SlideShare a Scribd company logo
1 of 15
Seminar Presentation
  on Biometrics



           Shivank Garg
           B.Tech(6th Sem)
           IT(1003213047)
What is Biometrics ?
   Biometrics is the science and technology of
  measuring and analyzing biological data. In
  information technology, biometrics refers to
technologies that measure and analyze human
body characteristics, such as DNA, fingerprints,
 eye retinas and irises, voice patterns & facial
      patterns for authentication purpose.
USE OF BIOMETRICS
   Biometrics are used in two major ways : Identification and
    Verification.
   Identification is determining who a person is. It involves taking
    the measured characteristic and trying to find a match in a
    database containing records of people and that characteristic.
    This method can require a large amount of processing power
    and some time if the database is very large. It is often used in
    determining the identity 1of a suspect from crime scene
    information.
   Verification is determining if a person is who they say they are.
    It involves taking the measured characteristic and comparing it
    to the previously recorded data for that person. This method
    requires less processing power and time, and is often used for
    accessing places or information.
Working of Biometrics
Categories of Biometrics
Signature Verification :
Handwriting recognition system's
sensors can include a touch-
sensitive writing surface or a pen
that contains sensors that detect angle, pressure and
direction. The software translates the handwriting into a
graph and recognizes the small changes in a person's
handwriting from day to day and over time.
Fingerprint Analyzing



  Among all the biometric techniques,
fingerprint-based identification is the
oldest method, which has been
successfully used in numerous
applications. Everyone is known to have
unique fingerprints.
Facial Recognition
Facial recognition software uses the
ability to recognize a face and then
pinpoint various features of the face.
Face recognition works by using
a computer to analyze an
individual’s facial structure. The points
measured
include distances between key
characteristics such
as eyes, nose and mouth, angles of key
features
such as the jaw and forehead, and
lengths of
various portions of the face.
Iris recognition

 Iris recognition is a method of biometric
uses pattern recognition techniques
based on high-resolution images of the
irises of an individual's eyes. unique
structures converted into digital
templates, provide mathematical
representations of the iris that yield
unambiguous positive identification of an
individual.
Retinal Scan

 Oldest biometrics as 1930's
research suggested Scanning
involves using a low-intensity light
source and an optical coupler and
can read the patterns at a great
level of accuracy. It does require
the user to remove glasses, place
their eye close to the device, and
focus on a certain point. that the
patterns of blood vessels on the
back of the human eye were unique
to each individual
Speaker Recognition


 Voice authentication, also known
as “speaker verification”, is
defined as the automated
verification of a person’s claimed
identity, based on unique
characteristics of their voice. A
simple microphone is enough to
record the voice, and then most of
the algorithm are analyzing the
voice spectrum. Voice and
speech can be combined to get a
better system:
Advantages of biometrics:
1.   Uniqueness
2.   Universality
3.   Permanence
4.   Measurability
5.   User friendliness
6.   Accuracy
7.   Comfort
Disadvantages of Biometrics
1. Costly.



2. Facial imaging can also hinder accurate
    identifications.

3. Missing body part problem.


4. The scanning of eye is fearful.
Applications of Biometrics
 Banking
 Computer Access

 National Identity

 Electronic Data Transfer (EDT)

 Physical Access

 Telecommunications

 Time & Attendance
CONCLUSION
Biometrics is widely being used because of its
 user friendliness, flexibility in specifying required
 security level and long term stability.

In today's highly connected business
 environments, securing business-critical data is a
 vital concern. One of the most problematic areas
 of security is user authentication. Fortunately, the
 increasing popularity of biometric devices is
 making it easier to ensure that users logging into
 the network are really who they say they are.
Bio shiv

More Related Content

What's hot

What's hot (20)

Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric
Biometric Biometric
Biometric
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics
BiometricsBiometrics
Biometrics
 

Viewers also liked

My CV (short version) ITA
My CV (short version) ITAMy CV (short version) ITA
My CV (short version) ITAJacopo Brogioni
 
Ted Evaluation Assignment
Ted Evaluation AssignmentTed Evaluation Assignment
Ted Evaluation Assignmentjjcmcpherson
 
Ted Evaluation assignment
Ted Evaluation assignmentTed Evaluation assignment
Ted Evaluation assignmentjjcmcpherson
 
Max output presentation
Max output presentationMax output presentation
Max output presentationJames Wendt
 
Arti istilah profil
Arti istilah profilArti istilah profil
Arti istilah profilMus MN
 
Buku panduan si prodeskel pmd
Buku panduan si prodeskel pmdBuku panduan si prodeskel pmd
Buku panduan si prodeskel pmdMus MN
 
Materi pm UN
Materi pm UNMateri pm UN
Materi pm UNmatalih
 
Who runs the world
Who runs the worldWho runs the world
Who runs the worldazmi3456
 
Bahan pembinaanosn fisika
Bahan pembinaanosn fisikaBahan pembinaanosn fisika
Bahan pembinaanosn fisikamatalih
 
Population ecology
Population ecologyPopulation ecology
Population ecologyfaranany
 
Falsafah pendidikan
Falsafah pendidikanFalsafah pendidikan
Falsafah pendidikanJasmine Loo
 

Viewers also liked (17)

Ted Evaluation
Ted EvaluationTed Evaluation
Ted Evaluation
 
10 + 2 presentation tips
10 + 2 presentation tips10 + 2 presentation tips
10 + 2 presentation tips
 
Software y hardware
Software y hardwareSoftware y hardware
Software y hardware
 
My CV (short version) ITA
My CV (short version) ITAMy CV (short version) ITA
My CV (short version) ITA
 
Ted Evaluation Assignment
Ted Evaluation AssignmentTed Evaluation Assignment
Ted Evaluation Assignment
 
Ted Evaluation assignment
Ted Evaluation assignmentTed Evaluation assignment
Ted Evaluation assignment
 
Prediti product presentation
Prediti product presentationPrediti product presentation
Prediti product presentation
 
Max output presentation
Max output presentationMax output presentation
Max output presentation
 
Arti istilah profil
Arti istilah profilArti istilah profil
Arti istilah profil
 
Buku panduan si prodeskel pmd
Buku panduan si prodeskel pmdBuku panduan si prodeskel pmd
Buku panduan si prodeskel pmd
 
Materi pm UN
Materi pm UNMateri pm UN
Materi pm UN
 
Who runs the world
Who runs the worldWho runs the world
Who runs the world
 
Bahan pembinaanosn fisika
Bahan pembinaanosn fisikaBahan pembinaanosn fisika
Bahan pembinaanosn fisika
 
Population ecology
Population ecologyPopulation ecology
Population ecology
 
Falsafah pendidikan
Falsafah pendidikanFalsafah pendidikan
Falsafah pendidikan
 
Socio eonomic status scale in India
Socio eonomic status scale in  IndiaSocio eonomic status scale in  India
Socio eonomic status scale in India
 
Odds ratio
Odds ratioOdds ratio
Odds ratio
 

Similar to Bio shiv

Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 

Similar to Bio shiv (20)

Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometric
Biometric Biometric
Biometric
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
biometrics
biometricsbiometrics
biometrics
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
SEMINAR.pptx
SEMINAR.pptxSEMINAR.pptx
SEMINAR.pptx
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 

Bio shiv

  • 1. Seminar Presentation on Biometrics Shivank Garg B.Tech(6th Sem) IT(1003213047)
  • 2. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns & facial patterns for authentication purpose.
  • 3. USE OF BIOMETRICS  Biometrics are used in two major ways : Identification and Verification.  Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity 1of a suspect from crime scene information.  Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.
  • 5. Categories of Biometrics Signature Verification : Handwriting recognition system's sensors can include a touch- sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction. The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time.
  • 6. Fingerprint Analyzing Among all the biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Everyone is known to have unique fingerprints.
  • 7. Facial Recognition Facial recognition software uses the ability to recognize a face and then pinpoint various features of the face. Face recognition works by using a computer to analyze an individual’s facial structure. The points measured include distances between key characteristics such as eyes, nose and mouth, angles of key features such as the jaw and forehead, and lengths of various portions of the face.
  • 8. Iris recognition Iris recognition is a method of biometric uses pattern recognition techniques based on high-resolution images of the irises of an individual's eyes. unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual.
  • 9. Retinal Scan Oldest biometrics as 1930's research suggested Scanning involves using a low-intensity light source and an optical coupler and can read the patterns at a great level of accuracy. It does require the user to remove glasses, place their eye close to the device, and focus on a certain point. that the patterns of blood vessels on the back of the human eye were unique to each individual
  • 10. Speaker Recognition Voice authentication, also known as “speaker verification”, is defined as the automated verification of a person’s claimed identity, based on unique characteristics of their voice. A simple microphone is enough to record the voice, and then most of the algorithm are analyzing the voice spectrum. Voice and speech can be combined to get a better system:
  • 11. Advantages of biometrics: 1. Uniqueness 2. Universality 3. Permanence 4. Measurability 5. User friendliness 6. Accuracy 7. Comfort
  • 12. Disadvantages of Biometrics 1. Costly. 2. Facial imaging can also hinder accurate identifications. 3. Missing body part problem. 4. The scanning of eye is fearful.
  • 13. Applications of Biometrics  Banking  Computer Access  National Identity  Electronic Data Transfer (EDT)  Physical Access  Telecommunications  Time & Attendance
  • 14. CONCLUSION Biometrics is widely being used because of its user friendliness, flexibility in specifying required security level and long term stability. In today's highly connected business environments, securing business-critical data is a vital concern. One of the most problematic areas of security is user authentication. Fortunately, the increasing popularity of biometric devices is making it easier to ensure that users logging into the network are really who they say they are.