SlideShare a Scribd company logo
Biometrics Technology
three main types of authentication available today are:something you know, like a password, PIN, or code.
something you have, like a swipe card, smart card, token, or key.
something you are, which is biometrics.   What is a biometric?BiometricsIs the term given to the use of    biological traits    OR    behavioral characteristics     to identify an individual. 
CharacteristicsThe common Physical characteristics are:Fingerprint FaceRetina Iris Vein pattern, and Hand and finger geometry
CharacteristicsBehavioral characteristics are:Keystroke dynamics   Voice   Gait, and   Signature dynamics
The Biometric importanceThe security is needed in every place. Alleviate the existing problems, Like those which can be taken, stolen, borrowed or even forgotten.
The Biometric importance (Cont.)Improves convenience, security, and privacy.The first and most critical link in the security chain. presented to counteract security threats.
Biometrics HistoryThe term "biometrics" is derived from the Greek words                               (life)and metric means(to measure).bio which means
     Biometrics History (Cont.)the first known example of biometrics in practice was a form of finger printing being used in China in the 14th century.
Biometrics History (Cont.)In the 1890s, 'Bertillonage', created a method of bodily measurement with the criminals who repeated the crimes with different names and looks.
     Biometrics History (Cont.)After this, finger printing, which was developed by Richard Edward Henry of Scotland Yard.
Biometrics Processnew biometric sample is requested.NoQuality Sufficient?Signal Processing, Feature Extraction, RepresentationBiometricData CollectionTransmissionYesGenerate TemplateDatabaseTemplate MatchDecisionConfidence?YesNo
Physical Characteristics
Fingerprint Recognition:Fingerprint Recognition is the identification by using patterns of friction ridges and valleys on an individual's fingertips which are unique to that individual.
Fingerprint Recognition steps:Database
Face Recognition:Face recognition uses the visible physical structure of the face and analyses the spatial geometry of distinguishing features in it to identify an individual.
Face recognition process:Extraction of face featuresInput face imageExtraction of face imagePositiveDatabasenegative
Iris Identification:The iris is the colored ring of textured tissue that surrounds the pupil of the eye.
Iris Identification Steps:Input of face imageRecognition of iris patternDetection of eye regionsPut iris in focusacceptDatabasereject
Veins Recognition:Venial Recognition: A system for Identification using a person’s unique vein patterns.Veins as a biometrics tool involve the measurement 	of the blood vessels on the back of your hand.Vein Recognition System:The output pictureGenerate veins structureInput of palm pictureDatabasematchNot match
Behavioral Characteristics
Voice Recognition:Voice Recognition: is the Identification using the acoustic features of speech that have been found to differ between individuals.
Voice Identification SystemConstruct voice reference templateDatabase
Signature Identification:Signature identification: is the analyses of the way a user signs his or her name.The process used by a biometric system to verify a signature is called dynamic signature verification (DSV).
Signature Verification Process (Cont.)the angle at which the pen is held,
the number of times the pen is lifted,
the time it takes to write the entire signature,Biometric traitthe pressure exerted by the person while signing,
the variations in the speed with which different parts of the signature are written. Signature Verification ProcessProfileDatabase
Movies to Real World
Applications of Biometric
Applications of Biometric Access control :Disney World (fingerprint scanner).
Child day care centers ( hand geometry systems )Applications of Biometric (Cont.)Time and attendance management: Hospitals (hand geometry systems) Other Applications  Airports:
 Heathrow airport (iris recognition)ATMs:(face recognition)Other Applications (Cont.)Pc access:GM and Hertz (voice identification technology) to protect their computer facilities.
Fujitsu has developed a mouse that can verify a person's identity by recognizing his pattern of blood veins. Other Applications (Cont.)Prisons: Fujitsu has developed a mouse that can verify a person's identity by recognizing his pattern of blood veins.
Advantages of biometricsUniquenessUniversalityPermanenceMeasurabilityUser friendlinessAccuracyComfort
Disadvantages of Biometricscostly.Facial imaging can also hinder accurate identifications.Missing body part problem.
     Disadvantages of Biometrics (Cont.)False acceptances and rejections.The amount of comfort.The scanning of eye is fearful.The nervousness that people feel about the scanners identification.
Future ProspectsBiometry is one of the most promising and life-altering technologies in existence today. It is all set to change the way we live in the future.Some of the emerging biometrics technologies in the near future are:Ear shape identification.Body odor identification.Body salinity identification.EEG FingerprintDNA matching
ConclusionNot perfect yet.Successful applications.Decreasing costs and increasing convenience. Increasing both privacy and identity security. The field of biometrics is evolving.  Benefit from this technology .

More Related Content

PPTX
Biometrics
PPT
Biometric's final ppt
PPTX
Biometrics Technology, Types & Applications
PPTX
Biometric technology
PPTX
Biometrics
PPT
A study on biometric authentication techniques
PPTX
Biometric Technology
PPTX
Biometrics
Biometrics
Biometric's final ppt
Biometrics Technology, Types & Applications
Biometric technology
Biometrics
A study on biometric authentication techniques
Biometric Technology
Biometrics

What's hot (20)

PPTX
Biometrics
PPTX
Biometrics
PPTX
Biometric technology
DOC
Biometrics Technology Seminar Report.
PPT
biometric technology
PPTX
Biometrics Technology In the 21st Century
PPTX
Biometrics technology
PPT
Biometrics Technology PPT
PPT
Bio-metrics Technology
PPT
Biometrics Technology Intresting PPT
PPTX
Biometric authentication
PPTX
Biometrics
PPTX
Biometrics overview ppt
PPTX
Biometric authentication ppt by navin 6 feb
PPT
Bio-metrics Authentication Technique
PPTX
Biometrics
PPTX
Ppt on use of biomatrix in secure e trasaction
PPT
Biometric slideshare
PPTX
Biometricsppt
PPTX
Multi modal biometric system
Biometrics
Biometrics
Biometric technology
Biometrics Technology Seminar Report.
biometric technology
Biometrics Technology In the 21st Century
Biometrics technology
Biometrics Technology PPT
Bio-metrics Technology
Biometrics Technology Intresting PPT
Biometric authentication
Biometrics
Biometrics overview ppt
Biometric authentication ppt by navin 6 feb
Bio-metrics Authentication Technique
Biometrics
Ppt on use of biomatrix in secure e trasaction
Biometric slideshare
Biometricsppt
Multi modal biometric system
Ad

Similar to Biometrics Technology (20)

PPTX
Biomatric
PPT
Biometricstechnology in iot and machine learning
PPTX
Biometric authentication
PPTX
Biometrics clear presentation by Adduri kalyan(AK)
PPT
Biometrics
DOC
Poster on biometrics
PPTX
biometricauthenticationpptbynavin6feb-130210010658-phpapp02-170902094611.pptx
PPTX
biometrics
PPTX
Biometric Authentication PPT
PDF
Biometrics - automatic identification of individuals
PPSX
Biometrics Technology by Capt Awal
PPTX
Biometrics
PPTX
biometrics
PPT
Biometric
PPTX
Biometrics and its applications for system Analysis
PPTX
Biometrics and its applications in Medical
PPTX
Bio shiv
PDF
Biometrics system penetration in mobile devices
PPT
Session -I.ppt Session -I.ppt Session -I.ppt
Biomatric
Biometricstechnology in iot and machine learning
Biometric authentication
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics
Poster on biometrics
biometricauthenticationpptbynavin6feb-130210010658-phpapp02-170902094611.pptx
biometrics
Biometric Authentication PPT
Biometrics - automatic identification of individuals
Biometrics Technology by Capt Awal
Biometrics
biometrics
Biometric
Biometrics and its applications for system Analysis
Biometrics and its applications in Medical
Bio shiv
Biometrics system penetration in mobile devices
Session -I.ppt Session -I.ppt Session -I.ppt
Ad

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Spectroscopy.pptx food analysis technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PPTX
sap open course for s4hana steps from ECC to s4
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
Spectroscopy.pptx food analysis technology
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
sap open course for s4hana steps from ECC to s4
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf

Biometrics Technology