SlideShare uma empresa Scribd logo
1 de 9
Impact of ICT on Society ,[object Object],[object Object],Prepared By : Abdullah Afeeq b. Imam Jurjani Date  : 29/05/2007
Authentication   is a process where users verify that they say they are. The user who attempts to perform functions in a system is in fact the user who is authorised to do so. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Source Of Resources Internet 1. http://www.biometrics.org 2.  http://www.findbiometrics.com 3.  http://www.biometricgroup.com/   4.http://www.galwayeducationcentre.ie/athenry/a_brief_history_of_biometrics.htm  Magazines Smart Cards Meet Biometrics,” Card Technology (September/October 1996), p 30

Mais conteúdo relacionado

Mais procurados

Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar promaproma_goswami
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 

Mais procurados (20)

Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Ai
AiAi
Ai
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Cover page
Cover pageCover page
Cover page
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric
Biometric Biometric
Biometric
 

Destaque

Public Opinion On Eu V3
Public Opinion On Eu V3Public Opinion On Eu V3
Public Opinion On Eu V3bduverneuil
 
GO Sensu Term and Taxonomy (Apr 2007)
GO  Sensu Term and Taxonomy  (Apr 2007)GO  Sensu Term and Taxonomy  (Apr 2007)
GO Sensu Term and Taxonomy (Apr 2007)Chris Mungall
 
GO Sensu Terms and Taxonomy -- Apr 2007
GO Sensu Terms and Taxonomy -- Apr 2007GO Sensu Terms and Taxonomy -- Apr 2007
GO Sensu Terms and Taxonomy -- Apr 2007Chris Mungall
 
Uberon EBI industry workshop
Uberon EBI industry workshopUberon EBI industry workshop
Uberon EBI industry workshopChris Mungall
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
How to Install Windows 10, 8 and 7 Without USB Drive or DVD
How to Install Windows 10, 8 and 7 Without USB Drive or DVDHow to Install Windows 10, 8 and 7 Without USB Drive or DVD
How to Install Windows 10, 8 and 7 Without USB Drive or DVDViney Dhiman
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7elboob2025
 
Installing windows 10
Installing windows 10Installing windows 10
Installing windows 10clcewing
 

Destaque (13)

Presentation1
Presentation1Presentation1
Presentation1
 
Ict Hacking
Ict   HackingIct   Hacking
Ict Hacking
 
Public Opinion On Eu V3
Public Opinion On Eu V3Public Opinion On Eu V3
Public Opinion On Eu V3
 
GO Sensu Term and Taxonomy (Apr 2007)
GO  Sensu Term and Taxonomy  (Apr 2007)GO  Sensu Term and Taxonomy  (Apr 2007)
GO Sensu Term and Taxonomy (Apr 2007)
 
Biometric
 Biometric Biometric
Biometric
 
GO Sensu Terms and Taxonomy -- Apr 2007
GO Sensu Terms and Taxonomy -- Apr 2007GO Sensu Terms and Taxonomy -- Apr 2007
GO Sensu Terms and Taxonomy -- Apr 2007
 
Uberon PAG 2013
Uberon PAG 2013Uberon PAG 2013
Uberon PAG 2013
 
Uberon EBI industry workshop
Uberon EBI industry workshopUberon EBI industry workshop
Uberon EBI industry workshop
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
How to Install Windows 10, 8 and 7 Without USB Drive or DVD
How to Install Windows 10, 8 and 7 Without USB Drive or DVDHow to Install Windows 10, 8 and 7 Without USB Drive or DVD
How to Install Windows 10, 8 and 7 Without USB Drive or DVD
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7
 
Installing windows 10
Installing windows 10Installing windows 10
Installing windows 10
 
Windows 7 installation ppt
Windows 7 installation pptWindows 7 installation ppt
Windows 7 installation ppt
 

Semelhante a Biometric

A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICIJERA Editor
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxdanas19
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometricszia balti
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBahaa Abdulhadi
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMRoy Awais
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE Roy Awais
 

Semelhante a Biometric (20)

Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRICA SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
A SECURITY BASED VOTING SYSTEMUSING BIOMETRIC
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Biometric

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Source Of Resources Internet 1. http://www.biometrics.org 2. http://www.findbiometrics.com 3. http://www.biometricgroup.com/ 4.http://www.galwayeducationcentre.ie/athenry/a_brief_history_of_biometrics.htm Magazines Smart Cards Meet Biometrics,” Card Technology (September/October 1996), p 30