Seminar Presentation
  on Biometrics



           Shivank Garg
           B.Tech(6th Sem)
           IT(1003213047)
What is Biometrics ?
   Biometrics is the science and technology of
  measuring and analyzing biological data. In
  information technology, biometrics refers to
technologies that measure and analyze human
body characteristics, such as DNA, fingerprints,
 eye retinas and irises, voice patterns & facial
      patterns for authentication purpose.
USE OF BIOMETRICS
   Biometrics are used in two major ways : Identification and
    Verification.
   Identification is determining who a person is. It involves taking
    the measured characteristic and trying to find a match in a
    database containing records of people and that characteristic.
    This method can require a large amount of processing power
    and some time if the database is very large. It is often used in
    determining the identity 1of a suspect from crime scene
    information.
   Verification is determining if a person is who they say they are.
    It involves taking the measured characteristic and comparing it
    to the previously recorded data for that person. This method
    requires less processing power and time, and is often used for
    accessing places or information.
Working of Biometrics
Categories of Biometrics
Signature Verification :
Handwriting recognition system's
sensors can include a touch-
sensitive writing surface or a pen
that contains sensors that detect angle, pressure and
direction. The software translates the handwriting into a
graph and recognizes the small changes in a person's
handwriting from day to day and over time.
Fingerprint Analyzing



  Among all the biometric techniques,
fingerprint-based identification is the
oldest method, which has been
successfully used in numerous
applications. Everyone is known to have
unique fingerprints.
Facial Recognition
Facial recognition software uses the
ability to recognize a face and then
pinpoint various features of the face.
Face recognition works by using
a computer to analyze an
individual’s facial structure. The points
measured
include distances between key
characteristics such
as eyes, nose and mouth, angles of key
features
such as the jaw and forehead, and
lengths of
various portions of the face.
Iris recognition

 Iris recognition is a method of biometric
uses pattern recognition techniques
based on high-resolution images of the
irises of an individual's eyes. unique
structures converted into digital
templates, provide mathematical
representations of the iris that yield
unambiguous positive identification of an
individual.
Retinal Scan

 Oldest biometrics as 1930's
research suggested Scanning
involves using a low-intensity light
source and an optical coupler and
can read the patterns at a great
level of accuracy. It does require
the user to remove glasses, place
their eye close to the device, and
focus on a certain point. that the
patterns of blood vessels on the
back of the human eye were unique
to each individual
Speaker Recognition


 Voice authentication, also known
as “speaker verification”, is
defined as the automated
verification of a person’s claimed
identity, based on unique
characteristics of their voice. A
simple microphone is enough to
record the voice, and then most of
the algorithm are analyzing the
voice spectrum. Voice and
speech can be combined to get a
better system:
Advantages of biometrics:
1.   Uniqueness
2.   Universality
3.   Permanence
4.   Measurability
5.   User friendliness
6.   Accuracy
7.   Comfort
Disadvantages of Biometrics
1. Costly.



2. Facial imaging can also hinder accurate
    identifications.

3. Missing body part problem.


4. The scanning of eye is fearful.
Applications of Biometrics
 Banking
 Computer Access

 National Identity

 Electronic Data Transfer (EDT)

 Physical Access

 Telecommunications

 Time & Attendance
CONCLUSION
Biometrics is widely being used because of its
 user friendliness, flexibility in specifying required
 security level and long term stability.

In today's highly connected business
 environments, securing business-critical data is a
 vital concern. One of the most problematic areas
 of security is user authentication. Fortunately, the
 increasing popularity of biometric devices is
 making it easier to ensure that users logging into
 the network are really who they say they are.
Bio shiv

More Related Content

PPTX
Biometrics
PPT
PPTX
Biometrics technology
PPTX
Biometrics ppt
PPTX
Slide-show on Biometrics
PPTX
Biometrics
PPTX
Biometric Technology
PPTX
Biometrics technology
Biometrics
Biometrics technology
Biometrics ppt
Slide-show on Biometrics
Biometrics
Biometric Technology
Biometrics technology

What's hot (20)

PPT
Biomatrics
PPT
Biometricstechnology in iot and machine learning
PPTX
Biometrics
PPTX
Biometric authentication system
PPT
Biometric
PPT
Biometrics Technology PPT
PPTX
Biomatrics
PPTX
Biometric Technology
PPTX
Biometrics Security System
PPTX
Biometric technology
PDF
Introduction of Biometrics
PPTX
Biometrics
DOC
Biometrics Technology Seminar Report.
PPTX
Biometric technology
PPTX
Biometrics For Security Systems
PPT
Biometric's final ppt
PPT
Biometric slideshare
PPT
Introduction to Biometric lectures... Prepared by Dr.Abbas
PPTX
Biometrics
Biomatrics
Biometricstechnology in iot and machine learning
Biometrics
Biometric authentication system
Biometric
Biometrics Technology PPT
Biomatrics
Biometric Technology
Biometrics Security System
Biometric technology
Introduction of Biometrics
Biometrics
Biometrics Technology Seminar Report.
Biometric technology
Biometrics For Security Systems
Biometric's final ppt
Biometric slideshare
Introduction to Biometric lectures... Prepared by Dr.Abbas
Biometrics
Ad

Viewers also liked (17)

PPTX
Ted Evaluation
PPTX
10 + 2 presentation tips
PPTX
Software y hardware
PDF
My CV (short version) ITA
PPTX
Ted Evaluation Assignment
PPTX
Ted Evaluation assignment
PPTX
Prediti product presentation
PPT
Max output presentation
DOC
Arti istilah profil
PDF
Buku panduan si prodeskel pmd
PPT
Materi pm UN
PDF
Who runs the world
PPT
Bahan pembinaanosn fisika
PPTX
Population ecology
PPTX
Falsafah pendidikan
PPTX
Socio eonomic status scale in India
PPTX
Odds ratio
Ted Evaluation
10 + 2 presentation tips
Software y hardware
My CV (short version) ITA
Ted Evaluation Assignment
Ted Evaluation assignment
Prediti product presentation
Max output presentation
Arti istilah profil
Buku panduan si prodeskel pmd
Materi pm UN
Who runs the world
Bahan pembinaanosn fisika
Population ecology
Falsafah pendidikan
Socio eonomic status scale in India
Odds ratio
Ad

Similar to Bio shiv (20)

PPT
A study on biometric authentication techniques
PPTX
engineering topic SEMINAR BIOMETRIC2.pptx
PPTX
Biometric technology .pptx
PPTX
Biometric technology .pptx
PPTX
Biomatric
PPTX
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
PPT
Bio-metrics Authentication Technique
PPTX
Biometrics and its applications for system Analysis
PPTX
Biometrics and its applications in Medical
PPT
Biometrics
PPTX
Biometrics Technology
PPT
Biometric
PPTX
Biometric systems last1
PPTX
Biometric systems last1
PPTX
biometrics
PPTX
Biometrics
PPT
Biometrics Technology Intresting PPT
PPT
Biometics technology
PDF
Biometrics Research/Thesis Paper
A study on biometric authentication techniques
engineering topic SEMINAR BIOMETRIC2.pptx
Biometric technology .pptx
Biometric technology .pptx
Biomatric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
Bio-metrics Authentication Technique
Biometrics and its applications for system Analysis
Biometrics and its applications in Medical
Biometrics
Biometrics Technology
Biometric
Biometric systems last1
Biometric systems last1
biometrics
Biometrics
Biometrics Technology Intresting PPT
Biometics technology
Biometrics Research/Thesis Paper

Bio shiv

  • 1. Seminar Presentation on Biometrics Shivank Garg B.Tech(6th Sem) IT(1003213047)
  • 2. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns & facial patterns for authentication purpose.
  • 3. USE OF BIOMETRICS  Biometrics are used in two major ways : Identification and Verification.  Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity 1of a suspect from crime scene information.  Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.
  • 5. Categories of Biometrics Signature Verification : Handwriting recognition system's sensors can include a touch- sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction. The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time.
  • 6. Fingerprint Analyzing Among all the biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Everyone is known to have unique fingerprints.
  • 7. Facial Recognition Facial recognition software uses the ability to recognize a face and then pinpoint various features of the face. Face recognition works by using a computer to analyze an individual’s facial structure. The points measured include distances between key characteristics such as eyes, nose and mouth, angles of key features such as the jaw and forehead, and lengths of various portions of the face.
  • 8. Iris recognition Iris recognition is a method of biometric uses pattern recognition techniques based on high-resolution images of the irises of an individual's eyes. unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual.
  • 9. Retinal Scan Oldest biometrics as 1930's research suggested Scanning involves using a low-intensity light source and an optical coupler and can read the patterns at a great level of accuracy. It does require the user to remove glasses, place their eye close to the device, and focus on a certain point. that the patterns of blood vessels on the back of the human eye were unique to each individual
  • 10. Speaker Recognition Voice authentication, also known as “speaker verification”, is defined as the automated verification of a person’s claimed identity, based on unique characteristics of their voice. A simple microphone is enough to record the voice, and then most of the algorithm are analyzing the voice spectrum. Voice and speech can be combined to get a better system:
  • 11. Advantages of biometrics: 1. Uniqueness 2. Universality 3. Permanence 4. Measurability 5. User friendliness 6. Accuracy 7. Comfort
  • 12. Disadvantages of Biometrics 1. Costly. 2. Facial imaging can also hinder accurate identifications. 3. Missing body part problem. 4. The scanning of eye is fearful.
  • 13. Applications of Biometrics  Banking  Computer Access  National Identity  Electronic Data Transfer (EDT)  Physical Access  Telecommunications  Time & Attendance
  • 14. CONCLUSION Biometrics is widely being used because of its user friendliness, flexibility in specifying required security level and long term stability. In today's highly connected business environments, securing business-critical data is a vital concern. One of the most problematic areas of security is user authentication. Fortunately, the increasing popularity of biometric devices is making it easier to ensure that users logging into the network are really who they say they are.