physical access  Handheld devices  Military/Govt. Agencies/DOD  Financial services  Hospitals  Telecommunication
  • 17. Summary  As biometric technology advances, the cost of systems will decrease.  At the same time, biometrics systems will become increasingly sophisticated and accurate.  Scientist will physical and behavioral traits will increase the usefulness of biometrics.  The general public will gradually come to accept biometric system.

Notas do Editor

  1. Computer Access Securing computer and network access is one of the most common uses of biometric devices. As financial data, medical records and other personal information becomes the target of attack, biometric systems can remove the risk of passwords being shared, stolen or guessed.   Physical Access As security and privacy becomes more important for employers, government, parents and others, biometrics is increasingly being seen as an acceptable solution. Around the world hospitals, military facilities, government buildings and offices are employing biometric access solutions to minimize security threats.   Time and Attendance Biometric systems are being used as a replacement for the traditional punch-card system of clocking-in and clocking-out. Replacing the manual process with biometrics prevents abuse of the system. Time management software provides attendance reports. This solution can be combined with a physical access system to restrict access certain areas without the risk of keys, proximity cards or door access codes being lost or shared.   Handheld devices As handheld device usage increase amongst executives, sales people and health-care professionals, organizations are focusing on how to protect the confidential data on them from falling into the wrong hands. Dynamic signature verification is proving itself as an important tool for securing access to pen-based devices and PDAs.   National Security Governments around the world are beginning to use biometrics to identify citizens and prevent fraud during elections. These systems often involve storing a biometric template, typically a fingerprint scan, on a card that acts as a national identity card.   Telecommunications With the rapid growth of call centers, telephone banking and telephone ordering systems, users are struggling to remember the number of user IDs and PINs required to access these systems. To combat this, voice-recognition systems are being used to provide access control without the need to remember personal access codes.