SlideShare a Scribd company logo
“BIOMETRICS”
Introduction
   Biometrics is the science and technology of measuring
    and analyzing biological data.

   It measure and analyze human body characteristics,
    such as DNA, fingerprints, eye retinas and irises, voice
    patterns, facial patterns and hand measurements,
    for authentication purposes.
Biometric devices consist of:
 A reader or scanning device
 Software that converts the scanned
  information into digital form and
  compares match points
 A database that stores the biometric
  data for comparison
Biometrics can be sorted into
two classes:
 Categories of BIOMETRICS
 Physiological
 Examples- face, fingerprints, hand
  geometry and iris Recognition, DNA.
 Behavioral
 Examples-signature and voice.
Basic characteristics of
BIOMETRIC Technologies:
   Universality: Every person should have the
    characteristic. People who are mute or without
    a fingerprint will need to be accommodated in
    some way.

   Uniqueness: Generally, no two people have
    identical characteristics. However, identical
    twins are hard to distinguish.

   Permanence: The characteristics should not
    vary with time. A person's face, for example,
    may change with age.
   Collectibility: The characteristics must be easily
    collectible and measurable.

   Performance: The method must deliver accurate
    results under varied environmental circumstances.

   Acceptability: The general public must accept the
    sample collection routines. Nonintrusive methods are
    more acceptable.

   Circumvention: The technology should be difficult to
    deceive
Biometrics
Working principle:
   Biometric devices consist of a reader or
    scanning device software that converts
    the gathered information into digital
    form, and a database that stores the
    biometric data with comparison with
    existing records.
Modes
   Enrollment Mode.
   Verification Mode.

   Enrollment Mode:
    A sample of the biometric trait is
    captured, processed by a computer, and
    stored for later comparison.

   Verification Mode:
    In this mode biometric system authenticates a
    person’s claimed identity from their previously
    enrolled pattern.
Biometric Modalities:
Fingerprint Recognition:

   For fingerprint Recognition look at:
   Friction ridges
   Core
   Crossover
   Delta
   Island
   Ridge Ending
   Pore
Biometrics
Biometrics
Face Recognition
 It involves recognizing people by there:
 Facial features.
 Face geometry.


   Principle:
    Analysis of unique shape, pattern and
    positioning of facial features.
Biometrics
Voice Recognition:
 Voice recognition is not the same as
  speech recognition, it is speaker
  recognition.
 Considered both physiological and
  behavioral.
 Popular and low-cost, but less accurate
  and sometimes lengthy enrollment.
Biometrics
Styles of spoken input:
 These system have three styles of
  spoken inputs:
 Text Dependent
 Text prompted
 Text Independent
Iris Recognition:
 It is the colored area of the eye that
  surrounds the pupil.
 It is a protected internal organ whose
  random texture is stable throughout life.
 The iris patterns are obtained through a
  video-based image acquisition system .
Iris Images:
Signature Verification:
   Static/Off-line: the conventional way.

   Dynamic/On-line: using electronically
    instrumented device.

   Principle:
    The movement of the pen during the signing
    process rather than the static image of the
    signature. Many aspects of the signature in
    motion can be studied, such as pen pressure,
    the sound the pen makes.
Smart Cards:
   These are digital security pocket-sized cards
    with embedded integrated circuits which can
    process data.

   It can be used for identification,authentication,
    and data storage.

   It can also be used as a medium to provide a
    means of effecting business transactions in a
    flexible, secure, standard way with minimal
    human intervention.
Encryption Systems :
   Transforming information using an
    algorithm to make it unreadable to
    anyone except those possessing special
    knowledge, usually referred to as a key.

   Encryption has long been used by
    militaries and governments to facilitate
    secret communication.
Performance of BIOMETRICS
:
   False accept rate or false match rate (FAR
    or FMR)

   False reject rate or false non-match rate
    (FRR or FNMR)

   Relative operating characteristic (ROC)

   Equal error rate or crossover error rate
    (EER or CER)
Advantages of
Biometrics:
   Biometric identification can provide extremely
    accurate, secured access to information;
    fingerprints, retinal and iris scans produce absolutely
    unique data sets when done properly.

   Current methods like password verification have
    many problems (people write them down, they forget
    them, they make up easy-to-hack passwords) .

   Automated biometric identification can be done very
    rapidly and uniformly, with a minimum of training .

   Your identity can be verified without resort to
    documents that may be stolen, lost or altered.
Disadvantages of
BIOMETRICS:
   The finger print of those people working in Chemical
    industries are often affected. Therefore these companies
    should not use the finger print mode of authentication.

   It is found that with age, the voice of a person differs. Also
    when the person has flu or throat infection the voice
    changes or if there there are too much noise in the
    environment this method maynot authenticate correctly.
    Therefore this method of verification is not workable all
    the time

   For people affected with diabetes, the eyes get affected
    resulting in differences.

   Biometrics is an expensive security solution.
BIOMETRICS SECURITY:
   Security personnel look for biometric
    data that does not change over the
    course of your life; that is, they look for
    physical   characteristics      that  stay
    constant and that are difficult to fake or
    change on purpose
THANK YOU

More Related Content

PPT
Biometric's final ppt
PPTX
Biometrics Technology, Types & Applications
PPT
A study on biometric authentication techniques
PPTX
Biometrics
PPTX
Biometric technology
PPTX
Biometrics
PPTX
Biometrics Technology
PPT
Biometrics Technology PPT
Biometric's final ppt
Biometrics Technology, Types & Applications
A study on biometric authentication techniques
Biometrics
Biometric technology
Biometrics
Biometrics Technology
Biometrics Technology PPT

What's hot (20)

PPTX
Biometric technology
PPTX
Biometrics
PPT
Bio-metrics Authentication Technique
PPTX
Biometrics
PPTX
Biometrics technology
PPTX
Biometrics Technology In the 21st Century
PPT
biometric technology
PPTX
Biometric Technology
PPTX
Biometric authentication ppt by navin 6 feb
PPTX
Biometrics
PPTX
Biometrics overview ppt
PPT
Biometrics
PPTX
Biometrics technology
PPTX
biometrics
PPTX
Biometric Technology
PPSX
Biometrics Technology by Capt Awal
PPT
Biometrics Technology Intresting PPT
PPTX
Biometricsppt
PPT
Biometric slideshare
Biometric technology
Biometrics
Bio-metrics Authentication Technique
Biometrics
Biometrics technology
Biometrics Technology In the 21st Century
biometric technology
Biometric Technology
Biometric authentication ppt by navin 6 feb
Biometrics
Biometrics overview ppt
Biometrics
Biometrics technology
biometrics
Biometric Technology
Biometrics Technology by Capt Awal
Biometrics Technology Intresting PPT
Biometricsppt
Biometric slideshare
Ad

Viewers also liked (20)

PPTX
Input devices
PPT
Using Headers and Footers in Word
PDF
Microsoft Word - Paging, Headers, Footers
PPTX
Ms Access
PPTX
Types of computer network
PDF
Worksheet Basics & Navigation - Excel 2013 Tutorial
PPTX
Basic concepts in computer security
PPTX
PPTX
Presentation printer
PDF
Computer Security
DOC
Creech R Resume 101610
PPTX
Disease
PDF
2007-2008 Student Awards
PDF
Why NextCMS: Layout Editor
PDF
мр нравственное воспитание
PDF
Wireframes filmographic
PPTX
Plain Language Legal Information
PPTX
η παναγία η παρηγορήτισσα
PPTX
Elements of a short story
PPTX
Tesolcollaborativesitesimages -
Input devices
Using Headers and Footers in Word
Microsoft Word - Paging, Headers, Footers
Ms Access
Types of computer network
Worksheet Basics & Navigation - Excel 2013 Tutorial
Basic concepts in computer security
Presentation printer
Computer Security
Creech R Resume 101610
Disease
2007-2008 Student Awards
Why NextCMS: Layout Editor
мр нравственное воспитание
Wireframes filmographic
Plain Language Legal Information
η παναγία η παρηγορήτισσα
Elements of a short story
Tesolcollaborativesitesimages -
Ad

Similar to Biometrics (20)

PPTX
Biometrics
PDF
23636372-biometrics-seminar-ppt.pdf
PPT
Biometric Security advantages and disadvantages
PPTX
Biometrics
PPTX
PPTX
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
PPTX
Biometrics
PPTX
Biomatrics
PPTX
Biometrics Based Authentication AKASH
PDF
MAIN_BIOMETRIC.pdf
PPTX
Biometric technology .pptx
PPTX
Biometric technology .pptx
PPTX
INTRODUCTION TO BIOMETRIC.pptx
PPT
Biometric
PPTX
21392009 laddi
PDF
Biometrics system penetration in mobile devices
PPTX
Biometric authentication
PPTX
Authentication using Biometrics
PPTX
Biometrics and its applications for system Analysis
PPTX
Biometrics and its applications in Medical
Biometrics
23636372-biometrics-seminar-ppt.pdf
Biometric Security advantages and disadvantages
Biometrics
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
Biometrics
Biomatrics
Biometrics Based Authentication AKASH
MAIN_BIOMETRIC.pdf
Biometric technology .pptx
Biometric technology .pptx
INTRODUCTION TO BIOMETRIC.pptx
Biometric
21392009 laddi
Biometrics system penetration in mobile devices
Biometric authentication
Authentication using Biometrics
Biometrics and its applications for system Analysis
Biometrics and its applications in Medical

More from shweta-sharma99 (13)

PPTX
Biometrics
DOC
DOCX
Sql commands
DOCX
Rep on grid computing
DOCX
Java practical
DOCX
Graphics file
DOCX
Vbreport
DOC
Software re engineering
PPTX
PPTX
Grid computing
PPTX
PPTX
Smartphone
PPT
Instruction cycle
Biometrics
Sql commands
Rep on grid computing
Java practical
Graphics file
Vbreport
Software re engineering
Grid computing
Smartphone
Instruction cycle

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Electronic commerce courselecture one. Pdf
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
Encapsulation_ Review paper, used for researhc scholars
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Electronic commerce courselecture one. Pdf
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)

Biometrics

  • 2. Introduction  Biometrics is the science and technology of measuring and analyzing biological data.  It measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
  • 3. Biometric devices consist of:  A reader or scanning device  Software that converts the scanned information into digital form and compares match points  A database that stores the biometric data for comparison
  • 4. Biometrics can be sorted into two classes:  Categories of BIOMETRICS  Physiological  Examples- face, fingerprints, hand geometry and iris Recognition, DNA.  Behavioral  Examples-signature and voice.
  • 5. Basic characteristics of BIOMETRIC Technologies:  Universality: Every person should have the characteristic. People who are mute or without a fingerprint will need to be accommodated in some way.  Uniqueness: Generally, no two people have identical characteristics. However, identical twins are hard to distinguish.  Permanence: The characteristics should not vary with time. A person's face, for example, may change with age.
  • 6. Collectibility: The characteristics must be easily collectible and measurable.  Performance: The method must deliver accurate results under varied environmental circumstances.  Acceptability: The general public must accept the sample collection routines. Nonintrusive methods are more acceptable.  Circumvention: The technology should be difficult to deceive
  • 8. Working principle:  Biometric devices consist of a reader or scanning device software that converts the gathered information into digital form, and a database that stores the biometric data with comparison with existing records.
  • 9. Modes  Enrollment Mode.  Verification Mode.  Enrollment Mode: A sample of the biometric trait is captured, processed by a computer, and stored for later comparison.  Verification Mode: In this mode biometric system authenticates a person’s claimed identity from their previously enrolled pattern.
  • 10. Biometric Modalities: Fingerprint Recognition:  For fingerprint Recognition look at:  Friction ridges  Core  Crossover  Delta  Island  Ridge Ending  Pore
  • 13. Face Recognition It involves recognizing people by there:  Facial features.  Face geometry.  Principle: Analysis of unique shape, pattern and positioning of facial features.
  • 15. Voice Recognition:  Voice recognition is not the same as speech recognition, it is speaker recognition.  Considered both physiological and behavioral.  Popular and low-cost, but less accurate and sometimes lengthy enrollment.
  • 17. Styles of spoken input: These system have three styles of spoken inputs:  Text Dependent  Text prompted  Text Independent
  • 18. Iris Recognition:  It is the colored area of the eye that surrounds the pupil.  It is a protected internal organ whose random texture is stable throughout life.  The iris patterns are obtained through a video-based image acquisition system .
  • 20. Signature Verification:  Static/Off-line: the conventional way.  Dynamic/On-line: using electronically instrumented device.  Principle: The movement of the pen during the signing process rather than the static image of the signature. Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes.
  • 21. Smart Cards:  These are digital security pocket-sized cards with embedded integrated circuits which can process data.  It can be used for identification,authentication, and data storage.  It can also be used as a medium to provide a means of effecting business transactions in a flexible, secure, standard way with minimal human intervention.
  • 22. Encryption Systems :  Transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.  Encryption has long been used by militaries and governments to facilitate secret communication.
  • 23. Performance of BIOMETRICS :  False accept rate or false match rate (FAR or FMR)  False reject rate or false non-match rate (FRR or FNMR)  Relative operating characteristic (ROC)  Equal error rate or crossover error rate (EER or CER)
  • 24. Advantages of Biometrics:  Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly.  Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to-hack passwords) .  Automated biometric identification can be done very rapidly and uniformly, with a minimum of training .  Your identity can be verified without resort to documents that may be stolen, lost or altered.
  • 25. Disadvantages of BIOMETRICS:  The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.  It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time  For people affected with diabetes, the eyes get affected resulting in differences.  Biometrics is an expensive security solution.
  • 26. BIOMETRICS SECURITY:  Security personnel look for biometric data that does not change over the course of your life; that is, they look for physical characteristics that stay constant and that are difficult to fake or change on purpose