SlideShare ist ein Scribd-Unternehmen logo
1 von 16
•
•
•
•
•
Scanning Devices
Biometrics
• Microsoft fingerprint scannerWhen referring to computers and
security, biometrics is the identification of a person by the
measurement of their biological features.
Examples:
•a user identifying themselves to a
computer or building by their finger print
or voice is considered a biometrics
identification.
• Face scanner :-
Biometric face scanners identify a person by
taking measurements of a person face.
• the distance between the persons chin, eyes, nose, and mouth.
These types of scanners can be very secure assuming they are
smart enough to distinguish between a picture of a person and a
real person.
Hand Scanner:
• Like your finger print, the palm of your hand is also unique to
you. A biometric hand scanner will identify the person by the palm
of their hand.
Finger scanner :
• a biometric finger scanner identifies the person by their finger
print. These can be a secure method of identifying a person.
Retina or iris scanner :
• A biometric retina or iris scanner identifies a person by scanning
the iris or retina of their eyes. These scanners are more secure
biometric authentication schemes when compared to the other
devices because there is no known way to duplicate the retina or
iris.
Voice scanner
• Finally, a voice analysis scanner will mathematically break down a person's
voice to identify them. These scanners can help improve security but with some
less sophisticated scanners can be bypassed using a tape recording.
•1. Secure Data Transfer
•2. Scalability
•3. Portability
•4. Device Branding
•5. User Friendly
•6. Real time data transfer
Role of Scanning Devices In ModernWorld
• In recent times, biometrics based on brain (electroencephalogram)
and heart (electrocardiogram) signals have emerged the research
group at university of wolverhampton led by ramaswamy
palaniappan has shown that people have certain distinct brain and
heart patterns that are specific for each individual.
•The advantage of such 'futuristic' technology
is that it is more fraud resistant compared to
conventional biometrics like fingerprints
Scanning Devices

Weitere ähnliche Inhalte

Was ist angesagt?

Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
Hafsa Tahir
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
ARUNASUJITHA
 

Was ist angesagt? (20)

Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometric Authentication final
Biometric Authentication finalBiometric Authentication final
Biometric Authentication final
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
How Fingerprint Scanner Work
How Fingerprint Scanner WorkHow Fingerprint Scanner Work
How Fingerprint Scanner Work
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
IRIS Scaner
 IRIS Scaner IRIS Scaner
IRIS Scaner
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
Iris by @run@$uj! final
Iris by @run@$uj!    finalIris by @run@$uj!    final
Iris by @run@$uj! final
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 

Ähnlich wie Scanning Devices

sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 

Ähnlich wie Scanning Devices (20)

2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometric by amin
Biometric by aminBiometric by amin
Biometric by amin
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Input devices
Input devicesInput devices
Input devices
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)Biometrics clear presentation by Adduri kalyan(AK)
Biometrics clear presentation by Adduri kalyan(AK)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
Biometrics Biometrics
Biometrics
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

Scanning Devices

  • 1.
  • 4. Biometrics • Microsoft fingerprint scannerWhen referring to computers and security, biometrics is the identification of a person by the measurement of their biological features.
  • 5. Examples: •a user identifying themselves to a computer or building by their finger print or voice is considered a biometrics identification.
  • 6.
  • 7. • Face scanner :- Biometric face scanners identify a person by taking measurements of a person face.
  • 8. • the distance between the persons chin, eyes, nose, and mouth. These types of scanners can be very secure assuming they are smart enough to distinguish between a picture of a person and a real person.
  • 9. Hand Scanner: • Like your finger print, the palm of your hand is also unique to you. A biometric hand scanner will identify the person by the palm of their hand.
  • 10. Finger scanner : • a biometric finger scanner identifies the person by their finger print. These can be a secure method of identifying a person.
  • 11. Retina or iris scanner : • A biometric retina or iris scanner identifies a person by scanning the iris or retina of their eyes. These scanners are more secure biometric authentication schemes when compared to the other devices because there is no known way to duplicate the retina or iris.
  • 12. Voice scanner • Finally, a voice analysis scanner will mathematically break down a person's voice to identify them. These scanners can help improve security but with some less sophisticated scanners can be bypassed using a tape recording.
  • 13. •1. Secure Data Transfer •2. Scalability •3. Portability •4. Device Branding •5. User Friendly •6. Real time data transfer
  • 14. Role of Scanning Devices In ModernWorld • In recent times, biometrics based on brain (electroencephalogram) and heart (electrocardiogram) signals have emerged the research group at university of wolverhampton led by ramaswamy palaniappan has shown that people have certain distinct brain and heart patterns that are specific for each individual.
  • 15. •The advantage of such 'futuristic' technology is that it is more fraud resistant compared to conventional biometrics like fingerprints