SlideShare a Scribd company logo
National level Webinar
(21st – 24th June 2020)
O R G A N I ZI N G S E C R E TA RY
D R . R . G U N AVAT H I ,
H E A D & A S S O C I AT E P R O F E S S O R ,
P G & R E S E A RC H D E PA RT M E N T O F
C O M P U T E R A P P L I C AT I O N S
PG & Research Department of Computer Applications
organized
IoT – Applications and Machine Learning
GOKUL RAJAN V
Assistant Professor ,
School of CSE
Galgotias University, Uttar Pradesh
Gokulrajan.v@gmail.com ,
+91 8012 880 991.
IoT with Biometrics
Agenda
 What is IoT?
 What is Biometrics?
 IoT with biometrics
 Architecture
 Applications
 Conclusion
 Feature Works
7/1/2020Gokul Rajan V
IoT Definition
 Wikipedia
The IoT refers the uniquely identifiable object and their
virtual representation in an internet like structure.
 Cisco
IoT is network of physical object accessed through the
internet as defined by technology analysts and visionaries.
These objects contain enabled technology to interact with
internal states or external environment. In other words, when
objects can sense and communicate, it changes how and where
decisions are made, and who makes them.
7/1/2020Gokul Rajan V
Cont…
 ITU
The IoT can be viewed as a global infrastructure for the
information society, enabling advanced services by
interconnecting (physical and virtual) things based on
existing and evolving interoperable information and
communication technologies (ICT).
7/1/2020Gokul Rajan V
History
7/1/2020Gokul Rajan V
Why IoT
 Ubiquitous Connectivity
 Widespread Adoption of IP
 Computing Economics
 Miniaturization
 Advances in Data Analytics
 Rise of Cloud Computing
7/1/2020Gokul Rajan V
Characteristics of IoT
 Interconnectivity: With regard to the IoT, anything can be
interconnected with the global information and communication
infrastructure.
 Heterogeneity: The devices in the IoT are heterogeneous as based on
different hardware platforms and networks. They can interact with other
devices or service platforms through different networks.
 Dynamic changes: The state of devices change dynamically, e.g.,
sleeping and waking up, connected and/or disconnected as well as the
context of devices including location and speed. Moreover, the number
of devices can change dynamically.
 Enormous scale: The number of devices that need to be managed and
that communicate with each other will be at least an order of magnitude
larger than the devices connected to the current Internet. The ratio of
communication triggered by devices as compared to communication
triggered by humans will noticeably shift towards devicetriggered
communication.
7/1/2020Gokul Rajan V
Architecture
7/1/2020Gokul Rajan V
Arduino Block Diagram
7/1/2020Gokul Rajan V
Applications
7/1/2020Gokul Rajan V
Cont…
 Smart Home
 Wearable's - Fit Bits, heart rate monitors and smart watches
 Smart City
 Connected car
 Healthcare
 Smart retails
 Smart farming
 agriculture
 Ambient Umbrella – Weather forecasting
7/1/2020Gokul Rajan V
Disadvantages
7/1/2020Gokul Rajan V
 Lack of security and privacy
If all of our information is stored on the internet, people could hack into it
 Losing control of your life
No system is robust and fault-free
 The loss of jobs
Automation of IoT
Biometrics
 Biometrics refers to the automatic identification of a
person based on his or her physiological and behavioral
characteristics
 Physiological biometrics
Fingerprint, Fingers/ Hand vain, Hand geometry, Iris, Retina, Face, Ear,
voice, Thermography, DNA, etc.
 Behavioral biometrics
Gait, Lip Movement, Signature, Key stroke, etc.
7/1/2020Gokul Rajan V
History
 1858 – First systematic capture of hand images for identification purposes is
recorded
 1883 – Twain writes about fingerprints in “Life on the Mississippi”
 1870 – Bertillon develops anthropometries to identify individuals
 1892 – Galton develops a classification system for fingerprints
 1896 – Henry develops a fingerprint classification system
 1903 – NY State Prisons begin using fingerprints
 1903 – Bertillon System collapses
 1936 – Concept of using the iris pattern for identification is proposed
 1960s – Face recognition becomes semi-automated
 1960 – First model of acoustic speech production is created
 1965 -Automated signature recognition research begins
 1969 – FBI pushes to make fingerprint recognition an automated process
 1970 – Behavioral components of speech are first modeled
 1976 – First prototype system for speaker recognition is developed– Face
Recognition takes another step towards automation
7/1/2020Gokul Rajan V
7/1/2020Gokul Rajan V
 1985 – Concept that no two irides are alike is proposed
 1985 – Patent for vascular pattern recognition is awarded to Joseph Rice
 1986 – Patent is awarded stating that the iris can be used for identification
 1988 – First semi-automated facial recognition system is deployed
 1992 – Biometric Consortium is established within US Government
 1994- First iris recognition algorithm is patented
 1994 – Palm System is benchmarked
 1998- FBI launches COOlS (DNA forensic database)
 2000 – First Face Recognition Vendor Test (FRVT 2000) is held
 2002 – ISO/IEC standards committee on biometrics is established
 2008 – U.S. Government begin coordinating biometric database use
 2013 – Apple includes fingerprint scanners into consumer-targed smart
phones
Why Biometrics
 Most Secure
 Cant be stolen, borrowed or forgotten
 Convenient
 Passwords are not user friendly
7/1/2020Gokul Rajan V
Characteristics
 Uniqueness
 Universality
 Permanence
 Measurability
 User friendliness
7/1/2020Gokul Rajan V
Applications
 Verification
“one-to-one” biometric comparison
 Identification
“one-to-many” comparison
 Duplicate checking
whether there are individuals represented more than once in a database
7/1/2020Gokul Rajan V
Cont…
7/1/2020Gokul Rajan V
 Law enforcement and public security (criminal/suspect
identification)
 Military (enemy/ally identification)
 Border, travel,
and migration control (traveller/migrant/passenger
identification)
 Civil identification (citizen/resident/voter identification)
 Healthcare and subsidies (patient/beneficiary/healthcare
professional identification)
 Physical and logical
access (owner/user/employee/contractor/partner identification)
 Commercial applications (consumer/customer identification)
Process of Recognition
7/1/2020Gokul Rajan V
Biometrics towards IoT
 Biometric Attendance System
7/1/2020Gokul Rajan V
Futures
7/1/2020Gokul Rajan V
 Smart Fridge
Your fridge contacts a
supermarket and orders
vegetables, which you are
running out of. And it also
sends you a message regarding
the order.
Here are some scenarios that may sound like fiction, but
are possible with IoT. So, have a look:
7/1/2020Gokul Rajan V
 Smart Car
Your car sends a message
when you are heading back to
your home in order to switch
on the lights, tune the TV to
your liked channel so that you
feel welcomed after reaching
your house.
7/1/2020Gokul Rajan V
 Smart Alarm
After waking you up, your alarm clock sends a signal to the
geyser to heat water at your preferred temperature or conveys a
message to your coffee maker with regard to brewing coffee
Cont…
7/1/2020Gokul Rajan V
 Smart ID cards
Unlike conventional biometric
processes, the "Match-on-
Card" algorithm allows
fingerprints to be matched
locally with a reference frame
thanks to a microprocessor
built into the biometric ID card
without having to connect to a
central biometric database (1:1
matching)
7/1/2020Gokul Rajan V
7/1/2020Gokul Rajan V

More Related Content

PDF
Internet Of things
PPTX
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
PDF
AI Deep Learning Patents Data 3Q 2016
PPTX
IOT- information Technology
PPTX
IOT and Application Performance Monitoring
PPTX
Sensors, Wearables and Internet of Things - The Dawn of the Smart Era
PDF
The Internet of Things - What It Is, Where Its Headed and Its Applications
Internet Of things
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
AI Deep Learning Patents Data 3Q 2016
IOT- information Technology
IOT and Application Performance Monitoring
Sensors, Wearables and Internet of Things - The Dawn of the Smart Era
The Internet of Things - What It Is, Where Its Headed and Its Applications

What's hot (20)

PDF
Internet of Things (IoT) - workshop with wifi chip
DOCX
Internet of things Seminar Reprt
PPTX
Recent trends in IoT
PDF
IoT and machine learning - Computational Intelligence conference
PPTX
IoT Innovation Fund for Business Growth
PPTX
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
PPT
Internet Of Things (IoT)
PPTX
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
PDF
Internet of Things for Smart City
PDF
IoT LAB
PDF
Evolution of Internet of Things (IoT) Ecosystem - Potential in India
PDF
Internet of Things for Libraries
PDF
The Current and Future State of Internet of Things: Unveiling the Opportunities
PDF
IoT : Research, Development, Challenges
PPTX
Internet of things (IOT) | Future Trends
PPTX
Iot basics
PDF
Internet of Things
PDF
Internet of things
PDF
101 guide - the Internet of Things
Internet of Things (IoT) - workshop with wifi chip
Internet of things Seminar Reprt
Recent trends in IoT
IoT and machine learning - Computational Intelligence conference
IoT Innovation Fund for Business Growth
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
Internet Of Things (IoT)
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
Internet of Things for Smart City
IoT LAB
Evolution of Internet of Things (IoT) Ecosystem - Potential in India
Internet of Things for Libraries
The Current and Future State of Internet of Things: Unveiling the Opportunities
IoT : Research, Development, Challenges
Internet of things (IOT) | Future Trends
Iot basics
Internet of Things
Internet of things
101 guide - the Internet of Things
Ad

Similar to Io t with biometrics (20)

PPT
PPTX
INTRODUCTION TO BIOMETRIC.pptx
PDF
Biometrics Technology
PDF
Personal Healthcare IOT on PCF using Spring
PPTX
Io t research_arpanpal_iem
PPTX
Internet of Things
PPTX
Biometrics 2.pptx
PPTX
Toastmaster Speech - Internet of Things
PPT
User authentication trends
PDF
Introduction1.pdf Add more information to your upload Add more information to...
PPTX
Presentation Week 2-4_Introduction to Information Systems and Security Final....
PPTX
Biometrics
PPT
Biomatrics
PPTX
Hacking health: IoT, analytics and other trends
PPT
Introduction to Internet of things
DOCX
Biometric Analytics & Internet of Things
PPTX
Biometrics for Cognitive IoT for WithTheBest Conference oct 15 2017
PDF
2010 Biometrics Conf: Biometrics, From High-Stakes Exams To Loyalty Cards
PPT
Biometric by amin
INTRODUCTION TO BIOMETRIC.pptx
Biometrics Technology
Personal Healthcare IOT on PCF using Spring
Io t research_arpanpal_iem
Internet of Things
Biometrics 2.pptx
Toastmaster Speech - Internet of Things
User authentication trends
Introduction1.pdf Add more information to your upload Add more information to...
Presentation Week 2-4_Introduction to Information Systems and Security Final....
Biometrics
Biomatrics
Hacking health: IoT, analytics and other trends
Introduction to Internet of things
Biometric Analytics & Internet of Things
Biometrics for Cognitive IoT for WithTheBest Conference oct 15 2017
2010 Biometrics Conf: Biometrics, From High-Stakes Exams To Loyalty Cards
Biometric by amin
Ad

More from Dr.R. Gunavathi Ramasamy (9)

PPTX
Iot transforming the future of agriculture
PPTX
Machine learningfor computervision_ashutoshupadhyay
PPTX
Launching into machine learning
PPTX
Iot trends and technologies development in terms of Machine Learning
PPTX
Blockchain overview
PPTX
Artificial Intelligence and Expert System
Iot transforming the future of agriculture
Machine learningfor computervision_ashutoshupadhyay
Launching into machine learning
Iot trends and technologies development in terms of Machine Learning
Blockchain overview
Artificial Intelligence and Expert System

Recently uploaded (20)

PPTX
GDM (1) (1).pptx small presentation for students
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Cell Types and Its function , kingdom of life
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Basic Mud Logging Guide for educational purpose
PPTX
master seminar digital applications in india
PDF
Complications of Minimal Access Surgery at WLH
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
01-Introduction-to-Information-Management.pdf
GDM (1) (1).pptx small presentation for students
Computing-Curriculum for Schools in Ghana
Cell Types and Its function , kingdom of life
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
VCE English Exam - Section C Student Revision Booklet
Supply Chain Operations Speaking Notes -ICLT Program
Microbial disease of the cardiovascular and lymphatic systems
Sports Quiz easy sports quiz sports quiz
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Anesthesia in Laparoscopic Surgery in India
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Basic Mud Logging Guide for educational purpose
master seminar digital applications in india
Complications of Minimal Access Surgery at WLH
Module 4: Burden of Disease Tutorial Slides S2 2025
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPH.pptx obstetrics and gynecology in nursing
Final Presentation General Medicine 03-08-2024.pptx
01-Introduction-to-Information-Management.pdf

Io t with biometrics

  • 1. National level Webinar (21st – 24th June 2020) O R G A N I ZI N G S E C R E TA RY D R . R . G U N AVAT H I , H E A D & A S S O C I AT E P R O F E S S O R , P G & R E S E A RC H D E PA RT M E N T O F C O M P U T E R A P P L I C AT I O N S PG & Research Department of Computer Applications organized IoT – Applications and Machine Learning
  • 2. GOKUL RAJAN V Assistant Professor , School of CSE Galgotias University, Uttar Pradesh Gokulrajan.v@gmail.com , +91 8012 880 991. IoT with Biometrics
  • 3. Agenda  What is IoT?  What is Biometrics?  IoT with biometrics  Architecture  Applications  Conclusion  Feature Works 7/1/2020Gokul Rajan V
  • 4. IoT Definition  Wikipedia The IoT refers the uniquely identifiable object and their virtual representation in an internet like structure.  Cisco IoT is network of physical object accessed through the internet as defined by technology analysts and visionaries. These objects contain enabled technology to interact with internal states or external environment. In other words, when objects can sense and communicate, it changes how and where decisions are made, and who makes them. 7/1/2020Gokul Rajan V
  • 5. Cont…  ITU The IoT can be viewed as a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies (ICT). 7/1/2020Gokul Rajan V
  • 7. Why IoT  Ubiquitous Connectivity  Widespread Adoption of IP  Computing Economics  Miniaturization  Advances in Data Analytics  Rise of Cloud Computing 7/1/2020Gokul Rajan V
  • 8. Characteristics of IoT  Interconnectivity: With regard to the IoT, anything can be interconnected with the global information and communication infrastructure.  Heterogeneity: The devices in the IoT are heterogeneous as based on different hardware platforms and networks. They can interact with other devices or service platforms through different networks.  Dynamic changes: The state of devices change dynamically, e.g., sleeping and waking up, connected and/or disconnected as well as the context of devices including location and speed. Moreover, the number of devices can change dynamically.  Enormous scale: The number of devices that need to be managed and that communicate with each other will be at least an order of magnitude larger than the devices connected to the current Internet. The ratio of communication triggered by devices as compared to communication triggered by humans will noticeably shift towards devicetriggered communication. 7/1/2020Gokul Rajan V
  • 12. Cont…  Smart Home  Wearable's - Fit Bits, heart rate monitors and smart watches  Smart City  Connected car  Healthcare  Smart retails  Smart farming  agriculture  Ambient Umbrella – Weather forecasting 7/1/2020Gokul Rajan V
  • 13. Disadvantages 7/1/2020Gokul Rajan V  Lack of security and privacy If all of our information is stored on the internet, people could hack into it  Losing control of your life No system is robust and fault-free  The loss of jobs Automation of IoT
  • 14. Biometrics  Biometrics refers to the automatic identification of a person based on his or her physiological and behavioral characteristics  Physiological biometrics Fingerprint, Fingers/ Hand vain, Hand geometry, Iris, Retina, Face, Ear, voice, Thermography, DNA, etc.  Behavioral biometrics Gait, Lip Movement, Signature, Key stroke, etc. 7/1/2020Gokul Rajan V
  • 15. History  1858 – First systematic capture of hand images for identification purposes is recorded  1883 – Twain writes about fingerprints in “Life on the Mississippi”  1870 – Bertillon develops anthropometries to identify individuals  1892 – Galton develops a classification system for fingerprints  1896 – Henry develops a fingerprint classification system  1903 – NY State Prisons begin using fingerprints  1903 – Bertillon System collapses  1936 – Concept of using the iris pattern for identification is proposed  1960s – Face recognition becomes semi-automated  1960 – First model of acoustic speech production is created  1965 -Automated signature recognition research begins  1969 – FBI pushes to make fingerprint recognition an automated process  1970 – Behavioral components of speech are first modeled  1976 – First prototype system for speaker recognition is developed– Face Recognition takes another step towards automation 7/1/2020Gokul Rajan V
  • 16. 7/1/2020Gokul Rajan V  1985 – Concept that no two irides are alike is proposed  1985 – Patent for vascular pattern recognition is awarded to Joseph Rice  1986 – Patent is awarded stating that the iris can be used for identification  1988 – First semi-automated facial recognition system is deployed  1992 – Biometric Consortium is established within US Government  1994- First iris recognition algorithm is patented  1994 – Palm System is benchmarked  1998- FBI launches COOlS (DNA forensic database)  2000 – First Face Recognition Vendor Test (FRVT 2000) is held  2002 – ISO/IEC standards committee on biometrics is established  2008 – U.S. Government begin coordinating biometric database use  2013 – Apple includes fingerprint scanners into consumer-targed smart phones
  • 17. Why Biometrics  Most Secure  Cant be stolen, borrowed or forgotten  Convenient  Passwords are not user friendly 7/1/2020Gokul Rajan V
  • 18. Characteristics  Uniqueness  Universality  Permanence  Measurability  User friendliness 7/1/2020Gokul Rajan V
  • 19. Applications  Verification “one-to-one” biometric comparison  Identification “one-to-many” comparison  Duplicate checking whether there are individuals represented more than once in a database 7/1/2020Gokul Rajan V
  • 20. Cont… 7/1/2020Gokul Rajan V  Law enforcement and public security (criminal/suspect identification)  Military (enemy/ally identification)  Border, travel, and migration control (traveller/migrant/passenger identification)  Civil identification (citizen/resident/voter identification)  Healthcare and subsidies (patient/beneficiary/healthcare professional identification)  Physical and logical access (owner/user/employee/contractor/partner identification)  Commercial applications (consumer/customer identification)
  • 22. Biometrics towards IoT  Biometric Attendance System 7/1/2020Gokul Rajan V
  • 23. Futures 7/1/2020Gokul Rajan V  Smart Fridge Your fridge contacts a supermarket and orders vegetables, which you are running out of. And it also sends you a message regarding the order. Here are some scenarios that may sound like fiction, but are possible with IoT. So, have a look:
  • 24. 7/1/2020Gokul Rajan V  Smart Car Your car sends a message when you are heading back to your home in order to switch on the lights, tune the TV to your liked channel so that you feel welcomed after reaching your house.
  • 25. 7/1/2020Gokul Rajan V  Smart Alarm After waking you up, your alarm clock sends a signal to the geyser to heat water at your preferred temperature or conveys a message to your coffee maker with regard to brewing coffee
  • 26. Cont… 7/1/2020Gokul Rajan V  Smart ID cards Unlike conventional biometric processes, the "Match-on- Card" algorithm allows fingerprints to be matched locally with a reference frame thanks to a microprocessor built into the biometric ID card without having to connect to a central biometric database (1:1 matching)