SlideShare a Scribd company logo
1 of 19
A WARM WELCOME TO ALL OF YOU!!
SEMINAR  ON BIOMETRICS ,[object Object],[object Object]
PASSWORDS ARE OUT, BIOMETRICS IS IN!! INTRODUCTION No more the nuisance of forgotten passwords and ID codes, biometrics-based authentication is here. Our fingerprints, iris pattern, and voice will verify our identity at ATMs, airports, etc. We can unlock our house or withdraw money from our bank with just a blink of an eye, a tap of our finger or just showing your face!   BIOMETRICS is a means of using parts of the human body  as a kind of   permanent password .   Just as   your fingerprints are unlike those of any other person, your eyes, ears, hands, voice, and face are also unique. Technology has advanced to the point where computer systems can record and recognise the patterns, hand shapes, ear lobe contours, and a host of other physical characteristics. Using these biometrics, laptop and other portable devices can be empowered with the ability to instantly verify your identity and deny access to everybody else.
UNDERLYING IDEA Biometrics systems automatically verify or recognise the identity of a living person based on physiological or behavioral characteristics. Physiological characteristics pertain to visible parts of the human body. These include fingerprint, retinal, palm geometry, iris, facial structure, etc. Behavioral characteristics are based on what a person does. These include voice prints,signatures, typing patterns, keystroke pattern, and so on.  > Keystroke pattern in computer security systems incorporating  the keystrokes dynamic technology measure the user’s typing rhythm-the length of time he holds down each key, plus the time taken to move between the keys. When the user types in user name and password, the authenticating software compares the typing rhythm with his profile. > Voiceprint is a fine series of spectral power density plots that depict how the energy in one’s voice at different frequencies varies with time as one vocalizes a work or phrase. Voice experts say that sufficient characteristics of one’s voice print remain constant under all circumstances, enabling these  plots to realiably verify one’s identity.  While physiological traits are usually more stable than behavioral traits, systems incorporation them are typically more intrusive and more expensive to implement.   
 
Applications in use Standard Bank, South Africa, scans the fingerprints of its customers, instead of using a personal identification number (PIN), when they wish to withdraw cash.  Basically, the biometrics security technique acts as a front end to a system that requires precise identification before it can be accessed or used. The system could be a sliding door with electronic locking mechanisms, an operating system (OS), or an application where individual users have their own rights and permissions.   A biometric chip reader incorporated into a PC can facilitate secure Internet-based online transactions. Applications that are being developed to accept biometric data include computer networks, cars, cellular phones, and hoards of other types of embedded systems. Biometrics could authenticate e-mail and other documents transmitted via computer networks. In hospitals, biometric techniques could replace ID bracelets to establish patients identities for instance during blood administration.    With existing voice-transmission technology, voice recognition biometric techniques can function over long distances using the ordinary telephone. A well conceived and properly implemented voice-based security system could provide a greater safety to financial transaction conducted over the telephone.  
THE BIOMETRIC MODEL A generic biometric model consists of five subsystems, namely, data collection, transmission, signal processing, decision making and data storage. Data collection involves use of sensors  to detect and measure an individual’s physiological or behavioral characteristics.
BLOCK DIAGRAM
BIO VERIFICATION SENSORS
sensor Sensor  specifications determine the intrusiveness of the system. Intrusiveness is the degree to which the user feels that the measurement process violates his personal space, and is often correlated to how close the user has to be near the sensor. For instance, a retinal scan, which requires close proximity to the camera, is considered far more intrusive than a voice  recognition system.
FINGERPRINT RECOGNITION SYSTEM
SYSTEM QUALITY System quality The quality of a biometrics authentication algorithm is specified in terms of false rejection rate (FRR) and false acceptance rate (FAR).  FRR  indicates the percentage of instances an authorized individual is falsely rejected by the system.  
FAR  states the percentage of instances an unauthorized individual is falsely accepted by the system. FRR and FAR are diametrically opposed, therefore increasing the FAR will lower the FRR, and vice-versa. FRRs and FARs can be  adjusted according to the needs of a given security system. The biometric system should be able  to account for permanent/semi-permanent changes in authorized / unauthorized users. For instance, a user’s biometric characteristics, even if these are physiological, can change over time.People can grow beards injure their hands, change their accent, become better typists, change their hairstyles, and so on. Robust biometric systems are able to meet these contingencies by slightly modifying the template for accepted authentication situations. The user’s profile in the database adapts to changes in the user’s biometric features.  
Global developments Internet security. Litronix, USA,  a leading provider of  public key infrastructure (PKI) based Internet security solutions, has developed biometric identification techniques for use in electronic data applications such as digital networks and smart cards, apart from iris, voice and handwritten signature recognition can be used for authentication purposes when digitally signing a document or obtaining access to secure WebPages. The smart card, integrating voice and handwritten functions, incorporates the appropriate biometric template to deliver the final match and authorization. The company plans to incorporate capture, manipulation, enrollment, and extraction features in the smart card reader also. Biometric smart cards. Polaroid and Atemel have developed secure identity cards that merge ultra –secure smart cards, fingerprint verification, biometric identification, and digital imaging. These cards will be used in e-commerce, online, remote access, and any IT environment where authentication is required. The information stored in the card is protected by circuits inside the card that perform encryption/decryption of the data in the card.
Biometrics on the move Immigration and naturalization passenger accelerated service systems (INPASS) allow international airports to use hand geometry scanners to verify the identity of travelers. Airports are testing face recognition scanners to help weed out terrorists. One of the most hotly pursued applications of biometrics is bandhelds. Researchers are working on means to integrate eye scanners, fingerprint readers, and voice recognition systems into mobile phones, PDAs, and laptops. Scanners are getting smaller, cheaper, and more accurate, and can be used in mobile gadgets without sprucing up the size, cost, and power consumption. Not only biometrics renders handhelds and laptops worthless to would-be stealers, it could also eliminate fraudulent transactions. Mobile manufacturers and  wireless operators are incorporating voice and fingerprint scanning techniques in their devices.
High security coupled with convenience Using biometrics for identifying and authenticating  human beings offers unique advantages over traditional methods. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. PASSWORDS can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost smart cards are a nuisance for users and waste the expensive time of system administrators. In biometrics the concerned person himself is the password, as biometrics authentication is based  the identification of an intrinsic part of a human being. The biometrics technique can be integrated into applications that require security, access control, and identification or verification of users. Biometrically secured resources effectively eliminate risks, while at the same time offering a high level of security and convenience to both the users and the administrators.  
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object]

More Related Content

What's hot

A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensorsparmsidhu
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical educationArhind Gautam
 
Biometric technology
Biometric technology Biometric technology
Biometric technology r1o9h9i6t
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 

What's hot (20)

A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric Sensors
Biometric SensorsBiometric Sensors
Biometric Sensors
 
Finger print
Finger printFinger print
Finger print
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Biometric technology
Biometric technology Biometric technology
Biometric technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 

Viewers also liked

Biometrics application
Biometrics applicationBiometrics application
Biometrics applicationDivya Shah
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
PV Integrated to Micro grid for power quality improvement
PV Integrated to Micro grid for power quality improvementPV Integrated to Micro grid for power quality improvement
PV Integrated to Micro grid for power quality improvementNiteesh Shanbog
 
Footstep power generation system
Footstep power generation systemFootstep power generation system
Footstep power generation systemAmar Kumar
 
4K Technology
4K Technology 4K Technology
4K Technology Vasu Jain
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
4K Technology Presentation
4K Technology Presentation4K Technology Presentation
4K Technology PresentationVasu Jain
 

Viewers also liked (16)

Biometrics application
Biometrics applicationBiometrics application
Biometrics application
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
PV Integrated to Micro grid for power quality improvement
PV Integrated to Micro grid for power quality improvementPV Integrated to Micro grid for power quality improvement
PV Integrated to Micro grid for power quality improvement
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Footstep power generation system
Footstep power generation systemFootstep power generation system
Footstep power generation system
 
4K Technology
4K Technology 4K Technology
4K Technology
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Hy wire ppt
Hy wire pptHy wire ppt
Hy wire ppt
 
4K Technology Presentation
4K Technology Presentation4K Technology Presentation
4K Technology Presentation
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Honey pots
Honey potsHoney pots
Honey pots
 
Hybrid Electric Vehicle
Hybrid Electric VehicleHybrid Electric Vehicle
Hybrid Electric Vehicle
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 

Similar to Bio Metrics

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxdanas19
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paperdesire120
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometricAnkitaVerma776806
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBahaa Abdulhadi
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airportCheapticketsSG
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)mounika117
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materialsyasmeenreem
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 

Similar to Bio Metrics (20)

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Biometrics research paper
Biometrics research paperBiometrics research paper
Biometrics research paper
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometric technologies at the airport
Biometric technologies at the airportBiometric technologies at the airport
Biometric technologies at the airport
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materials
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 

More from nayakslideshare (20)

Mips 64
Mips 64Mips 64
Mips 64
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Spyware
SpywareSpyware
Spyware
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Gis
GisGis
Gis
 
Lcd
LcdLcd
Lcd
 
Hyper Threading Technology
Hyper Threading TechnologyHyper Threading Technology
Hyper Threading Technology
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Biochip
BiochipBiochip
Biochip
 
Satellite Networks
Satellite NetworksSatellite Networks
Satellite Networks
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Touch Screens
Touch ScreensTouch Screens
Touch Screens
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
Dna Fingerprinting
Dna FingerprintingDna Fingerprinting
Dna Fingerprinting
 
Thinking Critically About WWW
Thinking Critically About WWWThinking Critically About WWW
Thinking Critically About WWW
 
Remote Sensing
Remote SensingRemote Sensing
Remote Sensing
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Bio Metrics

  • 1. A WARM WELCOME TO ALL OF YOU!!
  • 2.
  • 3. PASSWORDS ARE OUT, BIOMETRICS IS IN!! INTRODUCTION No more the nuisance of forgotten passwords and ID codes, biometrics-based authentication is here. Our fingerprints, iris pattern, and voice will verify our identity at ATMs, airports, etc. We can unlock our house or withdraw money from our bank with just a blink of an eye, a tap of our finger or just showing your face!   BIOMETRICS is a means of using parts of the human body as a kind of permanent password . Just as your fingerprints are unlike those of any other person, your eyes, ears, hands, voice, and face are also unique. Technology has advanced to the point where computer systems can record and recognise the patterns, hand shapes, ear lobe contours, and a host of other physical characteristics. Using these biometrics, laptop and other portable devices can be empowered with the ability to instantly verify your identity and deny access to everybody else.
  • 4. UNDERLYING IDEA Biometrics systems automatically verify or recognise the identity of a living person based on physiological or behavioral characteristics. Physiological characteristics pertain to visible parts of the human body. These include fingerprint, retinal, palm geometry, iris, facial structure, etc. Behavioral characteristics are based on what a person does. These include voice prints,signatures, typing patterns, keystroke pattern, and so on. > Keystroke pattern in computer security systems incorporating the keystrokes dynamic technology measure the user’s typing rhythm-the length of time he holds down each key, plus the time taken to move between the keys. When the user types in user name and password, the authenticating software compares the typing rhythm with his profile. > Voiceprint is a fine series of spectral power density plots that depict how the energy in one’s voice at different frequencies varies with time as one vocalizes a work or phrase. Voice experts say that sufficient characteristics of one’s voice print remain constant under all circumstances, enabling these plots to realiably verify one’s identity. While physiological traits are usually more stable than behavioral traits, systems incorporation them are typically more intrusive and more expensive to implement.   
  • 5.  
  • 6. Applications in use Standard Bank, South Africa, scans the fingerprints of its customers, instead of using a personal identification number (PIN), when they wish to withdraw cash. Basically, the biometrics security technique acts as a front end to a system that requires precise identification before it can be accessed or used. The system could be a sliding door with electronic locking mechanisms, an operating system (OS), or an application where individual users have their own rights and permissions.   A biometric chip reader incorporated into a PC can facilitate secure Internet-based online transactions. Applications that are being developed to accept biometric data include computer networks, cars, cellular phones, and hoards of other types of embedded systems. Biometrics could authenticate e-mail and other documents transmitted via computer networks. In hospitals, biometric techniques could replace ID bracelets to establish patients identities for instance during blood administration.   With existing voice-transmission technology, voice recognition biometric techniques can function over long distances using the ordinary telephone. A well conceived and properly implemented voice-based security system could provide a greater safety to financial transaction conducted over the telephone.  
  • 7. THE BIOMETRIC MODEL A generic biometric model consists of five subsystems, namely, data collection, transmission, signal processing, decision making and data storage. Data collection involves use of sensors to detect and measure an individual’s physiological or behavioral characteristics.
  • 10. sensor Sensor specifications determine the intrusiveness of the system. Intrusiveness is the degree to which the user feels that the measurement process violates his personal space, and is often correlated to how close the user has to be near the sensor. For instance, a retinal scan, which requires close proximity to the camera, is considered far more intrusive than a voice recognition system.
  • 12. SYSTEM QUALITY System quality The quality of a biometrics authentication algorithm is specified in terms of false rejection rate (FRR) and false acceptance rate (FAR). FRR indicates the percentage of instances an authorized individual is falsely rejected by the system.  
  • 13. FAR states the percentage of instances an unauthorized individual is falsely accepted by the system. FRR and FAR are diametrically opposed, therefore increasing the FAR will lower the FRR, and vice-versa. FRRs and FARs can be adjusted according to the needs of a given security system. The biometric system should be able to account for permanent/semi-permanent changes in authorized / unauthorized users. For instance, a user’s biometric characteristics, even if these are physiological, can change over time.People can grow beards injure their hands, change their accent, become better typists, change their hairstyles, and so on. Robust biometric systems are able to meet these contingencies by slightly modifying the template for accepted authentication situations. The user’s profile in the database adapts to changes in the user’s biometric features.  
  • 14. Global developments Internet security. Litronix, USA, a leading provider of public key infrastructure (PKI) based Internet security solutions, has developed biometric identification techniques for use in electronic data applications such as digital networks and smart cards, apart from iris, voice and handwritten signature recognition can be used for authentication purposes when digitally signing a document or obtaining access to secure WebPages. The smart card, integrating voice and handwritten functions, incorporates the appropriate biometric template to deliver the final match and authorization. The company plans to incorporate capture, manipulation, enrollment, and extraction features in the smart card reader also. Biometric smart cards. Polaroid and Atemel have developed secure identity cards that merge ultra –secure smart cards, fingerprint verification, biometric identification, and digital imaging. These cards will be used in e-commerce, online, remote access, and any IT environment where authentication is required. The information stored in the card is protected by circuits inside the card that perform encryption/decryption of the data in the card.
  • 15. Biometrics on the move Immigration and naturalization passenger accelerated service systems (INPASS) allow international airports to use hand geometry scanners to verify the identity of travelers. Airports are testing face recognition scanners to help weed out terrorists. One of the most hotly pursued applications of biometrics is bandhelds. Researchers are working on means to integrate eye scanners, fingerprint readers, and voice recognition systems into mobile phones, PDAs, and laptops. Scanners are getting smaller, cheaper, and more accurate, and can be used in mobile gadgets without sprucing up the size, cost, and power consumption. Not only biometrics renders handhelds and laptops worthless to would-be stealers, it could also eliminate fraudulent transactions. Mobile manufacturers and wireless operators are incorporating voice and fingerprint scanning techniques in their devices.
  • 16. High security coupled with convenience Using biometrics for identifying and authenticating human beings offers unique advantages over traditional methods. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. PASSWORDS can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost smart cards are a nuisance for users and waste the expensive time of system administrators. In biometrics the concerned person himself is the password, as biometrics authentication is based the identification of an intrinsic part of a human being. The biometrics technique can be integrated into applications that require security, access control, and identification or verification of users. Biometrically secured resources effectively eliminate risks, while at the same time offering a high level of security and convenience to both the users and the administrators.  
  • 17.
  • 18.
  • 19.