SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Welcome

TO
THE WORLD OF
BIOMETRICS
WHAT IS BIOMETRICS?
The word biometrics comes from the
Greek words bio and metric,
meaning'' life measurement''. By
measuring something unique about
an individual and using that to
identify them, we can achieve a
dramatic improvement in security of
the key store. Newer biometric
measurements include DNA from
tissue samples, voice pattern, face
pattern or even the arrangement of
blood vessels in the retina or pattern
of coloration in the cornea of the eye.
WHY USE BIOMETRICS?
 Only biometrics can verify you as you
 Tokens (smartcards, etc.) aren't you and can be:





lost
stolen
duplicated (some)
forgotten

 Passwords aren't you and can be:





forgotten
shared
observed
broken
SHORT HISTORY OF
BIOMETRICS
Joao de Barros, an explorer and writer, wrote that Chinese

merchants used a form of biometrics by stamping children’s palm
prints and footprints on paper with ink .In doing this, the Chinese
solved a way to distinguish young children from one another. This is
one of the earliest known cases of biometrics .Later an
anthropologist named Alphonse Bertillion sought to fix the problem
of identifying convicted criminals. He found that even if names
changed, even if a person comes in disguise, certain elements of
the body remained fixed” . This led him to form a method of
measuring the distinguishable parts of a person’s body, which never
changed throughout their life . Whenever a new criminal was
caught, instead of taking down their name, the authorities would
measure them and look for a matching card . This system was
adopted by prisons and police stations across the country and
world. As technology gets more and more advanced, the ways to
distinguish the different biometrical signalments become more and
more precise. led to field of biometric technologies that we live in
USING BIOMETRICS:
Biometrics are used in two major ways : Identification and
Verification.
Identification is determining who a person is. It involves
taking the measured characteristic and trying to find a
match in a database containing records of people and that
characteristic. This method can require a large amount of
processing power and some time if the database is very
large. It is often used in determining the identity 1of a
suspect from crime scene information.
Verification is determining if a person is who they say they
are. It involves taking the measured characteristic and
comparing it to the previously recorded data for that
person. This method requires less processing power and
time, and is often used for accessing places or information.
PHYSICAL BIOMETRICS

Fingerprint Hand
Iris
Retina

Face
Voice
DNA
FINGERPRINT - ANALYZING
FINGERTIP PATTERNS:
Among all the biometric techniques, fingerprint-based
identification is the oldest method, which has been
successfully used in numerous applications. Everyone is
known to have unique, immutable fingerprints.
A fingerprint is made of a series of
ridges and furrows on the surface of the
finger. The uniqueness of a fingerprint
can be determined by the pattern of
ridges and furrows as well as the
minutiae points.
DRAW BACKS OF FINGURE PRINT
BIOMETRICS

When hand is injured or burnt and even if we
have slight disturbance in the cuticles also it
will not access the user. So,it’s a failure.
The potential uses for this biometric appear to be limited
only by the willingness of people to use it.
VASCULAR PATTERNS - ANALYZING
VEIN PATTERNS
Vascular patterns are best described as a picture of
the veins in a person's hand or face. The thickness
and location of these veins are believed to be unique
enough to an individual to be used to verify a
person's identity. The most common form of vascular
pattern readers are hand-based, requiring the user to
place their hand on a curved reader that takes an
infrared scan. This scan creates a picture that can
then be compared to a database to verify the user's
stated identity.
ADVANTAGES
Vascular pattern scanners can be found in testing at
major military installations and is being considered by
some established companies in the security industry
and multi-outlet retailers. advantages over its
counterparts, including the great difficulty in
emulating another person's vein structure, and not
having to worry about rain, glasses, or external
injuries. effects of aging, heart attacks, and medical
problems with one's arteries on the scans has yet to
be determined fully. It also requires a large amount of
space to mount the device is that the entire hand can
be scanned which may restrict its usability. Currently it
is still building acceptance
DISADVANTAGES

 It cant be used alone.
 It should be used with another biometric technique.
FACIAL RECOGNITION MEASURING FACIAL
CHARACTERISTICS
• User faces the camera, standing about two feet from it. The
system will locate the user's face and perform matches against
the claimed identity or the facial database. It is possible that the
user may need to move and re attempt the verification based on
his facial position. The system usually comes to a decision in less
than 5 seconds.
To prevent a fake face or mold from faking out the system, many
systems now require the user to smile, blink, or otherwise move
in a way that is human before verifying. Up to 128 Eigen vectors
are created for each person in order to achieve unmistakable
identification. Facial Recognition System (FRS) is combined with
other suitable biometric technologies to reduce nuisance and
false alarm rates. In a controlled environment with proper
lighting and choke points, the system can be combined with
access control systems to limit access through particular
checkpoints.
IRIS RECOGNITION

Iris recognition is a method of
biometric uses pattern recognition
techniques based on high-resolution
images of the irides of an individual's
eyes. unique structures converted into
digital templates, provide
mathematical representations of the
iris that yield unambiguous positive
identification of an individual.
Advantages of iris recognition
ITS STABLITY, OR TEMPLATE LONGEVITY
AS, BARRING TRAUMA, A SINGLE
ENROLLMENT CAN LAST A LIFETIME

Backdraws
You can cheat the iris scanner by putting on lens
or glasses.
RETINAL SCAN - ANALYZING BLOOD
VESSELS IN THE EYE
Oldest biometrics as 1930's research
suggested Scanning involves using a
low-intensity light source and an
optical coupler and can read the
patterns at a great level of accuracy.
It does require the user to remove
glasses, place their eye close to the
device, and focus on a certain point.
that the patterns of blood vessels on
the back of the human eye were
unique to each individual
ADVANTAGES

 There is no known way to replicate a retina, and a retina from a dead person
would deteriorate too fast to be useful, so no extra precautions have been
taken with retinal scans to be sure the user is a living human being. The
difficulty in fooling such a device also make it a great long-term, high-security
option.
DNA - ANALYZING GENETIC MAKEUP
DNA evidence play a big part in many nations'
criminal justice systems. It has been used to prove
that suspects were involved in crimes and to free
people who were wrongly convicted.It has been
integral to several high-profile criminal cases. Most
people have a basic idea of what DNA is. It's
essentially an instruction manual and blueprint for
everything in your body. A DNA molecule is a long,
twisting chain known as a double helix.
ADVANTAGES

DNA is tightly wrapped into 23 pairs of chromosomes. This is what makes DNA
evidence so valuable in investigations -- it's almost impossible for someone
else to have DNA that is identical to yours.
BEHAVIORAL BIOMETRICS:

Two forms
1.Voice

2.Signature
SPEAKER RECOGNITION ANALYZING VOCAL BEHAVIOR

Voice authentication, also known as “speaker verification”, is
defined as the automated verification of a person’s claimed
identity, based on unique characteristics of their voice. A
simple microphone is enough to record the voice, and then
most of the algorithm are analyzing the voice spectrum.
Voice and speech can be combined to get a better system:
ADVANTAGES

To prevent recorded voice use, most devices require the high and low
frequencies of the sound to match, which is difficult for many recording
instruments to recreate well. Also, some devices generate random number
sequences for each verification.
SIGNATURE - ANALYZING
SIGNATURE BIOMETRICS

Handwriting recognition system's sensors can include a
touch-sensitive writing surface or a pen that contains
sensors that detect angle, pressure and direction. The
software translates the handwriting into a graph and
recognizes the small changes in a person's handwriting
from day to day and over time.
ADVANTAGES

Specific details recorded by signature-scan may include the total time
taken to sign, the ration of pen-up to pen-down time, the speed of the
strokes, the pressure applied, the number and direction of the strokes,
and the total size of the signature, among other variables". So a forger
would have to recreate your signature within some window of time while
applying the correct pressure, except for 'pressure applied'.
FUTURE RESEARCH

Biometrics has all of the desirable characteristics that we described in the
beginning.we might develop an automated biometrics-based
identification/verification system like Vein pattern , Ear shape , Body odor ,
Body salinity (salt) , Electronic nose The next few years you will see just about
every thing come with biometric protection. Mobile phones, MP3 players,
cars, laptop computers, building access, locker access.
CONCLUSION
Biometrics is a very interesting and exciting field that
has be growing exponentially in recent years . The
wide variety of physically unique traits our bodies give
us will soon allow us to live in a very secure passwordless world. As the demands for high-performance and
highly reliable biometrics-based
identification/verification systems increase, more
hybrid biometrics-based systems are expected to be
developed to meet the ever-increasing needs for
automated personal identification.
“ IN FUTURE BIOMETRICS WILL BE THE
DOOR WAY TO ALL THE ACCESABLE
SYSTEMS ”
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentationrs2003
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumarRavi Kumar
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasBasra University, Iraq
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniquesjackofhearty1
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 

Was ist angesagt? (20)

Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric
Biometric Biometric
Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics technology ravi kumar
Biometrics technology ravi kumarBiometrics technology ravi kumar
Biometrics technology ravi kumar
 
Introduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.AbbasIntroduction to Biometric lectures... Prepared by Dr.Abbas
Introduction to Biometric lectures... Prepared by Dr.Abbas
 
Biometrics techniques
Biometrics techniquesBiometrics techniques
Biometrics techniques
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 

Ähnlich wie Biometrics

Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technologyshyampariyar
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
Biometrics
BiometricsBiometrics
BiometricsNA000000
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4sakshi_20
 
Physical biometrics
Physical biometricsPhysical biometrics
Physical biometricsnishiyath
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication'Femi Akin-Laguda
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 

Ähnlich wie Biometrics (20)

Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Vein rishabh
Vein rishabhVein rishabh
Vein rishabh
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
E0364024030
E0364024030E0364024030
E0364024030
 
Biometrics
BiometricsBiometrics
Biometrics
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Physical biometrics
Physical biometricsPhysical biometrics
Physical biometrics
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Using Biometrics to address Voter Authentication
Using Biometrics to address Voter AuthenticationUsing Biometrics to address Voter Authentication
Using Biometrics to address Voter Authentication
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 

Mehr von Sandeep Kamath

Mehr von Sandeep Kamath (20)

Android persentation
Android persentationAndroid persentation
Android persentation
 
Oracle architecture
Oracle architectureOracle architecture
Oracle architecture
 
Oracle advanced
Oracle advancedOracle advanced
Oracle advanced
 
Oracle
OracleOracle
Oracle
 
Technology
TechnologyTechnology
Technology
 
Ad and da convertor
Ad and da convertorAd and da convertor
Ad and da convertor
 
Introducttion to robotics and microcontrollers
Introducttion to robotics and microcontrollersIntroducttion to robotics and microcontrollers
Introducttion to robotics and microcontrollers
 
Rs 232
Rs 232Rs 232
Rs 232
 
Symbian os
Symbian osSymbian os
Symbian os
 
Ct213 memory subsystem
Ct213 memory subsystemCt213 memory subsystem
Ct213 memory subsystem
 
Microprocessor in washing machine
Microprocessor in washing machineMicroprocessor in washing machine
Microprocessor in washing machine
 
File hippo
File hippoFile hippo
File hippo
 
Processor
ProcessorProcessor
Processor
 
Microprocessor in washing machine
Microprocessor in washing machineMicroprocessor in washing machine
Microprocessor in washing machine
 
Microprocessor based software developnent
Microprocessor based software developnentMicroprocessor based software developnent
Microprocessor based software developnent
 
Microcessor aplication
Microcessor aplicationMicrocessor aplication
Microcessor aplication
 
Magnetic tape
Magnetic tapeMagnetic tape
Magnetic tape
 
Introducttion to robotics and microcontrollers
Introducttion to robotics and microcontrollersIntroducttion to robotics and microcontrollers
Introducttion to robotics and microcontrollers
 
Interfacing address
Interfacing addressInterfacing address
Interfacing address
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 

Kürzlich hochgeladen

How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 

Kürzlich hochgeladen (20)

How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 

Biometrics

  • 2. WHAT IS BIOMETRICS? The word biometrics comes from the Greek words bio and metric, meaning'' life measurement''. By measuring something unique about an individual and using that to identify them, we can achieve a dramatic improvement in security of the key store. Newer biometric measurements include DNA from tissue samples, voice pattern, face pattern or even the arrangement of blood vessels in the retina or pattern of coloration in the cornea of the eye.
  • 3. WHY USE BIOMETRICS?  Only biometrics can verify you as you  Tokens (smartcards, etc.) aren't you and can be:     lost stolen duplicated (some) forgotten  Passwords aren't you and can be:     forgotten shared observed broken
  • 4. SHORT HISTORY OF BIOMETRICS Joao de Barros, an explorer and writer, wrote that Chinese merchants used a form of biometrics by stamping children’s palm prints and footprints on paper with ink .In doing this, the Chinese solved a way to distinguish young children from one another. This is one of the earliest known cases of biometrics .Later an anthropologist named Alphonse Bertillion sought to fix the problem of identifying convicted criminals. He found that even if names changed, even if a person comes in disguise, certain elements of the body remained fixed” . This led him to form a method of measuring the distinguishable parts of a person’s body, which never changed throughout their life . Whenever a new criminal was caught, instead of taking down their name, the authorities would measure them and look for a matching card . This system was adopted by prisons and police stations across the country and world. As technology gets more and more advanced, the ways to distinguish the different biometrical signalments become more and more precise. led to field of biometric technologies that we live in
  • 5. USING BIOMETRICS: Biometrics are used in two major ways : Identification and Verification. Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity 1of a suspect from crime scene information. Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.
  • 7. FINGERPRINT - ANALYZING FINGERTIP PATTERNS: Among all the biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points.
  • 8. DRAW BACKS OF FINGURE PRINT BIOMETRICS When hand is injured or burnt and even if we have slight disturbance in the cuticles also it will not access the user. So,it’s a failure. The potential uses for this biometric appear to be limited only by the willingness of people to use it.
  • 9. VASCULAR PATTERNS - ANALYZING VEIN PATTERNS Vascular patterns are best described as a picture of the veins in a person's hand or face. The thickness and location of these veins are believed to be unique enough to an individual to be used to verify a person's identity. The most common form of vascular pattern readers are hand-based, requiring the user to place their hand on a curved reader that takes an infrared scan. This scan creates a picture that can then be compared to a database to verify the user's stated identity.
  • 10. ADVANTAGES Vascular pattern scanners can be found in testing at major military installations and is being considered by some established companies in the security industry and multi-outlet retailers. advantages over its counterparts, including the great difficulty in emulating another person's vein structure, and not having to worry about rain, glasses, or external injuries. effects of aging, heart attacks, and medical problems with one's arteries on the scans has yet to be determined fully. It also requires a large amount of space to mount the device is that the entire hand can be scanned which may restrict its usability. Currently it is still building acceptance
  • 11. DISADVANTAGES  It cant be used alone.  It should be used with another biometric technique.
  • 12. FACIAL RECOGNITION MEASURING FACIAL CHARACTERISTICS • User faces the camera, standing about two feet from it. The system will locate the user's face and perform matches against the claimed identity or the facial database. It is possible that the user may need to move and re attempt the verification based on his facial position. The system usually comes to a decision in less than 5 seconds. To prevent a fake face or mold from faking out the system, many systems now require the user to smile, blink, or otherwise move in a way that is human before verifying. Up to 128 Eigen vectors are created for each person in order to achieve unmistakable identification. Facial Recognition System (FRS) is combined with other suitable biometric technologies to reduce nuisance and false alarm rates. In a controlled environment with proper lighting and choke points, the system can be combined with access control systems to limit access through particular checkpoints.
  • 13. IRIS RECOGNITION Iris recognition is a method of biometric uses pattern recognition techniques based on high-resolution images of the irides of an individual's eyes. unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual.
  • 14. Advantages of iris recognition ITS STABLITY, OR TEMPLATE LONGEVITY AS, BARRING TRAUMA, A SINGLE ENROLLMENT CAN LAST A LIFETIME Backdraws You can cheat the iris scanner by putting on lens or glasses.
  • 15. RETINAL SCAN - ANALYZING BLOOD VESSELS IN THE EYE Oldest biometrics as 1930's research suggested Scanning involves using a low-intensity light source and an optical coupler and can read the patterns at a great level of accuracy. It does require the user to remove glasses, place their eye close to the device, and focus on a certain point. that the patterns of blood vessels on the back of the human eye were unique to each individual
  • 16. ADVANTAGES  There is no known way to replicate a retina, and a retina from a dead person would deteriorate too fast to be useful, so no extra precautions have been taken with retinal scans to be sure the user is a living human being. The difficulty in fooling such a device also make it a great long-term, high-security option.
  • 17. DNA - ANALYZING GENETIC MAKEUP DNA evidence play a big part in many nations' criminal justice systems. It has been used to prove that suspects were involved in crimes and to free people who were wrongly convicted.It has been integral to several high-profile criminal cases. Most people have a basic idea of what DNA is. It's essentially an instruction manual and blueprint for everything in your body. A DNA molecule is a long, twisting chain known as a double helix.
  • 18. ADVANTAGES DNA is tightly wrapped into 23 pairs of chromosomes. This is what makes DNA evidence so valuable in investigations -- it's almost impossible for someone else to have DNA that is identical to yours.
  • 20. SPEAKER RECOGNITION ANALYZING VOCAL BEHAVIOR Voice authentication, also known as “speaker verification”, is defined as the automated verification of a person’s claimed identity, based on unique characteristics of their voice. A simple microphone is enough to record the voice, and then most of the algorithm are analyzing the voice spectrum. Voice and speech can be combined to get a better system:
  • 21. ADVANTAGES To prevent recorded voice use, most devices require the high and low frequencies of the sound to match, which is difficult for many recording instruments to recreate well. Also, some devices generate random number sequences for each verification.
  • 22. SIGNATURE - ANALYZING SIGNATURE BIOMETRICS Handwriting recognition system's sensors can include a touch-sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction. The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time.
  • 23. ADVANTAGES Specific details recorded by signature-scan may include the total time taken to sign, the ration of pen-up to pen-down time, the speed of the strokes, the pressure applied, the number and direction of the strokes, and the total size of the signature, among other variables". So a forger would have to recreate your signature within some window of time while applying the correct pressure, except for 'pressure applied'.
  • 24. FUTURE RESEARCH Biometrics has all of the desirable characteristics that we described in the beginning.we might develop an automated biometrics-based identification/verification system like Vein pattern , Ear shape , Body odor , Body salinity (salt) , Electronic nose The next few years you will see just about every thing come with biometric protection. Mobile phones, MP3 players, cars, laptop computers, building access, locker access.
  • 25. CONCLUSION Biometrics is a very interesting and exciting field that has be growing exponentially in recent years . The wide variety of physically unique traits our bodies give us will soon allow us to live in a very secure passwordless world. As the demands for high-performance and highly reliable biometrics-based identification/verification systems increase, more hybrid biometrics-based systems are expected to be developed to meet the ever-increasing needs for automated personal identification.
  • 26. “ IN FUTURE BIOMETRICS WILL BE THE DOOR WAY TO ALL THE ACCESABLE SYSTEMS ”