SlideShare a Scribd company logo
Biometrics Authentication
What is Biometrics ?
Biometrics -- technology that identifies
you based on your physical or behavioral
traits -- for added security.
Biometrics can use physical
characteristics, like your face, fingerprints,
irises or veins, or behavioral
characteristics like your voice, handwriting
or typing rhythm.
You take basic security precautions every
day -- you use a key to get into your house
and log on to your computer with a
username and password. You've probably
also experienced the panic that comes with
misplaced keys and forgotten passwords. It
isn't just that you can't get what you need - if you lose your keys or jot your password
on a piece of paper, someone else can find
them and Can use them
Biometrics Today
FINGERPRINTS
RETINA PRINTS
FACE PRINTS
DNA IDENTIFICATION
VOICE PRINTS

PALM PRINTS
HANDWRITING ANALYSIS
ETC…
Fingerprint scanners are a popular type of
biometric system
Biometrics in nootbook
BIOMETRIC SECURITY SYSTEMS, LIKE THE FINGERPRINT
SCANNER AVAILABLE ON THE IBM THINKPAD T43 (RIGHT), IS
BECOMING MORE COMMON FOR HOME USE.
the nootbook Systems also use the biometrics
authentication :
A sensor that detects the characteristic being used for
identification
A computer that reads and stores the information
Software that analyzes the characteristic, translates it
into a graph or code and performs the actual
comparisons
Hand and Finger Geometry
TYPICAL SYSTEMS MEASURE DIFFERENT FEATURES:
OVERALL HAND AND FINGER WIDTH
DISTANCE BETWEEN JOINTS
BONE STRUCTURE
PRIMARILY FOR ACCESS CONTROL:
MACHINE ROOMS
OLYMPICS
Iris Scanning
WHEN YOU LOOK INTO AN IRIS SCANNER, EITHER THE CAMERA
FOCUSES AUTOMATICALLY OR YOU USE A MIRROR OR AUDIBLE
FEEDBACK FROM THE SYSTEM TO MAKE SURE THAT YOU ARE
POSITIONED CORRECTLY. USUALLY, YOUR EYE IS 3 TO 10 INCHES
FROM THE CAMERA. WHEN THE CAMERA TAKES A PICTURE,
THE COMPUTER LOCATES:
THE CENTER OF THE PUPIL
THE EDGE OF THE PUPIL
THE EDGE OF THE IRIS
THE EYELIDS AND EYELASHES

IT THEN ANALYZES THE PATTERNS IN THE IRIS AND TRANSLATES
THEM INTO A CODE.
Biometrics   authentication
Template Size
Biometric

Approx Template Size

Voice

70k – 80k

Face

84 bytes – 2k

Signature

500 bytes – 1000 bytes

Fingerprint

256 bytes – 1.2k

Hand Geometry

9 bytes

Iris

256 bytes – 512 bytes

Retina

96 bytes
Thank you
HCL
PRESENTED BY - DINESH KUMAR
PRESENTATION TOIPC- BIOMETRICS AUTHENTICATION
BACTH – HCNE 03
SAP CODE - 4001201076
TRINNER – Mr. SANDEEP DAHIYA

More Related Content

PPTX
Finger Print Sensor
PPTX
Pattern recognition
PPT
Finger print sensor and its application
PPTX
Fingerprint scanner
PDF
Report on Finger print sensor and its application
PPT
Biometric Sensors
PPT
Biometric Authentication final
PPTX
Biometric
Finger Print Sensor
Pattern recognition
Finger print sensor and its application
Fingerprint scanner
Report on Finger print sensor and its application
Biometric Sensors
Biometric Authentication final
Biometric

What's hot (20)

PPTX
Worldleading fingerprint technolopgy
PPTX
Biometric System
PPTX
Biometrics clear presentation by Adduri kalyan(AK)
PDF
SCSJPA Recommended Apps
PDF
SCSJPA App Recommendations
TXT
kiran's slide info
PPTX
Bio-Metric Technology
PPTX
Presentation suresh maurya
PPTX
BIOMETRICS
PPTX
Biometrics presentation
PPT
Input output Devices
PPTX
BIOMETRIC IDENTIFICATION IN ATM’S PPT
PDF
Biometrics/fingerprint sensors
PPT
BIOMETRICS FINGER PRINT TECHNOLOGY
PPT
Unique p mail-addressing 97-03
PPTX
Palm vein technology
PPT
PALM VEIN TECHNOLOGY
PPTX
Biomatrics
PPTX
Plam vein technology
Worldleading fingerprint technolopgy
Biometric System
Biometrics clear presentation by Adduri kalyan(AK)
SCSJPA Recommended Apps
SCSJPA App Recommendations
kiran's slide info
Bio-Metric Technology
Presentation suresh maurya
BIOMETRICS
Biometrics presentation
Input output Devices
BIOMETRIC IDENTIFICATION IN ATM’S PPT
Biometrics/fingerprint sensors
BIOMETRICS FINGER PRINT TECHNOLOGY
Unique p mail-addressing 97-03
Palm vein technology
PALM VEIN TECHNOLOGY
Biomatrics
Plam vein technology
Ad

Similar to Biometrics authentication (20)

PPTX
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
PPT
Biometricstechnology in iot and machine learning
PPTX
Biomatric
PPTX
Biometrics
PPTX
biometrics
PPTX
Biometrics
PPTX
Biometric of technology.ppt
PPTX
Applications of Biometrics in Technology
PPTX
Biometrics Technology
PPT
Ubiquitous security- is it just biometrics?
PPT
Biomatrics
PPTX
3D biometrics Passwords for safety .pptx
PPT
A86eseminar on biometrics
PPSX
Biometrics Technology by Capt Awal
PPTX
Biometric systems last1
PPTX
Biometric systems last1
PPTX
INTRODUCTION TO BIOMETRIC.pptx
PPTX
Biometrics(By Aashish Tanania)
PPTX
Biometrics and its applications for system Analysis
PPTX
Biometrics and its applications in Medical
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
Biometricstechnology in iot and machine learning
Biomatric
Biometrics
biometrics
Biometrics
Biometric of technology.ppt
Applications of Biometrics in Technology
Biometrics Technology
Ubiquitous security- is it just biometrics?
Biomatrics
3D biometrics Passwords for safety .pptx
A86eseminar on biometrics
Biometrics Technology by Capt Awal
Biometric systems last1
Biometric systems last1
INTRODUCTION TO BIOMETRIC.pptx
Biometrics(By Aashish Tanania)
Biometrics and its applications for system Analysis
Biometrics and its applications in Medical
Ad

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
MYSQL Presentation for SQL database connectivity
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Dropbox Q2 2025 Financial Results & Investor Presentation
sap open course for s4hana steps from ECC to s4
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf

Biometrics authentication

  • 2. What is Biometrics ? Biometrics -- technology that identifies you based on your physical or behavioral traits -- for added security. Biometrics can use physical characteristics, like your face, fingerprints, irises or veins, or behavioral characteristics like your voice, handwriting or typing rhythm.
  • 3. You take basic security precautions every day -- you use a key to get into your house and log on to your computer with a username and password. You've probably also experienced the panic that comes with misplaced keys and forgotten passwords. It isn't just that you can't get what you need - if you lose your keys or jot your password on a piece of paper, someone else can find them and Can use them
  • 4. Biometrics Today FINGERPRINTS RETINA PRINTS FACE PRINTS DNA IDENTIFICATION VOICE PRINTS PALM PRINTS HANDWRITING ANALYSIS ETC…
  • 5. Fingerprint scanners are a popular type of biometric system
  • 6. Biometrics in nootbook BIOMETRIC SECURITY SYSTEMS, LIKE THE FINGERPRINT SCANNER AVAILABLE ON THE IBM THINKPAD T43 (RIGHT), IS BECOMING MORE COMMON FOR HOME USE.
  • 7. the nootbook Systems also use the biometrics authentication : A sensor that detects the characteristic being used for identification A computer that reads and stores the information Software that analyzes the characteristic, translates it into a graph or code and performs the actual comparisons
  • 8. Hand and Finger Geometry TYPICAL SYSTEMS MEASURE DIFFERENT FEATURES: OVERALL HAND AND FINGER WIDTH DISTANCE BETWEEN JOINTS BONE STRUCTURE PRIMARILY FOR ACCESS CONTROL: MACHINE ROOMS OLYMPICS
  • 9. Iris Scanning WHEN YOU LOOK INTO AN IRIS SCANNER, EITHER THE CAMERA FOCUSES AUTOMATICALLY OR YOU USE A MIRROR OR AUDIBLE FEEDBACK FROM THE SYSTEM TO MAKE SURE THAT YOU ARE POSITIONED CORRECTLY. USUALLY, YOUR EYE IS 3 TO 10 INCHES FROM THE CAMERA. WHEN THE CAMERA TAKES A PICTURE, THE COMPUTER LOCATES: THE CENTER OF THE PUPIL THE EDGE OF THE PUPIL THE EDGE OF THE IRIS THE EYELIDS AND EYELASHES IT THEN ANALYZES THE PATTERNS IN THE IRIS AND TRANSLATES THEM INTO A CODE.
  • 11. Template Size Biometric Approx Template Size Voice 70k – 80k Face 84 bytes – 2k Signature 500 bytes – 1000 bytes Fingerprint 256 bytes – 1.2k Hand Geometry 9 bytes Iris 256 bytes – 512 bytes Retina 96 bytes
  • 13. HCL PRESENTED BY - DINESH KUMAR PRESENTATION TOIPC- BIOMETRICS AUTHENTICATION BACTH – HCNE 03 SAP CODE - 4001201076 TRINNER – Mr. SANDEEP DAHIYA