1. TUMKUR UNIVERSITY
DEPARTMENT OF STUDIES AND RESEARCH IN COMPUTER SCIENCE
TITLE: Biometrics
PRESENTED BY
Bhagyashree A M
P11AZ24S126002
Ist Semester-MCA
Tumkur University,Tumkur.
PRESENTED TO
Shashikala Mam
DoSR Computer Applications
Tumkur University, Tumkur.
2. Biometrics:
Biometrics is extremely effective in security applications and is used in
multiple instances that include the government, military and business.
It is also a field that is rapidly growing and expanding. This project will
look at various biometric methods including iris scanning, retina
scanning, hand geometry, facial geometry, fingerprint scanning and
others to see how they are done, and their general effectiveness. My
hypothesis is that biometrics is the future of security and that it is
coming into the mainstream where even more people will be able to
take advantage of the technology.
4. Fingerprint Scanning
• Well known
• Based on two assumptions:
• Fingerprint details are permanent
• Fingerprints of an individual are unique
• “A fingerprint is made up of a pattern of
ridges and furrows as well as
characteristics that occur at Minutiae
points (ridge bifurcation or a ridge
ending)” (Beal).
5. Retina Scanning
• The retina is the patterns of blood vessels on the thin nerve at the
back of the eyeball that processes light entering the pupil
• During a retinal scan, a user brings their eye very close to the lens of
the camera being used for the scanning
• Must look directly into the lens
• Enrollment can also take up to a minute or more
• Must be scanned every time for authentication
6. Voice Recognition
• Speech recognition technology is used to convert spoken words into text
• Voice recognition takes the unique sound of a voice and matches it to a
particular person, authenticating that person for entry into a system
(Briggs)
7. How Biometric Systems Work
Enrollment
Capture initial biometric data.
Create and store a secure template.
Presentation
Present biometric data to the system.
Implement anti-spoofing measures.
Matching
Compare data to the stored template.
Calculate a matching score.
Decision
Accept or reject the match.
Log the transaction.
9. Biometrics in Mobile Devices
Fingerprint Sensors
Prevalent in smartphones.
Integrated with mobile payment
systems.
Facial Recognition
Unlocks phones and authenticates
apps.
Vulnerable to spoofing attacks.
Voice Recognition
Integrated with virtual assistants.
Raises privacy concerns.
10. Advantages of Biometrics
Enhanced Security
Difficult to forge biometric
data.
Convenience
No need to remember
passwords.
Accountability
Clear audit trails for transactions.
Biometrics offer enhanced security due to the difficulty in forging
biometric data. They also provide convenience. There is no need to
remember passwords. Biometrics offer clear audit trails.
11. Challenges of Biometrics
Privacy Concerns
Sensitive data collection and storage.
Accuracy Limitations
False acceptance and rejection rates.
Security Vulnerabilities
Susceptible to spoofing attacks.
Cost and Implementation
High initial investment required.
13. The Future of Biometrics
Multimodal Biometrics
Combining multiple modalities.
AI and Deep Learning
Enhanced algorithms.
Wearable Biometrics
Integration into devices.
Contactless Biometrics
Increased adoption.
14. Conclusion: The Biometric
Future
Biometrics are increasingly prevalent. Balancing security and privacy is
crucial. Ongoing innovation will drive adoption. The future of
identification is biometric.