SlideShare a Scribd company logo
Assignment5 pp
Introduction

• Identifying individuals
• Using unique physical attributes
• Keeping valuables secure
Introduction

• The benefits in businesses
• Other methods aren’t as reliable
• Biometrics is the highest level of security
History of Biometrics

• Origins back to 200 BC
• Alphonse Bertillon, “Bertillonage”
• The introduction of fingerprints
History of Biometrics

• Sir Francis Galtons classification system
• The advancement of biometrics
• Biometric databases are international
Types of Biometrics

• Records basic information about user
• Sensor captures unique traits about ID
• Computer stores data for later use
Types of Biometrics
Physiological:
• Face
• Fingerprint
• Hand
• Iris
• DNA

Behavioral:
• Keystroke
• Signature
• Voice
Assignment5 pp
Assignment5 pp
Assignment5 pp
Assignment5 pp
Assignment5 pp
Assignment5 pp
Biometrics and Practical Application

• NEXUS
 Program for pre-approved travelers
 Iris recognition kiosks
Biometrics and Practical Application

• Faster movement through border security
• Cost reduction for Canada Border Services
• Instructions provided to avoid error
Privacy Concerns

• Biometric information not stored on systems
• Converted into code for later use
Disadvantages

• Software and hardware failures
• User difficulties
• High start-up cost
Limitations

• Physical anomalies cause temporary difficulties
• Research will provide adaptive solutions
Conclusion

• Advantages outweigh disadvantages
• Significant return on investment
• Continued research required

More Related Content

PPTX
Bio-metric Safety engineering in mobile devices
PPTX
Bio metric security
PPT
Ict Biometrics & Authentication
PPTX
Face detection security system & setting raspberry pi (1)
PPT
Biometrics ppt
PPTX
Biometric Technology
PPT
Biometric slideshare
PDF
We Know Your Type
Bio-metric Safety engineering in mobile devices
Bio metric security
Ict Biometrics & Authentication
Face detection security system & setting raspberry pi (1)
Biometrics ppt
Biometric Technology
Biometric slideshare
We Know Your Type

What's hot (20)

PPTX
Slide-show on Biometrics
PPTX
Biometrics For Security Systems
PPTX
Biometrics Pros & cons
PDF
Defending Biometric Security
PPTX
Biometric technology .pptx
PPTX
Biometrics - Then, Now and the Future
PPTX
Biometrics
PPTX
Keystroke dynamics
PPTX
Biometrics Technology, Types & Applications
PPTX
Biometrics
PDF
Vermury-BAT-HIIDE
PPTX
Biometrics
PPTX
Biometrics
PPTX
biometrics
PPT
Biometric Presentation
PDF
Biometric Technology
PPTX
Biometric
PPTX
Biometrics technology
PPT
Biometric Presentation
PPT
070327 biometrics
Slide-show on Biometrics
Biometrics For Security Systems
Biometrics Pros & cons
Defending Biometric Security
Biometric technology .pptx
Biometrics - Then, Now and the Future
Biometrics
Keystroke dynamics
Biometrics Technology, Types & Applications
Biometrics
Vermury-BAT-HIIDE
Biometrics
Biometrics
biometrics
Biometric Presentation
Biometric Technology
Biometric
Biometrics technology
Biometric Presentation
070327 biometrics
Ad

Similar to Assignment5 pp (20)

PPTX
Biometrics
PPTX
Biometrics ppt
PPTX
Biometrics
PPTX
Biometrics
PPTX
Biometrics
PPTX
Biometrics.pptx
PDF
Biometrics system penetration in mobile devices
PDF
B VOC Level-7: Biometric Recognition that aims towards establishing one’s ide...
PPTX
INTRODUCTION TO BIOMETRIC.pptx
PPTX
Security using biometrics
PPTX
biometrics
PDF
MAIN_BIOMETRIC.pdf
PPTX
Biometrics ppt.pptx
PPTX
Biometrics Report ppt
PPTX
Biometrics
PPTX
Biometrics overview ppt
PPTX
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
PDF
Biometrics & Finger print Technology
PPTX
Biometrics and its applications for system Analysis
PPTX
Biometrics and its applications in Medical
Biometrics
Biometrics ppt
Biometrics
Biometrics
Biometrics
Biometrics.pptx
Biometrics system penetration in mobile devices
B VOC Level-7: Biometric Recognition that aims towards establishing one’s ide...
INTRODUCTION TO BIOMETRIC.pptx
Security using biometrics
biometrics
MAIN_BIOMETRIC.pdf
Biometrics ppt.pptx
Biometrics Report ppt
Biometrics
Biometrics overview ppt
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
Biometrics & Finger print Technology
Biometrics and its applications for system Analysis
Biometrics and its applications in Medical
Ad

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
Getting Started with Data Integration: FME Form 101
Digital-Transformation-Roadmap-for-Companies.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
SOPHOS-XG Firewall Administrator PPT.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Big Data Technologies - Introduction.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Programs and apps: productivity, graphics, security and other tools
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25-Week II
“AI and Expert System Decision Support & Business Intelligence Systems”
MIND Revenue Release Quarter 2 2025 Press Release
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks

Assignment5 pp

Editor's Notes

  • #3: Biometrics is the process of identifying an individual using their unique physical attributes of their body.Using your fingerprints, or your iris, biometric readers can quickly, and easily, verify who you are and what access you should have to secure equipment, locations, and data.
  • #4: Access control and security are vital parts of businesses around the world, and advances in technology have made biometrics readily available to help organizations manage their security risks. Other methods of identification can be stolen, copied, or otherwise fraudulently obtained. Using biometric authentication provides a more secure way to identify individuals. This report will examine different types of biometric authentication, the advantages and disadvantages of biometric technology, and how biometrics is used in business today.
  • #5: The origin of biometrics can be traced back to 200 BC. Simple biometrics, like palm and footprint tracings, were used to distinguish different people, usually for crime related incidents. This lead to a 14th century Persian book on using fingerprints to identify people. In the 19th century, Alphonse Bertillon invented anthropometry, a way of using body measurements to identify offenders. This type of biometric was later then called Bertillonage. The largest step in biometrics was taken in the late 19th century when fingerprinting was introduced
  • #6: Many people, including Bertillon and an Argentinian police official helped established fingerprinting, but the largest contributor was Sir Francis Galton. Galton made a classification system that revolutionized biometrics. He recognized that no two fingerprints were the same and published a book on the classification of fingerprinting.Now we use computers to automate and save fingerprints, and large databases across the world contain information on not only fingerprints but also voices, hands, irises and faces.
  • #7: All biometric systems will have 3 similar steps and components. When you enroll, the system will record basic information about you, and a sensor will capture an image of the trait that it will use for identification (ex. fingerprint). A computer will then store this information and use software to compare it to the information provided when you try to access the system again.
  • #8: Biometrics identifiers are classified as either physiological or behavioral. Physiological are related to characteristics of the body, while behavioral relates to patterns of behaviour. Listed are examples of common biometrics used in business today.
  • #15: NEXUS is program for pre-approved travellers entering Canada or the United States at designated airports. It allows members to easily pass through border services using self-serve iris recognition kiosk. NEXUS cardholders stand in front of the kiosk and look into the adjustable camera so that their irises can be photographed and compared to the images they submitted with their applications.
  • #16: Nexus users are able to move through border security quickly. Canada Border Services will see a benefit in labour cost reduction by having to employee less border guards and each location. Users must stand perfectly still and look into the camera from the correct height and distance. The system provides audio and visual direction if a user is not in the correct position.
  • #17: Though biometric technology is becoming commonplace, some users still have questions about privacy. Systems do not store your biometric information; it converted it into a code. Stealing and decoding that data for fraudulent use would be far more difficult than stealing a swipe card, or accessing a password based system.
  • #18: Like any technology, biometric systems have some disadvantages. Despite research and testing, biometric technology can still fail, and because it is relatively new in the marketplace users can have difficulty adjusted to the system. The start-up cost can also be prohibitive, and lead some companies to remain with the password or pin systems they already have in place.
  • #19: There are also limitations on biometrics. A fingerprint scanner may not work if a finger is dirty, or cut. Voice recognition can be disturbed by background noise, or voice that is changed because of a temporary cold or throat infection. Continued research will help find the gaps in biometric authentication, and help enhance the systems.
  • #20: Despite the disadvantages, biometric authentication offers a significant return on investment in terms of security and access control for individuals, organizations, and Governments. The initial start-up cost can be recouped in time and money saved later on. It will be important to continue biometrics research as technology changes, and those who wish to use it fraudulently find ways to overcome the system.