SlideShare uma empresa Scribd logo
1 de 18
BIOMETRICS.
     By-
           1. Jeevjyot Singh.
            2. Diksha godse.
What is biometrics?
Generally, the study of measurable biological
characteristics. In computer security OR information
technology, biometrics refers to authentication
techniques that rely on measureable physical
characteristics that can be automatically checked.
There are several types of biometric identification scheme:
      Face: the analysis of facial characteristics.

Fingerprint: the analysis of an individual’s unique fingerprints.

Hand geometry: the analysis of the shape of the hand and the length

of the finger.

Retina: the analysis of the capillary vessels located at the back of the

eye.
Iris: the analysis of the colored ring that surrounds the eye.
Signature: the analysis of the way a persons signs his
name.
Vein: the analysis of pattern of veins in the back of the hand
and the wrist.
Voice: the analysis of the tone,pitch,cadence and frequency
of a person’s voice.
Biometric characteristics –
                        this can be divided in two main
classes-

Physiological are              Behavioral are
    related to the shape of       related to the behavior of
    the body. They include        a person. They include-
                                • Typing rhythm
•   Fingerprint                 • Gait
•   Face recognition            • Voice.
•   DNA
•   Palm print
•   Iris recognition
•   Hand geometry
A biometric system can operate in the
following two modes:
       • VERIFICATION- a one to one
         comparison of a captured
         biometric with a stored template
         to verify that the individual is
         who he claims to be. Can be
         done in conjunction with a
         smartcard, username or id
         number.
          ?
• IDENTIFICATION-A one to
 many comparison of the captured
 biometric against a biometric database in
 attempt to identify an unknown individual.
 The identification only succeeds in
 identifying the individual if the comparison
 of the biometric sample to an template in
 the database falls within a previously set
 threshold.



         ?
HOW DOES BIOMETRIC
SYSTEM WORKS:-

  •The first time an individual uses a
  biometric system is called an enrollment.
  During an enrollment, biometric
  information from an individual is stored.

• In subsequent uses, biometric information
  is detected and compared with the
  information stored at the time of
  enrollment.
• The first block (SENSOR) is the interface
  between the real world and the system; it
  has to acquire all the necessary data.
• Most of the time it is an image acquisition
  system; but it can change according to the
  characteristics desired.
• second block performs all the necessary pre-
processing:it has to remove artifacts from
sensor, to enhance the input, to use some kind of
normalisation.
• In the third block necessary features are extracted. This step is an
   important step as the correct features need to be extracted optimal
   way.

• A vector of numbers of or an image with a particular properties is
   used to create a TEMPLATE.

• A template is synthesis of the relevant characteristics extracted from
   the source.

• If a matching phase is being performed, the obtained template is
   passed to a matcher that compares it with other existing
   templates,estimating the distance between them using any
   algorithm.

• The matching program will analyze the template with the input. This
   will then be the output for any specified use or purpose.
Biometrics In
   Detail.
Finger-scan

• A live acquisition of
  a person’s
  fingerprint.
• Image Acquisition
  Image Processing
     Template
  Creation
  Template Matching
• Acquisition
  Devices:
   – Glass plate
   – Electronic
   – Ultrasound
Fingerprint SWAD

• Strengths:
   – Fingerprints don’t change over
      time
   – Widely believed fingerprints are
      unique
• Weaknesses:
   – Scars
• Attacks:
   – Surgery to alter or remove prints
   – Finger Decapitation
   – “Gummy fingers”
   – Corruption of the database
• Defenses:
   – Measure physical properties of a
      live finger (pulse)
Iris Scan


 • Image Acquisition
   Image Processing
      Template
   Creation
   Template Matching
 • Uses to date:
    – Physical access
      control
    – Computer
      authentication
Iris Scan: SWAD


 • Strengths:
    – 300+ characteristics; 200 required for match
 • Weaknesses:
    – Fear
    – Discomfort
    – Proprietary acquisition device
    – Algorithms may not work on all individuals
    – No large databases
 • Attacks:
    – Surgery (Minority Report )
 • Defenses:
Hand Scan


• Typical systems measure 90
  different features:
   – Overall hand and finger
      width
   – Distance between joints
   – Bone structure
• Strengths:
   – No negative connotations
      – non-intrusive
   – Reasonably robust
      systems
• Weaknesses:
   – Accuracy is limited; can
      only be used for 1-to-1
      verification
   – Bulky scanner
Biometric applications

  I.    Physical Access.

  II.   Pc And Control Network.

  III. Time And Attendance.

  IV. Logical Access

  V. Financial Security.

  VI. Law Enforcement.

  VII. Immigrations And Airports.
CONCLUSION
  Technology is growing rapidly, but at the same time
  security breaches and transaction fraud are also in the
  increase in the world over .All agencies that are in
  need of security have adopted biometrics.

 “THE FUTURE DEPENDS UPON WHAT WE DO IN
  THE PRESENT”
                -MAHATMA GANDHI.

Let us hope for better and safe future.
THANK YOU!

Mais conteúdo relacionado

Mais procurados

Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
Basra University, Iraq
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
CTIN
 

Mais procurados (20)

Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structure
 
Biometric
BiometricBiometric
Biometric
 
Biometric authenticatiion technology
Biometric authenticatiion technologyBiometric authenticatiion technology
Biometric authenticatiion technology
 
Biometrics in Security
Biometrics in SecurityBiometrics in Security
Biometrics in Security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics and its hacking
Biometrics and its hackingBiometrics and its hacking
Biometrics and its hacking
 
Bio-Metrics through finger print
Bio-Metrics through finger print Bio-Metrics through finger print
Bio-Metrics through finger print
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 
Biometrics - automatic identification of individuals
Biometrics - automatic identification of individualsBiometrics - automatic identification of individuals
Biometrics - automatic identification of individuals
 
Pattern recognition on line signature
Pattern recognition on line signaturePattern recognition on line signature
Pattern recognition on line signature
 
Biometrics (1)
Biometrics (1)Biometrics (1)
Biometrics (1)
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 

Destaque (6)

Présentation allah
Présentation allahPrésentation allah
Présentation allah
 
Union Budget 2012-13 Budget final
Union Budget 2012-13 Budget  finalUnion Budget 2012-13 Budget  final
Union Budget 2012-13 Budget final
 
Destrucció d'hàbitats
Destrucció d'hàbitatsDestrucció d'hàbitats
Destrucció d'hàbitats
 
Dear compiler please don't be my nanny v2
Dear compiler  please don't be my nanny v2Dear compiler  please don't be my nanny v2
Dear compiler please don't be my nanny v2
 
Simplest ai trick gdc2013 dino v2 (1)
Simplest ai trick gdc2013 dino v2 (1)Simplest ai trick gdc2013 dino v2 (1)
Simplest ai trick gdc2013 dino v2 (1)
 
The polling problem
The polling problemThe polling problem
The polling problem
 

Semelhante a Biometrics

CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 

Semelhante a Biometrics (20)

Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Biometric
Biometric Biometric
Biometric
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biomatric
BiomatricBiomatric
Biomatric
 

Último

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Biometrics

  • 1. BIOMETRICS. By- 1. Jeevjyot Singh. 2. Diksha godse.
  • 2. What is biometrics? Generally, the study of measurable biological characteristics. In computer security OR information technology, biometrics refers to authentication techniques that rely on measureable physical characteristics that can be automatically checked. There are several types of biometric identification scheme:  Face: the analysis of facial characteristics. Fingerprint: the analysis of an individual’s unique fingerprints. Hand geometry: the analysis of the shape of the hand and the length of the finger. Retina: the analysis of the capillary vessels located at the back of the eye.
  • 3. Iris: the analysis of the colored ring that surrounds the eye. Signature: the analysis of the way a persons signs his name. Vein: the analysis of pattern of veins in the back of the hand and the wrist. Voice: the analysis of the tone,pitch,cadence and frequency of a person’s voice.
  • 4. Biometric characteristics – this can be divided in two main classes- Physiological are Behavioral are related to the shape of related to the behavior of the body. They include a person. They include- • Typing rhythm • Fingerprint • Gait • Face recognition • Voice. • DNA • Palm print • Iris recognition • Hand geometry
  • 5. A biometric system can operate in the following two modes: • VERIFICATION- a one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smartcard, username or id number. ?
  • 6. • IDENTIFICATION-A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. The identification only succeeds in identifying the individual if the comparison of the biometric sample to an template in the database falls within a previously set threshold. ?
  • 7. HOW DOES BIOMETRIC SYSTEM WORKS:- •The first time an individual uses a biometric system is called an enrollment. During an enrollment, biometric information from an individual is stored. • In subsequent uses, biometric information is detected and compared with the information stored at the time of enrollment.
  • 8. • The first block (SENSOR) is the interface between the real world and the system; it has to acquire all the necessary data. • Most of the time it is an image acquisition system; but it can change according to the characteristics desired. • second block performs all the necessary pre- processing:it has to remove artifacts from sensor, to enhance the input, to use some kind of normalisation.
  • 9. • In the third block necessary features are extracted. This step is an important step as the correct features need to be extracted optimal way. • A vector of numbers of or an image with a particular properties is used to create a TEMPLATE. • A template is synthesis of the relevant characteristics extracted from the source. • If a matching phase is being performed, the obtained template is passed to a matcher that compares it with other existing templates,estimating the distance between them using any algorithm. • The matching program will analyze the template with the input. This will then be the output for any specified use or purpose.
  • 10. Biometrics In Detail.
  • 11. Finger-scan • A live acquisition of a person’s fingerprint. • Image Acquisition Image Processing Template Creation Template Matching • Acquisition Devices: – Glass plate – Electronic – Ultrasound
  • 12. Fingerprint SWAD • Strengths: – Fingerprints don’t change over time – Widely believed fingerprints are unique • Weaknesses: – Scars • Attacks: – Surgery to alter or remove prints – Finger Decapitation – “Gummy fingers” – Corruption of the database • Defenses: – Measure physical properties of a live finger (pulse)
  • 13. Iris Scan • Image Acquisition Image Processing Template Creation Template Matching • Uses to date: – Physical access control – Computer authentication
  • 14. Iris Scan: SWAD • Strengths: – 300+ characteristics; 200 required for match • Weaknesses: – Fear – Discomfort – Proprietary acquisition device – Algorithms may not work on all individuals – No large databases • Attacks: – Surgery (Minority Report ) • Defenses:
  • 15. Hand Scan • Typical systems measure 90 different features: – Overall hand and finger width – Distance between joints – Bone structure • Strengths: – No negative connotations – non-intrusive – Reasonably robust systems • Weaknesses: – Accuracy is limited; can only be used for 1-to-1 verification – Bulky scanner
  • 16. Biometric applications I. Physical Access. II. Pc And Control Network. III. Time And Attendance. IV. Logical Access V. Financial Security. VI. Law Enforcement. VII. Immigrations And Airports.
  • 17. CONCLUSION Technology is growing rapidly, but at the same time security breaches and transaction fraud are also in the increase in the world over .All agencies that are in need of security have adopted biometrics. “THE FUTURE DEPENDS UPON WHAT WE DO IN THE PRESENT” -MAHATMA GANDHI. Let us hope for better and safe future.