Enviar pesquisa
Carregar
Everything You Need to Know About Biometrics
•
Transferir como PPTX, PDF
•
5 gostaram
•
4,083 visualizações
Título melhorado com IA
A
anoop80686
Seguir
Tecnologia
Saúde e medicina
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 23
Baixar agora
Recomendados
Biometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
Biometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
Biometrics Technology
Biometrics Technology
lole2
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
Biometric technology
Biometric technology
Madugula Kumar
Biometric's final ppt
Biometric's final ppt
Ankita Vanage
Biometrics
Biometrics
shweta-sharma99
Biometric Technology
Biometric Technology
Adoitya Kaila
Recomendados
Biometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
Biometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
Biometrics Technology
Biometrics Technology
lole2
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
Biometric technology
Biometric technology
Madugula Kumar
Biometric's final ppt
Biometric's final ppt
Ankita Vanage
Biometrics
Biometrics
shweta-sharma99
Biometric Technology
Biometric Technology
Adoitya Kaila
biometrics
biometrics
Akhil Kumar
Biometric slideshare
Biometric slideshare
prachi
Biometrics
Biometrics
Rajan Kumar
Biometrics technology
Biometrics technology
Niharika Gupta
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
Biometric Technology
Biometric Technology
esther_sonu
Biometrics
Biometrics
umertariq12345
Biometrics
Biometrics
meeravali shaik
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
Biometric technology
Biometric technology
Sudip Sadhukhan
Biometrics final ppt
Biometrics final ppt
Vishak Illath veed
Bio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
Biometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
Introduction To Biometrics
Introduction To Biometrics
Abdul Rehman
Biometrics
Biometrics
Presentaionslive.blogspot.com
Biometric Technology
Biometric Technology
twuniversity
Applications of Biometrics in Technology
Applications of Biometrics in Technology
iamsanjayk
biometric technology
biometric technology
RAHUL SRIVASTAVA
Biometrics
Biometrics
Priyanka Sharma
Biometric encryption
Biometric encryption
Divya Kottikkal
Final Report Biometrics
Final Report Biometrics
anoop80686
BSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
Mais conteúdo relacionado
Mais procurados
biometrics
biometrics
Akhil Kumar
Biometric slideshare
Biometric slideshare
prachi
Biometrics
Biometrics
Rajan Kumar
Biometrics technology
Biometrics technology
Niharika Gupta
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
Biometric Technology
Biometric Technology
esther_sonu
Biometrics
Biometrics
umertariq12345
Biometrics
Biometrics
meeravali shaik
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
Biometric technology
Biometric technology
Sudip Sadhukhan
Biometrics final ppt
Biometrics final ppt
Vishak Illath veed
Bio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
Biometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
Introduction To Biometrics
Introduction To Biometrics
Abdul Rehman
Biometrics
Biometrics
Presentaionslive.blogspot.com
Biometric Technology
Biometric Technology
twuniversity
Applications of Biometrics in Technology
Applications of Biometrics in Technology
iamsanjayk
biometric technology
biometric technology
RAHUL SRIVASTAVA
Biometrics
Biometrics
Priyanka Sharma
Biometric encryption
Biometric encryption
Divya Kottikkal
Mais procurados
(20)
biometrics
biometrics
Biometric slideshare
Biometric slideshare
Biometrics
Biometrics
Biometrics technology
Biometrics technology
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Biometric Technology
Biometric Technology
Biometrics
Biometrics
Biometrics
Biometrics
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Biometric technology
Biometric technology
Biometrics final ppt
Biometrics final ppt
Bio-metrics Technology
Bio-metrics Technology
Biometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Introduction To Biometrics
Introduction To Biometrics
Biometrics
Biometrics
Biometric Technology
Biometric Technology
Applications of Biometrics in Technology
Applications of Biometrics in Technology
biometric technology
biometric technology
Biometrics
Biometrics
Biometric encryption
Biometric encryption
Destaque
Final Report Biometrics
Final Report Biometrics
anoop80686
BSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
Biometrics security
Biometrics security
Vuda Sreenivasarao
Biometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big Step
Dan Berlin
A86eseminar on biometrics
A86eseminar on biometrics
Chill Chaithanya
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
A study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
Advanced Biometrics - Microchip implantation in Human
Advanced Biometrics - Microchip implantation in Human
Mv Raam
Web security
Web security
Subhash Basistha
Bio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
Final2
Final2
pooja pal
APA Style
APA Style
Waldemar Santiago
2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練
Abner Huang
Biometrics overview ppt
Biometrics overview ppt
amee yaami
Mind reading computer ppt
Mind reading computer ppt
Tarun tyagi
Biometrics proposition
Biometrics proposition
Ewan Rawlings
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
Vijay Kribpz
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
Navin Kumar
PPT on mind reading computer
PPT on mind reading computer
Anjali Agarwal
Destaque
(20)
Final Report Biometrics
Final Report Biometrics
BSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
Biometrics security
Biometrics security
Biometrics in UX Research: The Next Big Step
Biometrics in UX Research: The Next Big Step
A86eseminar on biometrics
A86eseminar on biometrics
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
A study on biometric authentication techniques
A study on biometric authentication techniques
Advanced Biometrics - Microchip implantation in Human
Advanced Biometrics - Microchip implantation in Human
Web security
Web security
Bio-metrics Authentication Technique
Bio-metrics Authentication Technique
Final2
Final2
APA Style
APA Style
2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練
Biometrics overview ppt
Biometrics overview ppt
Mind reading computer ppt
Mind reading computer ppt
Biometrics proposition
Biometrics proposition
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
PPT on mind reading computer
PPT on mind reading computer
Semelhante a Everything You Need to Know About Biometrics
Biometric
Biometric
Pratish Sardar
Bio metrics
Bio metrics
The_Archer
Biometrics
Biometrics
shweta-sharma99
Biometrics
Biometrics
Shivani Gautam
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
'Femi Akin-Laguda
Biometric technology .pptx
Biometric technology .pptx
vineeth chepuri
Biometric technology .pptx
Biometric technology .pptx
vineeth chepuri
Chapters 3 4
Chapters 3 4
sakshi_20
Bio-Metric Technology
Bio-Metric Technology
shyampariyar
Biometrics
Biometrics
Alan Leewllyn Bivera
Biometrics in banking lara and becky
Biometrics in banking lara and becky
Adam Nickey
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
Biometrics
Biometrics
Sandeep Kamath
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
Mewar University
Bio-Metric Technology
Bio-Metric Technology
shyampariyar
Biometrics Starts
Biometrics Starts
YUSRA FERNANDO
Palm vein Technology
Palm vein Technology
Srinivasa Rao Gurram
palm vein technology
palm vein technology
Srinivasa Rao Gurram
Biometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptx
HabiburRahmanZihad20
Alternatives to Paswords
Alternatives to Paswords
Deepanshu Saini
Semelhante a Everything You Need to Know About Biometrics
(20)
Biometric
Biometric
Bio metrics
Bio metrics
Biometrics
Biometrics
Biometrics
Biometrics
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
Biometric technology .pptx
Biometric technology .pptx
Biometric technology .pptx
Biometric technology .pptx
Chapters 3 4
Chapters 3 4
Bio-Metric Technology
Bio-Metric Technology
Biometrics
Biometrics
Biometrics in banking lara and becky
Biometrics in banking lara and becky
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Biometrics
Biometrics
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
Bio-Metric Technology
Bio-Metric Technology
Biometrics Starts
Biometrics Starts
Palm vein Technology
Palm vein Technology
palm vein technology
palm vein technology
Biometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptx
Alternatives to Paswords
Alternatives to Paswords
Último
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
Pixlogix Infotech
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
UiPathCommunity
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
Mydbops
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
TopCSSGallery
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Alkin Tezuysal
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
ThousandEyes
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
panagenda
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Bernd Ruecker
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Mark Goldstein
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Knoldus Inc.
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
Último
(20)
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
Everything You Need to Know About Biometrics
1.
BIOMETRICS Presented by:
Anoop Sathyan S7 EC
2.
3.
4.
5.
In late 19th
century, distinctiveness of Fingerprint discovered
6.
Much developed in
20th Century
7.
8.
Universality
9.
Distinctiveness
10.
Permanence
11.
Collectability
12.
Practically
13.
Performance
14.
Acceptability
15.
16.
Physiological or Behavioral
based person recognition
17.
Physiological - Fingerprints,
Retinal & Iris Pattern, Hand & Finger Geometry, Facial Recognition
18.
Behavioral – Voice
Patterns, Signature
19.
Details entered into
a Database
20.
Compared with entered
Details
21.
22.
Modes:
23.
Verification Mode
24.
25.
26.
27.
False Match: Biometric
Measurement from two different persons to be from same person
28.
29.
Vein Thermogram
30.
Face Recognition
31.
Fingerprint
32.
Hand & Finger
Geometry
33.
Iris Scan
34.
Retina Scan
35.
Signature Verification
36.
37.
Identical Twins have
same DNA
38.
Benefits:
39.
Accurate
40.
Weakness:
41.
Not in Real-Time
42.
Physical sample should
be taken
43.
44.
When exposed to
IR rays, veins appear black
45.
Merits:
46.
Can be done
only if person is alive
47.
Difficult to forge
48.
49.
Thermogram can also
be used
50.
Merits: Can be
taken from distance
51.
Demerits: Can’t be
used for identification but can be used for verification
52.
53.
Fingerprint of Identical
Twins are different, even it differs from finger to finger
54.
Benefits: Easy to
Use, Cheap, Small Size, Low Power, etc
55.
Weakness: Distorts due
to Ageing, Cuts, Burns, etc
56.
57.
Merits: Very Simple,
Easy to Use, Cheap, etc
58.
Weakness: Lack of
Accuracy, Large size of scanner, etc
59.
60.
Merits:
61.
62.
63.
Even our two
eyes have different Pattern
64.
Scanner reads the
Blood Vessel Pattern
65.
Merits: Error rate
is very less
66.
Weakness: Slow, Can
reveal some Medical Conditions e.g.: Hypertension
67.
68.
Most insecure form
of Biometric Device
69.
Professional Forgers can
fool the system
70.
People may not
sign in identical manner
71.
72.
Two types of
system:
73.
Text-dependent Systems
74.
Text-independent Systems
75.
Demerits: Sensitive to
noise, Not appropriate for large scale application
76.
77.
Intra-class Variations
78.
Distinctiveness
79.
Non-universality
80.
81.
Multiple Biometrics
82.
Multiple Units of
Same Biometric
83.
Multiple Snapshots of
the Same Biometric
84.
Multiple Matchers
85.
86.
There are many
biometric products around, based on different biometric technologies
87.
Shortcomings of biometric
systems due to manufacturers ignorance of security concerns lack of quality control
88.
THANK YOU Any
Questions???
Baixar agora