BySachin Yadav
I.T. 3 rd year
 The term "biometrics" is derived from the Greek

words bio (life) and metric (to measure).
 In other words we can say that biometrics are

technologies for measuring and analyzing a
person's physiological or behavioral
characteristics. These characteristics are unique
to individuals hence can be used to verify or
identify a person.
 Based on Passwords, or ID/Swap cards

 Can be Lost.
 Can be forgotten.
 Worse! Can be stolen and used by a

thief/intruder to access your data, bank
accounts, cards etc….
 Face recognition
 Fingerprint
 Voice recognition
 Palm print
 Hand Geometry
 Iris recognition
 Retina Scan
 DNA
 Signatures
 Gait recognition
 Keystroke
 Effectiveness
 Effectiveness :
The basic measure of any authentication solution is
accuracy . Improper rejection of individuals who
should have been successfully authenticated. It results
in user frustration and time lost in reauthenticating
must still be part of the measurement of overall
effectiveness.
 Effectiveness

 Ease of deployment and use
 Ease of deployment and use :
No technology can be effective unless and until
Its operational and in regular use . The solution
should be easy to deploy and maintain & shouldn’t
require significant changes to business processes.
 Effectiveness

 Ease of deployment and use
 Enterprise-wide capability
 Enterprise-wide capability :
while an organization may deploy an
authentication solution to meet a single need
today . It make sense early in the selection process
to look at where and how the use of biometrics
expanded to meet future needs .
 Effectiveness

 Ease of deployment and use
 Enterprise-wide capability
 Economic consideration
 Economic consideration :
Keeping cost under control is important even
when budgets aren’t under the strain they are
today .
applications such as computer network
login , electronic data security , e-commerce, internet
access, ATM , credit card, physical access control,
medical records management and distance learning.
 Government applications such as national ID cards,
driver’s license , social security , border control and
passport control.
 Forensic applications such as corpse identification ,
criminal investigation and missing children.
 Biometrics airport security devices are also deployed at
some of the world’s famous airport to enhance the
security standards.
 Commercial
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)


Identification:

– Match a person’s biometrics against a
database to figure out his identity by
Finding the closest match .
– Commonly referred to as 1:N matching
– ‘Criminal Watch-list’ application scenarios .


Verification:

– The person claims to be ‘John’, system must
match and compare his/hers biometrics with
John’s stored Biometrics.
– If they match, then user is ‘verified’ or
authenticated that he is indeed ‘John’
– Access control application scenarios.
– Typically referred as 1:1 matching
1) Iris-based ATM
2)Smart card with fingerprints

3)Fingerprint at check-out counter

4)Face scan at airports
 Enhanced security
 Can’t copied
 Can’t be share
 Convenience/control
 Accuracy
 Can’t be lost
 Reduced paper work
 Costs
1) Recognition errors :
There are two types of recognition errors first is False
accept rate (FAR) and second is False Reject rate
(FRR). A false Accept is when a non matching pair of
biometrics data is wrongly . False Reject is when a
matching pair of biometrics data is wrongly rejected.
2) Compromised biometric data :
Paradoxically , the greatest strength of biometrics is at
the same time its greatest liability. The pattern such as
Iris , Retina or palm vein remain the same throughout
your life. So user has a limited no. of biometric
features.
3) Attacks :
There are so many Ways to bypass biometrics system
Such as presenting fake biometrics or a copy at sensor
for instance a fake finger or fake mask .
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)

More Related Content

PDF
Biometrics Technology
PPTX
Biometrics technology ravi kumar
PPTX
Biometrics by ritesh
PPT
A86eseminar on biometrics
PPT
Biometric Authentication final
PPT
Biometric's final ppt
PPT
Biometric by amin
PPTX
Biometrics
Biometrics Technology
Biometrics technology ravi kumar
Biometrics by ritesh
A86eseminar on biometrics
Biometric Authentication final
Biometric's final ppt
Biometric by amin
Biometrics

What's hot (20)

PPT
Bio-metric Security System
PPTX
Biometrics overview ppt
PPTX
Biometric technology
PPT
Biometrics Technology PPT
PPTX
Biometrics presentation
PPT
Introduction to Biometric lectures... Prepared by Dr.Abbas
PPTX
Biometric technology
PPTX
Biometrics Technology, Types & Applications
DOC
Biometrics Technology Seminar Report.
PPTX
Behavioral biometrics
PPTX
Biometric authentication system
PPTX
Biometric authentication
PPSX
Biometrics Technology by Capt Awal
PDF
Introduction of Biometrics
PPTX
Biometrics technology
PPTX
Applications of Biometrics in Technology
PPTX
Biometrics
PPTX
Biometrics
PPTX
Bio-Metric Technology
PPT
Biometric ppt
Bio-metric Security System
Biometrics overview ppt
Biometric technology
Biometrics Technology PPT
Biometrics presentation
Introduction to Biometric lectures... Prepared by Dr.Abbas
Biometric technology
Biometrics Technology, Types & Applications
Biometrics Technology Seminar Report.
Behavioral biometrics
Biometric authentication system
Biometric authentication
Biometrics Technology by Capt Awal
Introduction of Biometrics
Biometrics technology
Applications of Biometrics in Technology
Biometrics
Biometrics
Bio-Metric Technology
Biometric ppt
Ad

Similar to Biometrics Presentation By Sachin Yadav (S/W Engineer) (20)

PDF
MAIN_BIOMETRIC.pdf
PPTX
Basic of Biometrics Technology
PPT
Biometrics
PDF
Biometrics_basicsandcharacteristics_.pdf
PPTX
Biometrics security
PPTX
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
DOCX
Biometrics
PPT
PPT
Chapters_1_2.ppt
PPT
Biometrics - Chapter 1 Introduction.pptx
PDF
Biometrics & Finger print Technology
PPT
User authentication trends
PPTX
21392009 laddi
PPTX
PPTX
Biometric Systems
PPTX
BIOMETRIC (TO PRERVE OUR IDENTY)
PPTX
Biometrics
PPTX
Biometrics
PPTX
Bio-Metrics through finger print
PPTX
Biometric Identification system.pptx
MAIN_BIOMETRIC.pdf
Basic of Biometrics Technology
Biometrics
Biometrics_basicsandcharacteristics_.pdf
Biometrics security
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
Biometrics
Chapters_1_2.ppt
Biometrics - Chapter 1 Introduction.pptx
Biometrics & Finger print Technology
User authentication trends
21392009 laddi
Biometric Systems
BIOMETRIC (TO PRERVE OUR IDENTY)
Biometrics
Biometrics
Bio-Metrics through finger print
Biometric Identification system.pptx
Ad

Recently uploaded (20)

PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Architecture types and enterprise applications.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Five Habits of High-Impact Board Members
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
STKI Israel Market Study 2025 version august
PPTX
Modernising the Digital Integration Hub
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Getting Started with Data Integration: FME Form 101
DOCX
search engine optimization ppt fir known well about this
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Architecture types and enterprise applications.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Benefits of Physical activity for teenagers.pptx
Five Habits of High-Impact Board Members
Taming the Chaos: How to Turn Unstructured Data into Decisions
Module 1.ppt Iot fundamentals and Architecture
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Hybrid model detection and classification of lung cancer
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Group 1 Presentation -Planning and Decision Making .pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
STKI Israel Market Study 2025 version august
Modernising the Digital Integration Hub
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Getting Started with Data Integration: FME Form 101
search engine optimization ppt fir known well about this

Biometrics Presentation By Sachin Yadav (S/W Engineer)

  • 2.  The term "biometrics" is derived from the Greek words bio (life) and metric (to measure).  In other words we can say that biometrics are technologies for measuring and analyzing a person's physiological or behavioral characteristics. These characteristics are unique to individuals hence can be used to verify or identify a person.
  • 3.  Based on Passwords, or ID/Swap cards  Can be Lost.  Can be forgotten.  Worse! Can be stolen and used by a thief/intruder to access your data, bank accounts, cards etc….
  • 4.  Face recognition  Fingerprint  Voice recognition  Palm print  Hand Geometry  Iris recognition  Retina Scan  DNA  Signatures  Gait recognition  Keystroke
  • 6.  Effectiveness : The basic measure of any authentication solution is accuracy . Improper rejection of individuals who should have been successfully authenticated. It results in user frustration and time lost in reauthenticating must still be part of the measurement of overall effectiveness.
  • 7.  Effectiveness  Ease of deployment and use
  • 8.  Ease of deployment and use : No technology can be effective unless and until Its operational and in regular use . The solution should be easy to deploy and maintain & shouldn’t require significant changes to business processes.
  • 9.  Effectiveness  Ease of deployment and use  Enterprise-wide capability
  • 10.  Enterprise-wide capability : while an organization may deploy an authentication solution to meet a single need today . It make sense early in the selection process to look at where and how the use of biometrics expanded to meet future needs .
  • 11.  Effectiveness  Ease of deployment and use  Enterprise-wide capability  Economic consideration
  • 12.  Economic consideration : Keeping cost under control is important even when budgets aren’t under the strain they are today .
  • 13. applications such as computer network login , electronic data security , e-commerce, internet access, ATM , credit card, physical access control, medical records management and distance learning.  Government applications such as national ID cards, driver’s license , social security , border control and passport control.  Forensic applications such as corpse identification , criminal investigation and missing children.  Biometrics airport security devices are also deployed at some of the world’s famous airport to enhance the security standards.  Commercial
  • 17.  Identification: – Match a person’s biometrics against a database to figure out his identity by Finding the closest match . – Commonly referred to as 1:N matching – ‘Criminal Watch-list’ application scenarios .
  • 18.  Verification: – The person claims to be ‘John’, system must match and compare his/hers biometrics with John’s stored Biometrics. – If they match, then user is ‘verified’ or authenticated that he is indeed ‘John’ – Access control application scenarios. – Typically referred as 1:1 matching
  • 19. 1) Iris-based ATM 2)Smart card with fingerprints 3)Fingerprint at check-out counter 4)Face scan at airports
  • 20.  Enhanced security  Can’t copied  Can’t be share  Convenience/control  Accuracy  Can’t be lost  Reduced paper work  Costs
  • 21. 1) Recognition errors : There are two types of recognition errors first is False accept rate (FAR) and second is False Reject rate (FRR). A false Accept is when a non matching pair of biometrics data is wrongly . False Reject is when a matching pair of biometrics data is wrongly rejected. 2) Compromised biometric data : Paradoxically , the greatest strength of biometrics is at the same time its greatest liability. The pattern such as Iris , Retina or palm vein remain the same throughout your life. So user has a limited no. of biometric features.
  • 22. 3) Attacks : There are so many Ways to bypass biometrics system Such as presenting fake biometrics or a copy at sensor for instance a fake finger or fake mask .