SlideShare uma empresa Scribd logo
1 de 18
Biometrics Authentication
      Technology
                   Submitted By:
                    Navin Kumar
                    09EAXEC075
                    Navin Kumar
Three main types of authentication
           available today are:

•   Something you know, like a password, PIN,
    or code.


•   Something you have, like a swipe card, smart
    card, token, or key.


•   Something you are, which is biometrics.
What is a biometric?

   Biometrics are automated methods of identifying a
    person or verifying the identity of a person based on
    a physiological or behavioural characteristic.

   Most definitive, real-time tool available today.

   Can be combined with other tools to form more
    secure, easier to use verification solutions.

   Recognizes individuals definitively.
Characteristics

The common Physical characteristics are:

   Fingerprint
   Face
   Retina
   Iris
   Vein pattern
   Hand and finger geometry
Characteristics
Behavioral characteristics are:

   Keystroke dynamics


   Voice


   Gait


   Signature dynamics
Biometrics Process

                  new biometric sample is requested.
                                                           No

                                  Signal Processing,       Quality
  Biometric       Transmission   Feature Extraction,      Sufficient?
Data Collection                     Representation

                                                                Yes

                                                       Generate Template


                                       Database         Template Match


                                         Yes              Decision
                                                         Confidence?
                                          No
Fingerprint Recognition steps:




                          Database
Face recognition process:

Input face                                     Extraction of
                               Extraction of   face features
  image                         face image




                             Positive

                                                Database
                            Negative
Iris Identification Steps:

Input of face                                           Recognition of
                     Detection of
   image                            Put iris in focus    iris pattern
                     eye regions




                                      Accept

                                                             Database
                                       Reject
Vein Recognition System:

 Input of palm   The output   Generate veins
    picture       picture       structure




                     Match

                                 Database
                  Not match
Signature Verification Process




 the angle at which the pen is held,
 the number of times the pen is lifted,
 the time it takes to write the entire signature,    Biometric
                                                        trait
 the pressure exerted by the person while signing,

 the variations in the speed with which different
  parts of the signature are written.
Aadhaar

One-time standardized Aadhaar enrollment establishes uniqueness of resident via
„biometric de-duplication‟
  • Only one Aadhaar number per eligible individual

Online Authentication is provided by UIDAI
 • Demographic Data (Name, Address, DOB, Gender)
 • Biometric Data (Fingerprint, Iris, Face)

Aadhaar :subject to online authentication is proof of ID

   Aadhaar enrollment / Update =    Aadhaar No. Issued,     “Verification” of KYC
               KYC                 stored in Auth. Server     (Authentication)




                                                                                    13
Applications Area of Biometric


Enterprise and E-Government services

National Security

Airport, Bank, Offices

Recently implemented in ATM, Voting Machine

Internet Banking

Biometric Time Attendance System
Advantages of biometrics
Disadvantages of Biometrics

Costly.


Facial imaging can also hinder accurate identifications.


Missing body part problem.


False acceptances and rejections.


The scanning of eye is fearful.

The nervousness that people feel about the scanners
identification.
Conclusion

                  Not perfect yet.

              Successful applications.

    Decreasing costs and increasing convenience.

    Increasing both privacy and identity security.

         The field of biometrics is evolving.

           Benefit from this technology .
Biometric authentication ppt by navin 6 feb

Mais conteúdo relacionado

Mais procurados

Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Biometric security system
Biometric security systemBiometric security system
Biometric security systemMithun Paul
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologyesther_sonu
 

Mais procurados (20)

Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 

Semelhante a Biometric authentication ppt by navin 6 feb

Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Presentation F7 corporation_en
Presentation F7 corporation_enPresentation F7 corporation_en
Presentation F7 corporation_engaviles01
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof securitySrikanth457
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation alaabebe
 
How AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive OverviewHow AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive OverviewFTx Identity
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasTenet Systems Pvt Ltd
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 

Semelhante a Biometric authentication ppt by navin 6 feb (20)

Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Biomatric
BiomatricBiomatric
Biomatric
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
BIOMETRICS
BIOMETRICSBIOMETRICS
BIOMETRICS
 
Presentation F7 corporation_en
Presentation F7 corporation_enPresentation F7 corporation_en
Presentation F7 corporation_en
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
biomatric system
biomatric systembiomatric system
biomatric system
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Face and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial IntelligenceFace and Voice Recognition- Artificial Intelligence
Face and Voice Recognition- Artificial Intelligence
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
 
How AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive OverviewHow AI Identity Verification Works: A Comprehensive Overview
How AI Identity Verification Works: A Comprehensive Overview
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Biometric
Biometric Biometric
Biometric
 

Mais de Navin Kumar

Fat indian wedding
Fat indian weddingFat indian wedding
Fat indian weddingNavin Kumar
 
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)Navin Kumar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)Navin Kumar
 
Encoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper pptEncoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper pptNavin Kumar
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyNavin Kumar
 
Embedded Systems
Embedded SystemsEmbedded Systems
Embedded SystemsNavin Kumar
 

Mais de Navin Kumar (10)

Fat indian wedding
Fat indian weddingFat indian wedding
Fat indian wedding
 
Axis bank
Axis bankAxis bank
Axis bank
 
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
MICRO-ELECTROMECHANICAL SYSTEM (MEMS)
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)Micro Electromechanical System (MEMS)
Micro Electromechanical System (MEMS)
 
Encoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper pptEncoding stored video for stremming applications ieee paper ppt
Encoding stored video for stremming applications ieee paper ppt
 
Nanogenerator
NanogeneratorNanogenerator
Nanogenerator
 
Image Converter
Image ConverterImage Converter
Image Converter
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Embedded Systems
Embedded SystemsEmbedded Systems
Embedded Systems
 

Último

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Biometric authentication ppt by navin 6 feb

  • 1. Biometrics Authentication Technology Submitted By: Navin Kumar 09EAXEC075 Navin Kumar
  • 2. Three main types of authentication available today are: • Something you know, like a password, PIN, or code. • Something you have, like a swipe card, smart card, token, or key. • Something you are, which is biometrics.
  • 3. What is a biometric?  Biometrics are automated methods of identifying a person or verifying the identity of a person based on a physiological or behavioural characteristic.  Most definitive, real-time tool available today.  Can be combined with other tools to form more secure, easier to use verification solutions.  Recognizes individuals definitively.
  • 4. Characteristics The common Physical characteristics are:  Fingerprint  Face  Retina  Iris  Vein pattern  Hand and finger geometry
  • 5. Characteristics Behavioral characteristics are:  Keystroke dynamics  Voice  Gait  Signature dynamics
  • 6.
  • 7. Biometrics Process new biometric sample is requested. No Signal Processing, Quality Biometric Transmission Feature Extraction, Sufficient? Data Collection Representation Yes Generate Template Database Template Match Yes Decision Confidence? No
  • 9. Face recognition process: Input face Extraction of Extraction of face features image face image Positive Database Negative
  • 10. Iris Identification Steps: Input of face Recognition of Detection of image Put iris in focus iris pattern eye regions Accept Database Reject
  • 11. Vein Recognition System: Input of palm The output Generate veins picture picture structure Match Database Not match
  • 12. Signature Verification Process  the angle at which the pen is held,  the number of times the pen is lifted,  the time it takes to write the entire signature, Biometric trait  the pressure exerted by the person while signing,  the variations in the speed with which different parts of the signature are written.
  • 13. Aadhaar One-time standardized Aadhaar enrollment establishes uniqueness of resident via „biometric de-duplication‟ • Only one Aadhaar number per eligible individual Online Authentication is provided by UIDAI • Demographic Data (Name, Address, DOB, Gender) • Biometric Data (Fingerprint, Iris, Face) Aadhaar :subject to online authentication is proof of ID Aadhaar enrollment / Update = Aadhaar No. Issued, “Verification” of KYC KYC stored in Auth. Server (Authentication) 13
  • 14. Applications Area of Biometric Enterprise and E-Government services National Security Airport, Bank, Offices Recently implemented in ATM, Voting Machine Internet Banking Biometric Time Attendance System
  • 16. Disadvantages of Biometrics Costly. Facial imaging can also hinder accurate identifications. Missing body part problem. False acceptances and rejections. The scanning of eye is fearful. The nervousness that people feel about the scanners identification.
  • 17. Conclusion Not perfect yet. Successful applications. Decreasing costs and increasing convenience. Increasing both privacy and identity security. The field of biometrics is evolving. Benefit from this technology .