SlideShare ist ein Scribd-Unternehmen logo
1 von 19
BIOMETRICS
PRESENTED BY
VISHWAJEET & ADOTHU RAMBABU
ROLL NO – 467/11 & 537/11
NATIONAL INSTITUTE OF TECHNOLOGY
JAMSHEDPUR, INDIA – 831014
INTRODUCTION
 Biometrics refers to the automatic identification of a
person based on his or her physiological or behavioral
characteristics.
 Biometrics is an accurate method of authentication that
uses the physiological and biological traits of a person to
verify and establish their identity.
PHYSIOLOGICAL AND/OR BEHAVIORAL
CHARACTERISTICS
 Behavioral:
 Voice
 Keystroke
 Signature
 Physiological:
 Fingerprint
 Hand
 Eyes (Iris , Retina)
 DNA
 Face
BIOMETRICS
BIOMETRICS: WHY?
 Eliminate memorization –
◦ Users don’t have to memorize features of their voice, face, eyes, or fingerprints
 Eliminate misplaced tokens –
◦ Users won’t forget to bring fingerprints to work
 Can’t be delegated –
◦ Users can’t lend fingers or faces to someone else
 Often unique –
◦ Save money and maintain database integrity by eliminating duplicate enrollments
WORKING OF BIOMETRICS TECHNOLOGY
ALL BIOMETRIC SYSTEMS WORKS IN A FOUR-STAGE PROCESS THAT CONSISTS OF
THE FOLLOWING STEPS:
• CAPTURE : A Biometric system collects the sample of biometric features like
fingerprint, voice etc of the person who wants to login to the system.
• EXTRACTION: The data extraction is done uniquely from the sample and a template is
created. Unique features are then extracted by the system and converted into a digital
biometric code. This sample is then stored as the biometric template for that individual.
• COMPARISON: The template is then compared with a new sample. The biometric data
are then stored as the biometric template or template or reference template for that
person.
• MATCH/NON-MATCH: The system then decides whether the features extracted from the
new sample are a match or a non-match with the template.
SIGNATURE SCAN
 Measures speed, pressure, stroke order an image of signature.
 Non-repudiation
 Mainly used for verification
# PROBLEMS:
 Forgers could reproduce
VOICE VERIFICATION
Measures the sound waves of human speech.
 pitch, intensity, quality and duration.
 user talks to a microphone a passphrase.
 voice print is compare to a previous one.
#PROBLEMS:
 include background noise
KEYSTROKE SCAN
Measures the time between strokes and duration of key pressed.
 Most commonly used in systems where
keyboard is already being used.
FINGER PRINT RECOGNITION
Fingerprint verify the authenticity of the individual.
Among all the biometric techniques, fingerprint-based identification is the oldest
method that has been successfully used in numerous applications.
Everyone is known to have unique, immutable
fingerprints. A fingerprint is made of a series of
ridges and furrows on the surface of the finger.
# Advantage:
Low storage space required compared to
other ones.
RETINA RECOGNITION
 Scan the retina to authenticate the identity of a person.
 Unique to each person.
 Unique to each eye.
 Highly reliable because no two people have
the same retinal pattern.
# Problems:
1. It has extremely low acceptance rate .
2. Measurement accuracy can be affected by a disease
3. Not very user friendly
FACIAL RECOGNITION
 Location and position of facial features.
 Distance between the eyes.
 Distance between the eyes and nose ridge.
 Angle of a cheek.
 Slope of the nose.
 Facial temperatures.
HAND SCAN
Typical systems measure 90 different features:
 Overall hand and finger width
 Distance between joints
 Bone structure
Primarily for access control:
 Machine rooms
 Olympics
Strengths:
 No negative connotations – non-intrusive
 Reasonably robust systems
Weaknesses:
 Accuracy is limited; can only be used for 1-to-1 verification
 Bulky scanner
TEMPLATE SIZE
Biometric Approx. Template Size
Voice 70k – 80k
Face 84 bytes – 2k
Signature 500 bytes – 1000 bytes
Fingerprint 256 bytes – 1.2k
Hand Geometry 9 bytes
Iris 256 bytes – 512 bytes
Retina 96 bytes
Advantages :
 Biometric attributes are unique and these can’t be faked or interchanged so,
this uniqueness imparts a high level security to these systems.
 There is no need for remembering passwords, pin’s etc.
Disadvantages :
 Biometric template data consume more space than the conventional user
id/password combinations.
Advantages & Disadvantages
APPLICATIONS
Commercial
 Computer login
 Electronic payment
 ATMS
Government
 Passport control
Forensic
 Missing persons
 Criminal investigations
BIOMETRIC MARKET SHARE
References
 Biometrics.gov.
http://www.biometrics.gov/ReferenceRoom/Introduction.aspx
 Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition."
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1
(2004): 4-20. IEEE Xplore.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027
 Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer.
http://libcat.clemson.edu/record=b2478857
 Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction
Evaluating Biometric Systems." Computer 33.2 (2000): 56-63. IEEE Xplore.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=820040
 http://bprl.cs.clemson.edu/about.html
 http://bprl.cs.clemson.edu/projects.html
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsAbhishek Mishra
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 

Was ist angesagt? (20)

Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 

Ähnlich wie Biometrics

Ähnlich wie Biometrics (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptxBiometrics-Technology-PPT.pptx
Biometrics-Technology-PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Access Control
Access ControlAccess Control
Access Control
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
biometrics
biometricsbiometrics
biometrics
 

Kürzlich hochgeladen

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Kürzlich hochgeladen (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Biometrics

  • 1. BIOMETRICS PRESENTED BY VISHWAJEET & ADOTHU RAMBABU ROLL NO – 467/11 & 537/11 NATIONAL INSTITUTE OF TECHNOLOGY JAMSHEDPUR, INDIA – 831014
  • 2. INTRODUCTION  Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics.  Biometrics is an accurate method of authentication that uses the physiological and biological traits of a person to verify and establish their identity.
  • 3. PHYSIOLOGICAL AND/OR BEHAVIORAL CHARACTERISTICS  Behavioral:  Voice  Keystroke  Signature  Physiological:  Fingerprint  Hand  Eyes (Iris , Retina)  DNA  Face
  • 5. BIOMETRICS: WHY?  Eliminate memorization – ◦ Users don’t have to memorize features of their voice, face, eyes, or fingerprints  Eliminate misplaced tokens – ◦ Users won’t forget to bring fingerprints to work  Can’t be delegated – ◦ Users can’t lend fingers or faces to someone else  Often unique – ◦ Save money and maintain database integrity by eliminating duplicate enrollments
  • 6. WORKING OF BIOMETRICS TECHNOLOGY ALL BIOMETRIC SYSTEMS WORKS IN A FOUR-STAGE PROCESS THAT CONSISTS OF THE FOLLOWING STEPS: • CAPTURE : A Biometric system collects the sample of biometric features like fingerprint, voice etc of the person who wants to login to the system. • EXTRACTION: The data extraction is done uniquely from the sample and a template is created. Unique features are then extracted by the system and converted into a digital biometric code. This sample is then stored as the biometric template for that individual. • COMPARISON: The template is then compared with a new sample. The biometric data are then stored as the biometric template or template or reference template for that person. • MATCH/NON-MATCH: The system then decides whether the features extracted from the new sample are a match or a non-match with the template.
  • 7. SIGNATURE SCAN  Measures speed, pressure, stroke order an image of signature.  Non-repudiation  Mainly used for verification # PROBLEMS:  Forgers could reproduce
  • 8. VOICE VERIFICATION Measures the sound waves of human speech.  pitch, intensity, quality and duration.  user talks to a microphone a passphrase.  voice print is compare to a previous one. #PROBLEMS:  include background noise
  • 9. KEYSTROKE SCAN Measures the time between strokes and duration of key pressed.  Most commonly used in systems where keyboard is already being used.
  • 10. FINGER PRINT RECOGNITION Fingerprint verify the authenticity of the individual. Among all the biometric techniques, fingerprint-based identification is the oldest method that has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. # Advantage: Low storage space required compared to other ones.
  • 11. RETINA RECOGNITION  Scan the retina to authenticate the identity of a person.  Unique to each person.  Unique to each eye.  Highly reliable because no two people have the same retinal pattern. # Problems: 1. It has extremely low acceptance rate . 2. Measurement accuracy can be affected by a disease 3. Not very user friendly
  • 12. FACIAL RECOGNITION  Location and position of facial features.  Distance between the eyes.  Distance between the eyes and nose ridge.  Angle of a cheek.  Slope of the nose.  Facial temperatures.
  • 13. HAND SCAN Typical systems measure 90 different features:  Overall hand and finger width  Distance between joints  Bone structure Primarily for access control:  Machine rooms  Olympics Strengths:  No negative connotations – non-intrusive  Reasonably robust systems Weaknesses:  Accuracy is limited; can only be used for 1-to-1 verification  Bulky scanner
  • 14. TEMPLATE SIZE Biometric Approx. Template Size Voice 70k – 80k Face 84 bytes – 2k Signature 500 bytes – 1000 bytes Fingerprint 256 bytes – 1.2k Hand Geometry 9 bytes Iris 256 bytes – 512 bytes Retina 96 bytes
  • 15. Advantages :  Biometric attributes are unique and these can’t be faked or interchanged so, this uniqueness imparts a high level security to these systems.  There is no need for remembering passwords, pin’s etc. Disadvantages :  Biometric template data consume more space than the conventional user id/password combinations. Advantages & Disadvantages
  • 16. APPLICATIONS Commercial  Computer login  Electronic payment  ATMS Government  Passport control Forensic  Missing persons  Criminal investigations
  • 18. References  Biometrics.gov. http://www.biometrics.gov/ReferenceRoom/Introduction.aspx  Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition." IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1 (2004): 4-20. IEEE Xplore. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1262027  Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer. http://libcat.clemson.edu/record=b2478857  Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction Evaluating Biometric Systems." Computer 33.2 (2000): 56-63. IEEE Xplore. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=820040  http://bprl.cs.clemson.edu/about.html  http://bprl.cs.clemson.edu/projects.html