SlideShare uma empresa Scribd logo
1 de 6
Biometric Technologies
and Applications
Overview
Biometric technologies try to generate computer models of
human physical and behavioural characteristics in order to
reliably identify people. Biometric technologies are
generally considered to be the implementation of pattern
recognition algorithms because they are intended to
identify people.
The ability to improve the reliability and accuracy of the
various types of biometrics systems while testing their
vulnerabilities under different environmental conditions is
critical, since biometrics is an essential part of law
enforcement and security communities.
Key Points
1. Biometrics technologies try to generate
computer models of human physical and
behavioural characteristics in order to reliably
identify people.
2. The word “biometrics” comes from the Greek
words “bios” and “metric” meaning life and
measurement. This translates directly into “life
measurement”.
3. Ethical issues of synthetic Biometrics
· Prevention of undesirable side
effects,
· Targeting areas of social concern in
biometrics,
· Generating several copies of original
information,
· Threats of forgery etc.
Key Points
4. A biometric identification device can
measure-
· Individual biometric information
· Compare the measurement with one
or more stored biometric reference
templates,
· Decide whether they match
sufficiently to indicate that they
represent the same person
· Whether or not identification has been
recognized or verified.
Key Points
5. Examples of different biometrics-
• Face
• Fingerprint
• Voice
• Palmprint
• Hand Geometry
• Iris
• Retina Scan
• Voice
• DNA
• Signatures
• Gait
• Keystroke
Thank You
Brainware University

Mais conteúdo relacionado

Semelhante a Biometric technologies

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...International Center for Biometric Research
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical educationArhind Gautam
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemKishor Singh
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxNareshKireedula
 
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...International Center for Biometric Research
 
Behavioral biometrics (1)
Behavioral biometrics (1)Behavioral biometrics (1)
Behavioral biometrics (1)nishiyath
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docxaulasnilda
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docxRAJU852744
 
Biometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaBiometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaPauline Wamere
 
Biometric technologies and applications
Biometric technologies and applicationsBiometric technologies and applications
Biometric technologies and applicationsBrainware University
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksSaif Salah
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredEnterprise Wired
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionIOSR Journals
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...CSITiaesprime
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Semelhante a Biometric technologies (20)

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
(2007) Image Quality and Minutiae Count Comparison for Genuine and Artificial...
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
(2009) Human-Biometric Sensor Interaction: Impact of Training on Biometric Sy...
 
Behavioral biometrics (1)
Behavioral biometrics (1)Behavioral biometrics (1)
Behavioral biometrics (1)
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
 
Biometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in KenyaBiometric Security Poses Huge Privacy Risks in Kenya
Biometric Security Poses Huge Privacy Risks in Kenya
 
Biometric technologies and applications
Biometric technologies and applicationsBiometric technologies and applications
Biometric technologies and applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric System ‎Concepts and Attacks
Biometric System ‎Concepts and AttacksBiometric System ‎Concepts and Attacks
Biometric System ‎Concepts and Attacks
 
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise WiredWhat Is Biometric Authentication? A Complete Overview | Enterprise Wired
What Is Biometric Authentication? A Complete Overview | Enterprise Wired
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Mais de Brainware University

Foundation of e- commerce-basic introduction
Foundation of e- commerce-basic introductionFoundation of e- commerce-basic introduction
Foundation of e- commerce-basic introductionBrainware University
 
The GMAT- an overall look to the exam
The GMAT-  an overall look to the examThe GMAT-  an overall look to the exam
The GMAT- an overall look to the examBrainware University
 
Career Trend 2020 - Importance of A Degree in Commerce
Career Trend 2020 -  Importance of A Degree in CommerceCareer Trend 2020 -  Importance of A Degree in Commerce
Career Trend 2020 - Importance of A Degree in CommerceBrainware University
 
Radio Imaging Technology - Scopes, Courses, & Careers
Radio Imaging Technology - Scopes, Courses, & CareersRadio Imaging Technology - Scopes, Courses, & Careers
Radio Imaging Technology - Scopes, Courses, & CareersBrainware University
 
General Principles of Applied Epidemiology
General Principles of Applied EpidemiologyGeneral Principles of Applied Epidemiology
General Principles of Applied EpidemiologyBrainware University
 
Advantages of Social Media Advertising
Advantages of Social Media AdvertisingAdvantages of Social Media Advertising
Advantages of Social Media AdvertisingBrainware University
 
How MBA in HR Can Prove To Be A Boon For Your Career
How MBA in HR Can Prove To Be A Boon For Your CareerHow MBA in HR Can Prove To Be A Boon For Your Career
How MBA in HR Can Prove To Be A Boon For Your CareerBrainware University
 
Report on seminar "Electronic C2C (ECE Department)
Report on seminar "Electronic C2C (ECE Department)Report on seminar "Electronic C2C (ECE Department)
Report on seminar "Electronic C2C (ECE Department)Brainware University
 
Brainware university- The emerging careers
Brainware university- The emerging careersBrainware university- The emerging careers
Brainware university- The emerging careersBrainware University
 
Annual sports day events at Brainware University
Annual sports day events at Brainware UniversityAnnual sports day events at Brainware University
Annual sports day events at Brainware UniversityBrainware University
 
Brainware university:The Studentpreneurs the steps towards Idea Hunt
Brainware university:The Studentpreneurs the steps towards Idea HuntBrainware university:The Studentpreneurs the steps towards Idea Hunt
Brainware university:The Studentpreneurs the steps towards Idea HuntBrainware University
 
Histori call at brainware university
Histori call at brainware universityHistori call at brainware university
Histori call at brainware universityBrainware University
 

Mais de Brainware University (20)

Foundation of e- commerce-basic introduction
Foundation of e- commerce-basic introductionFoundation of e- commerce-basic introduction
Foundation of e- commerce-basic introduction
 
The GMAT- an overall look to the exam
The GMAT-  an overall look to the examThe GMAT-  an overall look to the exam
The GMAT- an overall look to the exam
 
Career Trend 2020 - Importance of A Degree in Commerce
Career Trend 2020 -  Importance of A Degree in CommerceCareer Trend 2020 -  Importance of A Degree in Commerce
Career Trend 2020 - Importance of A Degree in Commerce
 
Radio Imaging Technology - Scopes, Courses, & Careers
Radio Imaging Technology - Scopes, Courses, & CareersRadio Imaging Technology - Scopes, Courses, & Careers
Radio Imaging Technology - Scopes, Courses, & Careers
 
General Principles of Applied Epidemiology
General Principles of Applied EpidemiologyGeneral Principles of Applied Epidemiology
General Principles of Applied Epidemiology
 
Advantages of Social Media Advertising
Advantages of Social Media AdvertisingAdvantages of Social Media Advertising
Advantages of Social Media Advertising
 
What is Influencer Marketing?
What is Influencer Marketing?What is Influencer Marketing?
What is Influencer Marketing?
 
Media marketing
Media marketingMedia marketing
Media marketing
 
Media science & its Career Scope
Media science & its Career ScopeMedia science & its Career Scope
Media science & its Career Scope
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
How MBA in HR Can Prove To Be A Boon For Your Career
How MBA in HR Can Prove To Be A Boon For Your CareerHow MBA in HR Can Prove To Be A Boon For Your Career
How MBA in HR Can Prove To Be A Boon For Your Career
 
Career Trend 2020- Biotechnology
Career Trend 2020- BiotechnologyCareer Trend 2020- Biotechnology
Career Trend 2020- Biotechnology
 
Optometry as a Career Choice
Optometry as a Career ChoiceOptometry as a Career Choice
Optometry as a Career Choice
 
Top law colleges in West Bengal
Top law colleges in West BengalTop law colleges in West Bengal
Top law colleges in West Bengal
 
Report on seminar "Electronic C2C (ECE Department)
Report on seminar "Electronic C2C (ECE Department)Report on seminar "Electronic C2C (ECE Department)
Report on seminar "Electronic C2C (ECE Department)
 
Brainware university- The emerging careers
Brainware university- The emerging careersBrainware university- The emerging careers
Brainware university- The emerging careers
 
Annual sports day events at Brainware University
Annual sports day events at Brainware UniversityAnnual sports day events at Brainware University
Annual sports day events at Brainware University
 
Brainware university:The Studentpreneurs the steps towards Idea Hunt
Brainware university:The Studentpreneurs the steps towards Idea HuntBrainware university:The Studentpreneurs the steps towards Idea Hunt
Brainware university:The Studentpreneurs the steps towards Idea Hunt
 
Histori call at brainware university
Histori call at brainware universityHistori call at brainware university
Histori call at brainware university
 
Workshop on industry
Workshop on industryWorkshop on industry
Workshop on industry
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Último (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Biometric technologies

  • 2. Overview Biometric technologies try to generate computer models of human physical and behavioural characteristics in order to reliably identify people. Biometric technologies are generally considered to be the implementation of pattern recognition algorithms because they are intended to identify people. The ability to improve the reliability and accuracy of the various types of biometrics systems while testing their vulnerabilities under different environmental conditions is critical, since biometrics is an essential part of law enforcement and security communities.
  • 3. Key Points 1. Biometrics technologies try to generate computer models of human physical and behavioural characteristics in order to reliably identify people. 2. The word “biometrics” comes from the Greek words “bios” and “metric” meaning life and measurement. This translates directly into “life measurement”. 3. Ethical issues of synthetic Biometrics · Prevention of undesirable side effects, · Targeting areas of social concern in biometrics, · Generating several copies of original information, · Threats of forgery etc.
  • 4. Key Points 4. A biometric identification device can measure- · Individual biometric information · Compare the measurement with one or more stored biometric reference templates, · Decide whether they match sufficiently to indicate that they represent the same person · Whether or not identification has been recognized or verified.
  • 5. Key Points 5. Examples of different biometrics- • Face • Fingerprint • Voice • Palmprint • Hand Geometry • Iris • Retina Scan • Voice • DNA • Signatures • Gait • Keystroke