SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Submitted by :
Astha Kapoor
CS-31
Roll No. 28 (1005610033)
Submitted to :
Computer Science and Engineering Department,
BBDNIIT.
What Is Biometrics?
Biometrics, also known as biometric
authentication, refers to the identification of
humans by their characteristics or traits.
What Is Biometrics?
Biometrics, also known as biometric
authentication, refers to the identification of
humans by their characteristics or traits.
Since biometric identifiers are unique to individuals, they are
more reliable in verifying identity than token and knowledge-
based methods.
What Is Biometrics?
What are Types of Biometrics
Identifiers?
Physiological
•More accurate
Behavioral
•Less Accurate
What are Types of Biometrics
Identifiers?
What are the Factors of
Biometric Systems?
Factors of Biometric Systems
Universality
Acceptability
Uniqueness
Permanence
Circumvention
Measurability (Collectability)
Performance
What are Types of Biometrics
Identifiers?
What is the Functionality of
Biometric Systems
?
Biometric
Functionality
Verification
Reference
Models
Sample
Matching
Testing
Identification
Negative
Recognition
Positive
Recognition
For checking
if a person is
who they say
they are
For
identifying
a person
Person is
claiming to
be someone
Person is
claiming to
NOT be
someone
What is the Functionality of
Biometric Systems
?
Enrollment and Verification in
Biometric Systems:
Enrollment and Verification in
Biometric Systems:
Criteria for Selection of
Biometric Systems :
Security
Criteria for Selection of
Biometric Systems :
Security Convenience
Criteria for Selection of
Biometric Systems :
Security Convenience Legacy
Criteria for Selection of
Biometric Systems :
Security Convenience Legacy
Environmental
Criteria for Selection of
Biometric Systems :
Security Convenience Legacy
Environmental Servicing
Criteria for Selection of
Biometric Systems :
Security Convenience Legacy
Environmental Servicing Financial
Criteria for Selection of
Biometric Systems :
Security Convenience Legacy
Environmental Servicing Financial
Manageability
Criteria for Selection of
Biometric Systems :
Security Convenience Legacy
Environmental Servicing Financial
Manageability Multipurpose
Criteria for Selection of
Biometric Systems :
Security Convenience Legacy
Environmental Servicing Financial
Manageability Multipurpose Availability
Criteria for Selection of
Biometric Systems :
Benefits of Biometrics :
1. Biometric identification can provide extremely
accurate, secured access to information.
Benefits of Biometrics :
1. Biometric identification can provide extremely
accurate, secured access to information.
2. Current methods like password verification have
many problems (easy-to-hack and forgettable).
Benefits of Biometrics :
1. Biometric identification can provide extremely
accurate, secured access to information.
2. Current methods like password verification have
many problems (easy-to-hack and forgettable).
3. Automated biometric identification can be done very
rapidly and uniformly with a minimum of training.
Benefits of Biometrics :
1. Biometric identification can provide extremely
accurate, secured access to information.
2. Current methods like password verification have
many problems (easy-to-hack and forgettable).
3. Automated biometric identification can be done very
rapidly and uniformly with a minimum of training.
4. The identity can be verified without resorting to
documents that may be stolen, lost, or altered.
Benefits of Biometrics :
In the End…
Even though Biometrics are considered by many to be too
sophisticated, cumbersome and costly to be used on a wide
scale, the scope of Biometrics is steadily increasing, both in the
corporate and business world. There are many problems that
are being faced in the widespread installation of this technique,
but those problems are slowly being conquered.
Biometrics are the technology of tomorrow…

Weitere ähnliche Inhalte

Andere mochten auch

Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
'Atikah Khalil
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
M2SYS Technology
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
syamil91
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 

Andere mochten auch (20)

biometric technology
biometric technologybiometric technology
biometric technology
 
Biometric Technology Introduction
Biometric Technology Introduction Biometric Technology Introduction
Biometric Technology Introduction
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Biometric Technology and Human Factor Engineering
Biometric Technology and Human Factor EngineeringBiometric Technology and Human Factor Engineering
Biometric Technology and Human Factor Engineering
 
Ict Security Measures
Ict  Security MeasuresIct  Security Measures
Ict Security Measures
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
Animetrics Webinar: How Law Enforcement is Closing Cases with Face Biometric ...
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometrics
biometricsbiometrics
biometrics
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 

Ähnlich wie Biometrics--The Technology of Tomorrow

BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
SundusKhan42
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
NEHA SINGH
 

Ähnlich wie Biometrics--The Technology of Tomorrow (20)

Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
Chapters_1_2.ppt
Chapters_1_2.pptChapters_1_2.ppt
Chapters_1_2.ppt
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdfBiometrics_basicsandcharacteristics_.pdf
Biometrics_basicsandcharacteristics_.pdf
 
Biometric
Biometric Biometric
Biometric
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
MAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdfMAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdf
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Biometrics--The Technology of Tomorrow