SlideShare ist ein Scribd-Unternehmen logo
1 von 31
PRESENTATION ON
Enhancing security with
BIOMETRICS
MANISH KUMAR
WHAT IS BIOMETRIC
BIOMETRIC IS AUTOMATED
METHODS TO IDENTIFY A
PERSON ON BASIS OF
PHYSICAL AND
BEHAVIORAL
CHARACTERSTICS
PHASES OF BOMETRIC AUTHENTICATION
SYSTEM
CAPTURE EXTRACTION COMPARISON MATCH/NOMATCH
FINGERPRINTFINGERPRINT
RECOGNITIONRECOGNITION
OLDESTOLDEST
METHOD(SINCEMETHOD(SINCE
1896) WIDELY1896) WIDELY
USED FORUSED FOR
CRIMINALCRIMINAL
IDENTIFICATIONIDENTIFICATION
FINGERPRINT FEATURE
EXTRACTION
• 1/3
WHORLS
• 5-10%
ARCHES
• 2/3
LOOPS
FINGERPRINT
COMPARISONS
(PATTERN MATCHING)
FINGERPRINT MATCHINGFINGERPRINT MATCHING
REGISTERED
POINTS ARE
LOCATED
AND
COMPARED
MINUTIA MATCHING
HAND GEOMETRY
RECOGNITION
TEMPLATE
FACIAL ATTRIBUTES
•AREA
AROUND
CHEEK BONE
•UPPER
SECTION OF
EYE SOCKET
•SIDES OF
MOUTH
•DISTANCE
BETWEEN
EYES
NEGATIVE MATCH (12%)NEGATIVE MATCH (12%)
96% MATCH
POSITIVE IDENTIFICATION
FACE TRACKING
VOICE RECOGNITION
FORMANTS • SEGMENT
COMPOSED OF
DOMINANT
FREQUENCIES
DIGITALIZING A
PROFILE OF A
PERSON’S
SPEECH
•FREQUENCIES
ARE FORMANTS
EXAMPLE OF VOICE PRINTEXAMPLE OF VOICE PRINT
CHARACTERSTICS OF
MESH SUCH AS
STRIATIONS,
CRYPTS,RINGS &
FURROWS GIVES UNIQUE
PATTERN TO IRIS
IRIS RECOGNITION
IRIS PATTERN A LIFE LONG PASSWORD
•
TABECULAR
MESHWORK-
UNMIMICABL
E
• 266 UNIQUE
PATTERNS
• ERR=1 IN 1.2
MONOCHROME
CAMERA CAPTURES
CHARACTERISTICS
OF IRIS IN
PRESENCE OF NEAR
INFRARED LIGHT
PROCESS OF IRIS
RECOGNITION
PROCESS OF IRISPROCESS OF IRIS
RECOGNITIONRECOGNITION
EmergingEmergingbiometricsbiometrics
Vein scan
Facial
Thermography
Gait recognition
Blood Pulse
Ear shape
Recognition
Odour Sensing
VEIN PATTERN
GAIT ADVANCES INGAIT ADVANCES IN
EMERGING BIOMETRICSEMERGING BIOMETRICS
• RECOGNITION BYRECOGNITION BY
THE WAYTHE WAY
SOMEONESOMEONE
WALKSWALKS
BLOOD PULSEBLOOD PULSE
BIOMETRICSBIOMETRICS
INFRARED SENSORS MEASURES BLOODINFRARED SENSORS MEASURES BLOOD
PULSE ON FINGERS.PULSE ON FINGERS.
Odour sensors will identify yourOdour sensors will identify your
body odourbody odour
Facial ThermographFacial Thermograph
Detects heat patterns created by the branching of blood vessels andDetects heat patterns created by the branching of blood vessels and
emitted from the skin. Even identical twins have different thermographsemitted from the skin. Even identical twins have different thermographs
CONCLUSIONCONCLUSION
• Biometric technologies are becoming theBiometric technologies are becoming the
foundation of an extensive array of highly securefoundation of an extensive array of highly secure
identification and personal verification solutions.identification and personal verification solutions.
• The promises of e-commerce and e-governmentThe promises of e-commerce and e-government
can be achieved through the utilization of strongcan be achieved through the utilization of strong
personal authentication procedures.personal authentication procedures.
• Each biometric technique's performance canEach biometric technique's performance can
vary widely, depending on how it is used and itsvary widely, depending on how it is used and its
environment in which it is used.environment in which it is used.
•Access control
•Identification card
•Immigration checks
•Police records
•Customer identification, Loyalty programs
•Security systems
•Patient management in hospitals
•Public welfare programs management
•Preventing identity theft
•Membership management in clubs, libraries etc.
•Enterprise network security
•Transaction management
Banking, ATMs
 
Applications
• Time Attendance
A MULTIMODAL BIOMETRIC
SYSTEM USING FINGERPRINT,
FACE, AND SPEECH
REFERENCESREFERENCES
• INTERNATIONAL BIOMETRIC GROUPINTERNATIONAL BIOMETRIC GROUP
WESITE.(WESITE.(WWW.BIOMETRICGROUP.COMWWW.BIOMETRICGROUP.COM))
• VISIONICS WEBSITE(VISIONICS WEBSITE(WWW.VISIONICS.COMWWW.VISIONICS.COM))
• BIOMETRIC SYSTEMS LABBIOMETRIC SYSTEMS LAB
WEBSITE,BOLOGNA UNIVERSITYWEBSITE,BOLOGNA UNIVERSITY
• FACE RECOGNITION BY L. WISKOTT ANDFACE RECOGNITION BY L. WISKOTT AND
J.M. FELLOUS.J.M. FELLOUS.

Weitere ähnliche Inhalte

Was ist angesagt?

Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
DrKRBadhiti
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 

Was ist angesagt? (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometricsppt
BiometricspptBiometricsppt
Biometricsppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 

Andere mochten auch

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
Pathik504
 
biometrics
biometricsbiometrics
biometrics
Akhil Kumar
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
Piyush Mittal
 

Andere mochten auch (15)

Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Treball de Recerca
Treball de RecercaTreball de Recerca
Treball de Recerca
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Geoforensic
Geoforensic Geoforensic
Geoforensic
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 

Ähnlich wie Biometric slideshare

BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
SundusKhan42
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
Srikanth457
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
 

Ähnlich wie Biometric slideshare (20)

BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
blockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptxblockchain beyond cryptocurrency.pptx
blockchain beyond cryptocurrency.pptx
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptxBiometrics - Chapter 1 Introduction.pptx
Biometrics - Chapter 1 Introduction.pptx
 
Biometric Security Systems.pptx
Biometric Security Systems.pptxBiometric Security Systems.pptx
Biometric Security Systems.pptx
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law EnforcementHow Cloud-Based Biometrics Will Change the Face of Law Enforcement
How Cloud-Based Biometrics Will Change the Face of Law Enforcement
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Biometrics and Identity management
Biometrics and Identity managementBiometrics and Identity management
Biometrics and Identity management
 
Seminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptographySeminar report on Error Handling methods used in bio-cryptography
Seminar report on Error Handling methods used in bio-cryptography
 
Biometrics by ritesh
Biometrics by riteshBiometrics by ritesh
Biometrics by ritesh
 
CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
 

KĂźrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

KĂźrzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Biometric slideshare