SlideShare ist ein Scribd-Unternehmen logo
1 von 17
 Outline
   Introduction
   Biometrics techniques
   Strengths, and weaknesses
   FAR/FRR
   Major Players
   Summary
What Is Biometrics ?

 Biometrics is the reading of a unique human
 physical attribute as data, which is then
 applied to authenticate a system.
Passwords -“something we know”

Tokens and Cards –”something we possess”
(e.g., ID cards, smart cards, digital certificates)

Biometrics –”something that is part of
               us”
(e.g., retina scan, fingerprints, facial recognition )
WORKING PRINCIPLE OF
BIOMETRIC’S
Biometrics Techniques

 Retina scanning
 Iris scanning
 Fingerprint scanning
 Hand scanning
 Face recognition
 Voice recognition &
  DSV
 Signature recognition
 Keystroke recognition
Retinal
Scanning
        User Looks Into a
         Viewer and
         Focuses on a Point;
         Infrared Light
         Scans Retina

Iris Scanning
       User looks at a camera
       (distance from camera
       increasing rapidly to
       2-3 feet)
User Places Finger on
Scanning Device
User Places Hand on
Device
User Looks at Camera , it is based on the
face geometry
SIGNATURE RECOGNITION




This is done by analyzing the shape,
speed, stroke, pen pressure and timing
information during the act of signing.
Other Techniques

Voice Recognition & DSV

User speaks into a microphone or other
device, such as a telephone handset


Keystroke Recognition
 User types standard sample
 on keyboard
Strengths, and Weakness
          Retina
          Iris

          Fingerprint
          Hand/Finger Geometry
          Face Recognition
          Voice Recognition
          Signature Recognition
          Keystroke Recognition
Technique               Strengths

Retina                  Highly accurate

Iris                    Highly accurate; works with
                        eyeglasses; more acceptable to
                        users than retina scan
Fingerprint             Mature technology; highly
                        accurate; low cost; small size,
                        becoming widely acceptable
Hand/Finger Geometry    accurate and flexible; widely
                        acceptable to users
Face Recognition        Widely acceptable to users; low
                        cost; no direct contact; passive
                        monitoring possible
Voice Recognition       Usable over existing telephone
                        system; good for remote access
                        and monitoring;
Signature Recognition   Widely acceptable to users

Keystroke Recognition   Widely acceptable to users; low
                        cost; uses existing hardware
Technique               Weaknesses
Retina                  Inconvenient for persons with
                        eyeglasses; dislike contact with
                        device and light beam
Iris                    New technology, cost, although
                        this is rapidly changing
Fingerprint             Users can create high FRR; some
                        persons dislike contact with
                        device

Hand/Finger Geometry    User interface is bulky; dislike
                        contact with device
Face Recognition        Face recognition is less accurate
                        than other methods
Voice Recognition       Less accuracy; subject to
                        background noise
Signature Recognition   Less accuracy; not widely used
                        yet, but has potential with PDAs
Keystroke Recognition   Less accuracy;
FAR & FRR

 FAR(False Acceptance rate) – refers to how
 often the system accepts someone it should
 reject

 AND

 FRR(False Rejection Rate) is how often the
 system rejects someone it shouldn’t.
Major Players
    Computer access
    Physical access
    Handheld devices
    Military/Govt. Agencies/DOD
    Financial services
    Hospitals
    Telecommunication
Summary
  As biometric technology advances, the cost of systems
   will decrease.
  At the same time, biometrics systems will become
   increasingly sophisticated and accurate.
  Scientist will physical and behavioral traits will
   increase the usefulness of biometrics.
  The general public will gradually come to accept
   biometric system.

Weitere ähnliche Inhalte

Was ist angesagt?

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 

Was ist angesagt? (20)

Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Touchless Touch screen technology
Touchless Touch screen technologyTouchless Touch screen technology
Touchless Touch screen technology
 
COMP 4010 - Lecture 3 VR Systems
COMP 4010 - Lecture 3 VR SystemsCOMP 4010 - Lecture 3 VR Systems
COMP 4010 - Lecture 3 VR Systems
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Ppt wearable computer
Ppt wearable computerPpt wearable computer
Ppt wearable computer
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
Touchscreen
TouchscreenTouchscreen
Touchscreen
 
Augmented Reality for Architects
Augmented Reality for ArchitectsAugmented Reality for Architects
Augmented Reality for Architects
 
Mixed reality
Mixed realityMixed reality
Mixed reality
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
RFID TECHNOLOGY
RFID TECHNOLOGYRFID TECHNOLOGY
RFID TECHNOLOGY
 
Wearable Technology Design
Wearable Technology DesignWearable Technology Design
Wearable Technology Design
 
LDA presentation
LDA presentationLDA presentation
LDA presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Finger reader
Finger readerFinger reader
Finger reader
 
Smart Home Evolution
Smart Home EvolutionSmart Home Evolution
Smart Home Evolution
 

Andere mochten auch

GWC2012 - Tom Chatfield - Más allá de la diversión
GWC2012 - Tom Chatfield - Más allá de la diversiónGWC2012 - Tom Chatfield - Más allá de la diversión
GWC2012 - Tom Chatfield - Más allá de la diversión
gamificationworldcongress
 
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
gamificationworldcongress
 
Chapter 8 presentation
Chapter 8 presentationChapter 8 presentation
Chapter 8 presentation
meganmcleod
 
GWC2013 - Bart Briers - The Freakonomics of Fun
GWC2013 - Bart Briers - The Freakonomics of FunGWC2013 - Bart Briers - The Freakonomics of Fun
GWC2013 - Bart Briers - The Freakonomics of Fun
gamificationworldcongress
 
Cfsa maximizing small spaces 2 of 3
Cfsa maximizing small spaces 2 of 3Cfsa maximizing small spaces 2 of 3
Cfsa maximizing small spaces 2 of 3
ffbroadwell
 
Holistic Large Animal Veterinary Treatments
Holistic Large Animal Veterinary TreatmentsHolistic Large Animal Veterinary Treatments
Holistic Large Animal Veterinary Treatments
ffbroadwell
 
Presentasjon om biler2
Presentasjon om biler2Presentasjon om biler2
Presentasjon om biler2
Abdelhay1961
 

Andere mochten auch (20)

Expected Question AITT
Expected Question AITTExpected Question AITT
Expected Question AITT
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
GWC2012 - Tom Chatfield - Más allá de la diversión
GWC2012 - Tom Chatfield - Más allá de la diversiónGWC2012 - Tom Chatfield - Más allá de la diversión
GWC2012 - Tom Chatfield - Más allá de la diversión
 
2011 Palo Alto County Iowa Laborshed Summary
2011 Palo Alto County Iowa Laborshed Summary2011 Palo Alto County Iowa Laborshed Summary
2011 Palo Alto County Iowa Laborshed Summary
 
Seta de-che-aio-09-2012
Seta de-che-aio-09-2012Seta de-che-aio-09-2012
Seta de-che-aio-09-2012
 
GWC14: An Coppens - Taking a fast train down memory lane
GWC14: An Coppens - Taking a fast train down memory laneGWC14: An Coppens - Taking a fast train down memory lane
GWC14: An Coppens - Taking a fast train down memory lane
 
Grunt
GruntGrunt
Grunt
 
„Stykówka” – miasto na wyciągnięcie smartfona
„Stykówka” – miasto na wyciągnięcie smartfona„Stykówka” – miasto na wyciągnięcie smartfona
„Stykówka” – miasto na wyciągnięcie smartfona
 
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
GWC2013 - Isabel Andraca - Bristish Telecom - Motivating employees, great cus...
 
C2 bird
C2 birdC2 bird
C2 bird
 
Variation
VariationVariation
Variation
 
Chapter 8 presentation
Chapter 8 presentationChapter 8 presentation
Chapter 8 presentation
 
GWC2013 - Bart Briers - The Freakonomics of Fun
GWC2013 - Bart Briers - The Freakonomics of FunGWC2013 - Bart Briers - The Freakonomics of Fun
GWC2013 - Bart Briers - The Freakonomics of Fun
 
El consum de productes bàsics baixa per primera
El consum de productes bàsics baixa per primeraEl consum de productes bàsics baixa per primera
El consum de productes bàsics baixa per primera
 
Cfsa maximizing small spaces 2 of 3
Cfsa maximizing small spaces 2 of 3Cfsa maximizing small spaces 2 of 3
Cfsa maximizing small spaces 2 of 3
 
Holistic Large Animal Veterinary Treatments
Holistic Large Animal Veterinary TreatmentsHolistic Large Animal Veterinary Treatments
Holistic Large Animal Veterinary Treatments
 
Presentasjon om biler2
Presentasjon om biler2Presentasjon om biler2
Presentasjon om biler2
 
Radio advert evaluation
Radio advert evaluationRadio advert evaluation
Radio advert evaluation
 

Ähnlich wie biometrics

Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
VP-II X VascularBiometrics
VP-II X VascularBiometricsVP-II X VascularBiometrics
VP-II X VascularBiometrics
기성 문
 

Ähnlich wie biometrics (20)

Introduction to biomectrics_kaushal_shah
Introduction to biomectrics_kaushal_shahIntroduction to biomectrics_kaushal_shah
Introduction to biomectrics_kaushal_shah
 
Biometric
Biometric Biometric
Biometric
 
How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Zaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptxZaki_Anwer Seminar PPT.pptx
Zaki_Anwer Seminar PPT.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
GRT.pptx
GRT.pptxGRT.pptx
GRT.pptx
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
gesture recognition!
gesture recognition!gesture recognition!
gesture recognition!
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
VP-II X VascularBiometrics
VP-II X VascularBiometricsVP-II X VascularBiometrics
VP-II X VascularBiometrics
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

biometrics

  • 1.
  • 2.  Outline  Introduction  Biometrics techniques  Strengths, and weaknesses  FAR/FRR  Major Players  Summary
  • 3. What Is Biometrics ? Biometrics is the reading of a unique human physical attribute as data, which is then applied to authenticate a system. Passwords -“something we know” Tokens and Cards –”something we possess” (e.g., ID cards, smart cards, digital certificates) Biometrics –”something that is part of us” (e.g., retina scan, fingerprints, facial recognition )
  • 5. Biometrics Techniques  Retina scanning  Iris scanning  Fingerprint scanning  Hand scanning  Face recognition  Voice recognition & DSV  Signature recognition  Keystroke recognition
  • 6. Retinal Scanning  User Looks Into a Viewer and Focuses on a Point; Infrared Light Scans Retina Iris Scanning User looks at a camera (distance from camera increasing rapidly to 2-3 feet)
  • 7. User Places Finger on Scanning Device
  • 8. User Places Hand on Device
  • 9. User Looks at Camera , it is based on the face geometry
  • 10. SIGNATURE RECOGNITION This is done by analyzing the shape, speed, stroke, pen pressure and timing information during the act of signing.
  • 11. Other Techniques Voice Recognition & DSV User speaks into a microphone or other device, such as a telephone handset Keystroke Recognition User types standard sample on keyboard
  • 12. Strengths, and Weakness Retina Iris Fingerprint Hand/Finger Geometry Face Recognition Voice Recognition Signature Recognition Keystroke Recognition
  • 13. Technique Strengths Retina Highly accurate Iris Highly accurate; works with eyeglasses; more acceptable to users than retina scan Fingerprint Mature technology; highly accurate; low cost; small size, becoming widely acceptable Hand/Finger Geometry accurate and flexible; widely acceptable to users Face Recognition Widely acceptable to users; low cost; no direct contact; passive monitoring possible Voice Recognition Usable over existing telephone system; good for remote access and monitoring; Signature Recognition Widely acceptable to users Keystroke Recognition Widely acceptable to users; low cost; uses existing hardware
  • 14. Technique Weaknesses Retina Inconvenient for persons with eyeglasses; dislike contact with device and light beam Iris New technology, cost, although this is rapidly changing Fingerprint Users can create high FRR; some persons dislike contact with device Hand/Finger Geometry User interface is bulky; dislike contact with device Face Recognition Face recognition is less accurate than other methods Voice Recognition Less accuracy; subject to background noise Signature Recognition Less accuracy; not widely used yet, but has potential with PDAs Keystroke Recognition Less accuracy;
  • 15. FAR & FRR FAR(False Acceptance rate) – refers to how often the system accepts someone it should reject AND FRR(False Rejection Rate) is how often the system rejects someone it shouldn’t.
  • 16. Major Players  Computer access  Physical access  Handheld devices  Military/Govt. Agencies/DOD  Financial services  Hospitals  Telecommunication
  • 17. Summary  As biometric technology advances, the cost of systems will decrease.  At the same time, biometrics systems will become increasingly sophisticated and accurate.  Scientist will physical and behavioral traits will increase the usefulness of biometrics.  The general public will gradually come to accept biometric system.

Hinweis der Redaktion

  1. Computer Access Securing computer and network access is one of the most common uses of biometric devices. As financial data, medical records and other personal information becomes the target of attack, biometric systems can remove the risk of passwords being shared, stolen or guessed.   Physical Access As security and privacy becomes more important for employers, government, parents and others, biometrics is increasingly being seen as an acceptable solution. Around the world hospitals, military facilities, government buildings and offices are employing biometric access solutions to minimize security threats.   Time and Attendance Biometric systems are being used as a replacement for the traditional punch-card system of clocking-in and clocking-out. Replacing the manual process with biometrics prevents abuse of the system. Time management software provides attendance reports. This solution can be combined with a physical access system to restrict access certain areas without the risk of keys, proximity cards or door access codes being lost or shared.   Handheld devices As handheld device usage increase amongst executives, sales people and health-care professionals, organizations are focusing on how to protect the confidential data on them from falling into the wrong hands. Dynamic signature verification is proving itself as an important tool for securing access to pen-based devices and PDAs.   National Security Governments around the world are beginning to use biometrics to identify citizens and prevent fraud during elections. These systems often involve storing a biometric template, typically a fingerprint scan, on a card that acts as a national identity card.   Telecommunications With the rapid growth of call centers, telephone banking and telephone ordering systems, users are struggling to remember the number of user IDs and PINs required to access these systems. To combat this, voice-recognition systems are being used to provide access control without the need to remember personal access codes.