SlideShare a Scribd company logo
To  The world of Biometrics Welcome
BIOMETRICS BY A.V.AJAY KIRAN [email_address]
What is Biometrics? The word biometrics comes from the Greek words bios and metric, meaning'' life measurement''. By measuring something unique about an individual and using that to identify them, we can achieve a dramatic improvement in security of the key store. Newer biometric measurements include DNA from tissue samples, voice pattern, face pattern or even the arrangement of blood vessels in the retina or pattern of coloration in the cornea of the eye.
Why Use Biometrics? Only biometrics can verify  you  as  you   Tokens (smartcards, etc.) aren't you and can be:  lost  stolen  duplicated (some)  forgotten  Passwords aren't you and can be:  forgotten  shared  observed  broken
SHORT HISTORY OF BIOMETRICS  Joao de Barros, an explorer and writer, wrote that Chinese merchants used a form of biometrics by stamping children’s palm prints and footprints on paper with ink .In doing this, the Chinese solved a way to distinguish young children from one another. This is one of the earliest known cases of biometrics .Later an anthropologist named Alphonse Bertillion sought to fix the problem of identifying convicted criminals. He found that even if names changed, even if a person comes in disguise, certain elements of the body remained fixed” . This led him to form a method of measuring the distinguishable parts of a person’s body, which never changed throughout their life . Whenever a new criminal was caught, instead of taking down their name, the authorities would measure them and look for a matching card . This system  was adopted by prisons and police stations across the country and world. As technology gets more and more advanced, the ways to distinguish the different biometrical signalments become more and more precise. led to field of biometric technologies that we live in today.
Using Biometrics: Biometrics are used in two major ways : Identification and Verification. Identification   is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity 1of a suspect from crime scene information. Verification  is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.
Physical Biometrics Fingerprint Hand Iris  Retina Face  Voice  Retina  DNA
Fingerprint - analyzing fingertip patterns: Among all the biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints.  A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points.
Draw backs of fingure print biometrics When hand is injured or burnt and even if we have slight disturbance in the cuticles also it will not access the user. So,it’s a failure. The potential uses for this biometric appear to be limited only by the willingness of people to use it.
Vascular Patterns - analyzing vein patterns  Vascular patterns are best described as a picture of the veins in a person's hand or face. The thickness and location of these veins are believed to be unique enough to an individual to be used to verify a person's identity. The most common form of vascular pattern readers are hand-based, requiring the user to place their hand on a curved reader that takes an infrared scan. This scan creates a picture that can then be compared to a database to verify the user's stated identity.
Advantages  Vascular pattern scanners can be found in testing at major military installations and is being considered by some established companies in the security industry and multi-outlet retailers. advantages over its counterparts, including the great difficulty in emulating another person's vein structure, and not having to worry about rain, glasses, or external injuries. effects of aging, heart attacks, and medical problems with one's arteries on the scans has yet to be determined fully. It also requires a large amount of space to mount the device is that the entire hand can be scanned which may restrict its usability. Currently it is still building acceptance
Disadvantages It cant be used alone. It should be used with another biometric technique.
Facial Recognition - measuring facial characteristics User faces the camera, standing about two feet from it. The system will locate the user's face and perform matches against the claimed identity or the facial database. It is possible that the user may need to move and re attempt the verification based on his facial position. The system usually comes to a decision in less than 5 seconds.  To prevent a fake face or mold from faking out the system, many systems now require the user to smile, blink, or otherwise move in a way that is human before verifying. Up to 128 Eigen vectors are created for each person in order to achieve unmistakable identification. Facial Recognition System (FRS) is combined with other suitable biometric technologies to reduce nuisance and false alarm rates. In a controlled environment with proper lighting and choke points, the system can be combined with access control systems to limit access through particular checkpoints.
Iris recognition Iris recognition is a method of biometric uses pattern recognition techniques based on high-resolution images of the irides of an individual's eyes. unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual.
  Its stablity, or template longevity as, barring trauma, a single enrollment can last a lifetime You can cheat the iris scanner by putting on lens  or  glasses. Advantages of iris recognition Backdraws
Retinal Scan - analyzing blood vessels in the eye  Oldest biometrics as 1930's research suggested Scanning involves using a low-intensity light source and an optical coupler and can read the patterns at a great level of accuracy. It does require the user to remove glasses, place their eye close to the device, and focus on a certain point.  that the patterns of blood vessels on the back of the human eye were unique to each individual
Advantages There is no known way to replicate a retina, and a retina from a dead person would deteriorate too fast to be useful, so no extra precautions have been taken with retinal scans to be sure the user is a living human being. The difficulty in fooling such a device also make it a great long-term, high-security option.
DNA - analyzing genetic makeup  DNA evidence play a big part in many nations' criminal justice systems. It has been used to prove that suspects were involved in crimes and to free people who were wrongly convicted.It has been integral to several high-profile criminal cases. Most people have a basic idea of what DNA is. It's essentially an instruction manual and blueprint for everything in your body. A DNA molecule is a long, twisting chain known as a double helix.
Advantages DNA is tightly wrapped into 23 pairs of  chromosomes . This is what makes DNA evidence so valuable in investigations -- it's almost impossible for someone else to have DNA that is identical to yours.
Behavioral biometrics: Two forms 1.Voice  2.Signature
Speaker Recognition - analyzing vocal behavior  Voice authentication, also known as “speaker verification”, is defined as the automated verification of a person’s claimed identity, based on unique characteristics of their voice. A simple microphone is enough to record the voice, and then most of the algorithm are analyzing the voice spectrum. Voice and speech can be combined to get a better system:
Advantages To prevent recorded voice use, most devices require the high and low frequencies of the sound to match, which is difficult for many recording instruments to recreate well. Also, some devices generate random number sequences for each verification.
Signature - analyzing signature biometrics Handwriting recognition system's sensors can include a touch-sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction. The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time.
Advantages Specific details recorded by signature-scan may include the total time taken to sign, the ration of pen-up to pen-down time, the speed of the strokes, the pressure applied, the number and direction of the strokes, and the total size of the signature, among other variables ". So a forger would have to recreate your signature within some window of time while applying the correct pressure, except for 'pressure applied'.
Future Research  Biometrics has all of the desirable characteristics that we described in the beginning.we might develop an automated biometrics-based identification/verification system like Vein pattern , Ear shape , Body odor , Body salinity (salt) , Electronic nose  The next few years you will see just about every thing come with biometric protection. Mobile phones, MP3 players, cars, laptop computers, building access, locker access.
Conclusion  Biometrics is a very interesting and exciting field that has be growing exponentially in recent years . The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world. As the demands for high-performance and highly reliable biometrics-based identification/verification systems increase, more hybrid biometrics-based systems are expected to be developed to meet the ever-increasing needs for automated personal identification.
“  IN FUTURE BIOMETRICS WILL BE THE DOOR WAY TO ALL THE ACCESABLE SYSTEMS ”
T h a n k  y o u

More Related Content

PPTX
Biometrics Technology
PPTX
Biometrics
PPT
Biometric's final ppt
PPTX
Biometrics technology
PPTX
Biometrics Technology In the 21st Century
PPT
Biometrics Technology PPT
PPTX
Biometric Technology
PPTX
Biometric Technology
Biometrics Technology
Biometrics
Biometric's final ppt
Biometrics technology
Biometrics Technology In the 21st Century
Biometrics Technology PPT
Biometric Technology
Biometric Technology

What's hot (20)

PPTX
Biometric technology
PPTX
Biometric technology .pptx
PPTX
Biometrics
PPTX
Introduction To Biometrics
PPTX
Biometrics
PPTX
Biometric technology
PDF
Biometric Technology
PPTX
Biometrics overview ppt
PPT
Bio-metrics Technology
PPTX
Applications of Biometrics in Technology
PPTX
Biometric Systems and Security
PPTX
Biometrics
PPT
Biometric
PPT
Biometric encryption
PPT
Face recognition technology
PPT
biometric technology
PPTX
Fingerprint
PPT
Biometric security Presentation
PPT
Bio-metrics Authentication Technique
PPTX
Biometrics
Biometric technology
Biometric technology .pptx
Biometrics
Introduction To Biometrics
Biometrics
Biometric technology
Biometric Technology
Biometrics overview ppt
Bio-metrics Technology
Applications of Biometrics in Technology
Biometric Systems and Security
Biometrics
Biometric
Biometric encryption
Face recognition technology
biometric technology
Fingerprint
Biometric security Presentation
Bio-metrics Authentication Technique
Biometrics
Ad

Viewers also liked (20)

PPT
PPT
Biometric slideshare
PPT
Biometric Presentation
PPTX
biometrics
PPTX
Slide-show on Biometrics
PDF
Behavioural biometrics and cognitive security authentication comparison study
PPTX
Behavior biometrics - The silent revolution in digital fingerprinting
PPTX
Spotlight on Children's Audio 2014 - Market Landscape & Trends in the US
PPTX
Three trends in cybersecurity
PDF
Li charles emerging biometrics identity services in the cloud 02122015b - ...
PDF
Kb gait-recognition
PDF
Mobile biometric device trends joe hoerl
PPT
Intelli Finger Presentation
PDF
Identification Simplified - An Introduction to Biometrics
PPT
Biometric ppt
PPT
Face morphing
PDF
Report rsa-conference 2017
PDF
Biometric Trends for 2017 Webinar
PDF
Smart Online 3 "Trust on Mobile Internet"
PPT
Biometrics ppt
Biometric slideshare
Biometric Presentation
biometrics
Slide-show on Biometrics
Behavioural biometrics and cognitive security authentication comparison study
Behavior biometrics - The silent revolution in digital fingerprinting
Spotlight on Children's Audio 2014 - Market Landscape & Trends in the US
Three trends in cybersecurity
Li charles emerging biometrics identity services in the cloud 02122015b - ...
Kb gait-recognition
Mobile biometric device trends joe hoerl
Intelli Finger Presentation
Identification Simplified - An Introduction to Biometrics
Biometric ppt
Face morphing
Report rsa-conference 2017
Biometric Trends for 2017 Webinar
Smart Online 3 "Trust on Mobile Internet"
Biometrics ppt
Ad

Similar to Biometrics (20)

PPTX
Biometrics
PPT
Biometricstechnology in iot and machine learning
PPT
Biometrics
PPSX
Biometrics Technology by Capt Awal
PPTX
Biometrics
PPT
Biometrics Technology Intresting PPT
PPTX
Biometrics clear presentation by Adduri kalyan(AK)
PPTX
Biomatric
PPT
Session -I.ppt Session -I.ppt Session -I.ppt
PDF
Biometrics Research/Thesis Paper
DOCX
seminar_report
PPT
Biometrics
PPTX
Bio shiv
PDF
Biometrics - automatic identification of individuals
DOC
Poster on biometrics
PPT
Biometric
PPT
Biometics technology
PPTX
PDF
Biometrics system penetration in mobile devices
PPT
biometric technology
Biometrics
Biometricstechnology in iot and machine learning
Biometrics
Biometrics Technology by Capt Awal
Biometrics
Biometrics Technology Intresting PPT
Biometrics clear presentation by Adduri kalyan(AK)
Biomatric
Session -I.ppt Session -I.ppt Session -I.ppt
Biometrics Research/Thesis Paper
seminar_report
Biometrics
Bio shiv
Biometrics - automatic identification of individuals
Poster on biometrics
Biometric
Biometics technology
Biometrics system penetration in mobile devices
biometric technology

More from Presentaionslive.blogspot.com (20)

PPSX
Cloud Computing Introduction
PPT
PPT
PPT
Networksecurity&cryptography
PPT
Brain computer interface
PPT
Information Security
DOC
4g magic communication
PPT
Spattern matching using biometric techniques
PPT
Novel architecture
PPT
PPT
Multimedia and gaming
PPTX
PPT
A multimodal interaction framework for pervasive game applications
PPT
1 spattern matching using biometric techniques
PPT
Unique p mail-addressing 97-03
Cloud Computing Introduction
Networksecurity&cryptography
Brain computer interface
Information Security
4g magic communication
Spattern matching using biometric techniques
Novel architecture
Multimedia and gaming
A multimodal interaction framework for pervasive game applications
1 spattern matching using biometric techniques
Unique p mail-addressing 97-03

Recently uploaded (20)

PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
1. Introduction to Computer Programming.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Architecture types and enterprise applications.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Tartificialntelligence_presentation.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
The various Industrial Revolutions .pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Hybrid model detection and classification of lung cancer
Group 1 Presentation -Planning and Decision Making .pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Programs and apps: productivity, graphics, security and other tools
1. Introduction to Computer Programming.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Architecture types and enterprise applications.pdf
Chapter 5: Probability Theory and Statistics
Tartificialntelligence_presentation.pptx
WOOl fibre morphology and structure.pdf for textiles
A novel scalable deep ensemble learning framework for big data classification...
The various Industrial Revolutions .pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Zenith AI: Advanced Artificial Intelligence
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Module 1.ppt Iot fundamentals and Architecture
Univ-Connecticut-ChatGPT-Presentaion.pdf
Hybrid model detection and classification of lung cancer

Biometrics

  • 1. To The world of Biometrics Welcome
  • 2. BIOMETRICS BY A.V.AJAY KIRAN [email_address]
  • 3. What is Biometrics? The word biometrics comes from the Greek words bios and metric, meaning'' life measurement''. By measuring something unique about an individual and using that to identify them, we can achieve a dramatic improvement in security of the key store. Newer biometric measurements include DNA from tissue samples, voice pattern, face pattern or even the arrangement of blood vessels in the retina or pattern of coloration in the cornea of the eye.
  • 4. Why Use Biometrics? Only biometrics can verify you as you Tokens (smartcards, etc.) aren't you and can be: lost stolen duplicated (some) forgotten Passwords aren't you and can be: forgotten shared observed broken
  • 5. SHORT HISTORY OF BIOMETRICS Joao de Barros, an explorer and writer, wrote that Chinese merchants used a form of biometrics by stamping children’s palm prints and footprints on paper with ink .In doing this, the Chinese solved a way to distinguish young children from one another. This is one of the earliest known cases of biometrics .Later an anthropologist named Alphonse Bertillion sought to fix the problem of identifying convicted criminals. He found that even if names changed, even if a person comes in disguise, certain elements of the body remained fixed” . This led him to form a method of measuring the distinguishable parts of a person’s body, which never changed throughout their life . Whenever a new criminal was caught, instead of taking down their name, the authorities would measure them and look for a matching card . This system was adopted by prisons and police stations across the country and world. As technology gets more and more advanced, the ways to distinguish the different biometrical signalments become more and more precise. led to field of biometric technologies that we live in today.
  • 6. Using Biometrics: Biometrics are used in two major ways : Identification and Verification. Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity 1of a suspect from crime scene information. Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.
  • 7. Physical Biometrics Fingerprint Hand Iris Retina Face Voice Retina DNA
  • 8. Fingerprint - analyzing fingertip patterns: Among all the biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points.
  • 9. Draw backs of fingure print biometrics When hand is injured or burnt and even if we have slight disturbance in the cuticles also it will not access the user. So,it’s a failure. The potential uses for this biometric appear to be limited only by the willingness of people to use it.
  • 10. Vascular Patterns - analyzing vein patterns Vascular patterns are best described as a picture of the veins in a person's hand or face. The thickness and location of these veins are believed to be unique enough to an individual to be used to verify a person's identity. The most common form of vascular pattern readers are hand-based, requiring the user to place their hand on a curved reader that takes an infrared scan. This scan creates a picture that can then be compared to a database to verify the user's stated identity.
  • 11. Advantages Vascular pattern scanners can be found in testing at major military installations and is being considered by some established companies in the security industry and multi-outlet retailers. advantages over its counterparts, including the great difficulty in emulating another person's vein structure, and not having to worry about rain, glasses, or external injuries. effects of aging, heart attacks, and medical problems with one's arteries on the scans has yet to be determined fully. It also requires a large amount of space to mount the device is that the entire hand can be scanned which may restrict its usability. Currently it is still building acceptance
  • 12. Disadvantages It cant be used alone. It should be used with another biometric technique.
  • 13. Facial Recognition - measuring facial characteristics User faces the camera, standing about two feet from it. The system will locate the user's face and perform matches against the claimed identity or the facial database. It is possible that the user may need to move and re attempt the verification based on his facial position. The system usually comes to a decision in less than 5 seconds. To prevent a fake face or mold from faking out the system, many systems now require the user to smile, blink, or otherwise move in a way that is human before verifying. Up to 128 Eigen vectors are created for each person in order to achieve unmistakable identification. Facial Recognition System (FRS) is combined with other suitable biometric technologies to reduce nuisance and false alarm rates. In a controlled environment with proper lighting and choke points, the system can be combined with access control systems to limit access through particular checkpoints.
  • 14. Iris recognition Iris recognition is a method of biometric uses pattern recognition techniques based on high-resolution images of the irides of an individual's eyes. unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual.
  • 15. Its stablity, or template longevity as, barring trauma, a single enrollment can last a lifetime You can cheat the iris scanner by putting on lens or glasses. Advantages of iris recognition Backdraws
  • 16. Retinal Scan - analyzing blood vessels in the eye Oldest biometrics as 1930's research suggested Scanning involves using a low-intensity light source and an optical coupler and can read the patterns at a great level of accuracy. It does require the user to remove glasses, place their eye close to the device, and focus on a certain point. that the patterns of blood vessels on the back of the human eye were unique to each individual
  • 17. Advantages There is no known way to replicate a retina, and a retina from a dead person would deteriorate too fast to be useful, so no extra precautions have been taken with retinal scans to be sure the user is a living human being. The difficulty in fooling such a device also make it a great long-term, high-security option.
  • 18. DNA - analyzing genetic makeup DNA evidence play a big part in many nations' criminal justice systems. It has been used to prove that suspects were involved in crimes and to free people who were wrongly convicted.It has been integral to several high-profile criminal cases. Most people have a basic idea of what DNA is. It's essentially an instruction manual and blueprint for everything in your body. A DNA molecule is a long, twisting chain known as a double helix.
  • 19. Advantages DNA is tightly wrapped into 23 pairs of chromosomes . This is what makes DNA evidence so valuable in investigations -- it's almost impossible for someone else to have DNA that is identical to yours.
  • 20. Behavioral biometrics: Two forms 1.Voice 2.Signature
  • 21. Speaker Recognition - analyzing vocal behavior Voice authentication, also known as “speaker verification”, is defined as the automated verification of a person’s claimed identity, based on unique characteristics of their voice. A simple microphone is enough to record the voice, and then most of the algorithm are analyzing the voice spectrum. Voice and speech can be combined to get a better system:
  • 22. Advantages To prevent recorded voice use, most devices require the high and low frequencies of the sound to match, which is difficult for many recording instruments to recreate well. Also, some devices generate random number sequences for each verification.
  • 23. Signature - analyzing signature biometrics Handwriting recognition system's sensors can include a touch-sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction. The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time.
  • 24. Advantages Specific details recorded by signature-scan may include the total time taken to sign, the ration of pen-up to pen-down time, the speed of the strokes, the pressure applied, the number and direction of the strokes, and the total size of the signature, among other variables ". So a forger would have to recreate your signature within some window of time while applying the correct pressure, except for 'pressure applied'.
  • 25. Future Research Biometrics has all of the desirable characteristics that we described in the beginning.we might develop an automated biometrics-based identification/verification system like Vein pattern , Ear shape , Body odor , Body salinity (salt) , Electronic nose The next few years you will see just about every thing come with biometric protection. Mobile phones, MP3 players, cars, laptop computers, building access, locker access.
  • 26. Conclusion Biometrics is a very interesting and exciting field that has be growing exponentially in recent years . The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world. As the demands for high-performance and highly reliable biometrics-based identification/verification systems increase, more hybrid biometrics-based systems are expected to be developed to meet the ever-increasing needs for automated personal identification.
  • 27. “ IN FUTURE BIOMETRICS WILL BE THE DOOR WAY TO ALL THE ACCESABLE SYSTEMS ”
  • 28. T h a n k y o u