SlideShare a Scribd company logo
2
Most read
4
Most read
Ppt on use of biomatrix in secure e trasaction
Biometrics = bios + metron. Bios means life and metron
means measure.
In the terms of computer security, biometrics refers to
authentication techniques that rely on measurable
physiological and individual characteristics that can be
automatically verified .
A Biometrics System is a system for the automated
recognition of individuals based on their behaviour and
biological characteristics. Also called
BEHAVIOMETRICS.
Biometric-based solutions are able to provide for
confidential financial transactions and personal data
privacy
There two types of biometrics
1. Physiological biometrics
2. Behavioral biometrics
Depending on the context, in a biometrics system, there are two
different ways to resolve a person’s identity
I. Verification
II. Identification
VERIFICATION
Comparing a sample against a single stored template is called
verification.
IDENTIFICATION
Search a sample against a database of templates.
1) Physiological biometrics :
Physiological are related to the shape of the body.
EXAMPLES :-
Handprint
Fingerprint
Retina
Face
2) Behavioral biometrics:
Behavioral are related to the behavior of a person.
EXAMPLES :-
Voice/Speech
Handwriting/Signature
Movement Patterns(i.e. typing, walking, etc.)
1) Physiological Biometrics
2) Behavioral Biometrics
Ppt on use of biomatrix in secure e trasaction
Everybody has unique handprints.
A handprint Biometric Systems
scans hand and finger sand the
data is compared with the
specimen stored for you in the
system. The user is allowed or
denied based on the result of this
verification.
Fingerprints are used in forensic
and identification for long time.
Fingerprint Biometric Systems
examine the unique
characteristics of your
fingerprints and use that
information to determine
whether or not you should be
Ppt on use of biomatrix in secure e trasaction
Retina Pattern Biometric system
uses an infrared beam to scan
your retina. Retina pattern
biometric systems examine the
unique characteristics of user’s
retina and compare that
information with stored pattern
to determine whether user should
be allowed access.
A facial recognisation system is a
computer application for
automatically identifying or
verifying a person from a digital
image or a video frame from a
video source.
Voice Patterns Biometric
Systems can also be used for
user authentication. Voice
Patterns Biometric Systems
examine the unique
characteristics of user’s voice.
Signature recognition is a
behavioral biometric. The
dynamics is measured as a
means of the pressure,
direction, acceleration and
the length of the strokes,
dynamics number of strokes
and their duration.
Keystroke Biometric Systems
examine the unique
characteristics of user’s
keystrokes and use that
information to determine
whether the user should be
allowed access.
• Criminal identification
• Prison security
• ATM and other Financial
Transactions
• PC/LAN Login
• Database access
• Border crossing controls
Biometrics
• Costly
• Facial imaging can also hinder
accurate identifications.
• Missing body part problem.
• False acceptances and rejections.
• The amount of comfort.
Security
Authentication
E-commerce and E-
governments
Secure Banking and Financial
Transaction
Digital Rights Management
Healthcare Application
Crime Investigation
Social Services
Time Clocks or Biometric time and attendance systems, which
are being increasingly used in various organizations to control
employee timekeeping.
Biometric safes and biometric locks, provides security to the
homeowners.
Biometric access control systems, providing strong security at
entrances.
Biometric systems are also developed for securing access to pc's
and providing single logon facilities.
Biometrics airport security devices are also deployed at some of
the world's famous airports to enhance the security standards.
Biometrics is a very interesting and exciting field that has be growing
exponentially in recent years (especially 2001).
While Biometric authentication can offer a high degree of security,
they are far from perfect solution.
The influences of biometric technology on society and the risks to
privacy and threat to identify will require meditation through
legislation.
The wide variety of physically unique traits our bodies give us will
soon allow us to live in a very secure password-less world.
QUESTIONS

More Related Content

PPTX
Biometric technologies
PPTX
Biometric of technology.ppt
PPTX
Biomatric technology
PPT
Biometric
PDF
Privacy and ethical issues in Biometric Systems
PPTX
Biometric Technology
PDF
Biometric seminar proma
Biometric technologies
Biometric of technology.ppt
Biomatric technology
Biometric
Privacy and ethical issues in Biometric Systems
Biometric Technology
Biometric seminar proma

What's hot (18)

DOCX
Biometrics
PPT
Biometrics ppt
DOC
Personal authentication using 3 d finger geometry (synopsis)
PPTX
Biometric Technology
PPTX
Bio-metric Safety engineering in mobile devices
PPT
Ecrime Practical Biometric
PPTX
PDF
Biometric Technology
PPTX
Ins & Outs of Biometric Authentication
DOC
13 biometrics - fool proof security
PPTX
Biometric
PPT
Ubiquitous security- is it just biometrics?
DOC
Biometric technology
PDF
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
PPTX
Biometrics present
PPTX
Fingerprinting technology
PPTX
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
Biometrics
Biometrics ppt
Personal authentication using 3 d finger geometry (synopsis)
Biometric Technology
Bio-metric Safety engineering in mobile devices
Ecrime Practical Biometric
Biometric Technology
Ins & Outs of Biometric Authentication
13 biometrics - fool proof security
Biometric
Ubiquitous security- is it just biometrics?
Biometric technology
A STUDY ON THE STANDARDS OF THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA
Biometrics present
Fingerprinting technology
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
Ad

Viewers also liked (20)

PPTX
secued cloud
PPTX
Ppt on open and close door using Applet
DOCX
Table of contents blue brain
PPTX
History of Laptop
PPT
Wireless Charging Of Mobile
PPTX
Cloud Security
PPTX
Secued Cloud
PPTX
Wireless network
PPTX
Data As A Service
PPTX
Fuels Saver System
PPT
Environmental law
PPTX
Digital Locker
PPTX
Wireless mobile charging using microwaves
PPTX
Resource management
PPTX
Data warehousing
PPTX
Seminar on telephone directory
PPTX
Cloud Cmputing Security
PPTX
Energy Harvesing Through Reverse Electrowetting
PPTX
Applet programming
PPTX
Secure Cloud Issues
secued cloud
Ppt on open and close door using Applet
Table of contents blue brain
History of Laptop
Wireless Charging Of Mobile
Cloud Security
Secued Cloud
Wireless network
Data As A Service
Fuels Saver System
Environmental law
Digital Locker
Wireless mobile charging using microwaves
Resource management
Data warehousing
Seminar on telephone directory
Cloud Cmputing Security
Energy Harvesing Through Reverse Electrowetting
Applet programming
Secure Cloud Issues
Ad

Similar to Ppt on use of biomatrix in secure e trasaction (20)

PPTX
Bio-Metric
PPTX
Biometrics clear presentation by Adduri kalyan(AK)
PPT
Biometric's final ppt
PDF
BiometricsReportFlat
PPT
Biometrics - Chapter 1 Introduction.pptx
PPT
Biometrics_ppt.ppt
PPT
Biometrics_ppt.ppt
PPT
Biometrics
PPTX
Biometrics(By Aashish Tanania)
PDF
B VOC Level-7: Biometric Recognition that aims towards establishing one’s ide...
DOC
Poster on biometrics
PPTX
Biometric authentication
PPTX
Biometrics
PDF
Biometrics system penetration in mobile devices
PPTX
Biometrics
PPTX
Biometric Systems
PPTX
biometrics
PPTX
Biometrics
PPTX
INTRODUCTION TO BIOMETRIC.pptx
PPTX
21392009 laddi
Bio-Metric
Biometrics clear presentation by Adduri kalyan(AK)
Biometric's final ppt
BiometricsReportFlat
Biometrics - Chapter 1 Introduction.pptx
Biometrics_ppt.ppt
Biometrics_ppt.ppt
Biometrics
Biometrics(By Aashish Tanania)
B VOC Level-7: Biometric Recognition that aims towards establishing one’s ide...
Poster on biometrics
Biometric authentication
Biometrics
Biometrics system penetration in mobile devices
Biometrics
Biometric Systems
biometrics
Biometrics
INTRODUCTION TO BIOMETRIC.pptx
21392009 laddi

More from Devyani Vaidya (10)

PPT
PPT
Fundamental file structure concepts & managing files of records
PPT
Cosequential processing and the sorting of large files
PPT
Introduction to the design and specification of file structures
PPTX
Mobile Phone Cloning
PPTX
Barcode Technology
PPTX
3D- Doctor
PPTX
3D-Password
PPTX
Cloud Security
PPTX
Bigtable a distributed storage system
Fundamental file structure concepts & managing files of records
Cosequential processing and the sorting of large files
Introduction to the design and specification of file structures
Mobile Phone Cloning
Barcode Technology
3D- Doctor
3D-Password
Cloud Security
Bigtable a distributed storage system

Recently uploaded (20)

PDF
Classroom Observation Tools for Teachers
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharma ospi slides which help in ospi learning
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Institutional Correction lecture only . . .
PDF
RMMM.pdf make it easy to upload and study
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Classroom Observation Tools for Teachers
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharma ospi slides which help in ospi learning
O7-L3 Supply Chain Operations - ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial disease of the cardiovascular and lymphatic systems
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
O5-L3 Freight Transport Ops (International) V1.pdf
Institutional Correction lecture only . . .
RMMM.pdf make it easy to upload and study
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

Ppt on use of biomatrix in secure e trasaction

  • 2. Biometrics = bios + metron. Bios means life and metron means measure. In the terms of computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified . A Biometrics System is a system for the automated recognition of individuals based on their behaviour and biological characteristics. Also called BEHAVIOMETRICS. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy
  • 3. There two types of biometrics 1. Physiological biometrics 2. Behavioral biometrics Depending on the context, in a biometrics system, there are two different ways to resolve a person’s identity I. Verification II. Identification VERIFICATION Comparing a sample against a single stored template is called verification. IDENTIFICATION Search a sample against a database of templates.
  • 4. 1) Physiological biometrics : Physiological are related to the shape of the body. EXAMPLES :- Handprint Fingerprint Retina Face 2) Behavioral biometrics: Behavioral are related to the behavior of a person. EXAMPLES :- Voice/Speech Handwriting/Signature Movement Patterns(i.e. typing, walking, etc.) 1) Physiological Biometrics 2) Behavioral Biometrics
  • 6. Everybody has unique handprints. A handprint Biometric Systems scans hand and finger sand the data is compared with the specimen stored for you in the system. The user is allowed or denied based on the result of this verification. Fingerprints are used in forensic and identification for long time. Fingerprint Biometric Systems examine the unique characteristics of your fingerprints and use that information to determine whether or not you should be
  • 8. Retina Pattern Biometric system uses an infrared beam to scan your retina. Retina pattern biometric systems examine the unique characteristics of user’s retina and compare that information with stored pattern to determine whether user should be allowed access. A facial recognisation system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.
  • 9. Voice Patterns Biometric Systems can also be used for user authentication. Voice Patterns Biometric Systems examine the unique characteristics of user’s voice. Signature recognition is a behavioral biometric. The dynamics is measured as a means of the pressure, direction, acceleration and the length of the strokes, dynamics number of strokes and their duration.
  • 10. Keystroke Biometric Systems examine the unique characteristics of user’s keystrokes and use that information to determine whether the user should be allowed access.
  • 11. • Criminal identification • Prison security • ATM and other Financial Transactions • PC/LAN Login • Database access • Border crossing controls Biometrics • Costly • Facial imaging can also hinder accurate identifications. • Missing body part problem. • False acceptances and rejections. • The amount of comfort.
  • 12. Security Authentication E-commerce and E- governments Secure Banking and Financial Transaction Digital Rights Management Healthcare Application Crime Investigation Social Services
  • 13. Time Clocks or Biometric time and attendance systems, which are being increasingly used in various organizations to control employee timekeeping. Biometric safes and biometric locks, provides security to the homeowners. Biometric access control systems, providing strong security at entrances. Biometric systems are also developed for securing access to pc's and providing single logon facilities. Biometrics airport security devices are also deployed at some of the world's famous airports to enhance the security standards.
  • 14. Biometrics is a very interesting and exciting field that has be growing exponentially in recent years (especially 2001). While Biometric authentication can offer a high degree of security, they are far from perfect solution. The influences of biometric technology on society and the risks to privacy and threat to identify will require meditation through legislation. The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure password-less world.