Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.
Nächste SlideShare
Biometrics Technology
Biometrics Technology
Wird geladen in …3
×
16 von 19

Biometric's final ppt

182

Teilen

Herunterladen, um offline zu lesen

biometric

Ähnliche Bücher

Kostenlos mit einer 30-tägigen Testversion von Scribd

Alle anzeigen

Ähnliche Hörbücher

Kostenlos mit einer 30-tägigen Testversion von Scribd

Alle anzeigen

Biometric's final ppt

  1. 2. <ul><li>Vidur pandey </li></ul><ul><li>Vidita vanage </li></ul><ul><li>Vinay patel </li></ul><ul><li>Vaibhav mehta </li></ul>
  2. 3. <ul><li>Presentation Outlines </li></ul><ul><li>Definiton of biometrics </li></ul><ul><li>Terms of biometrics </li></ul><ul><li>Biometrics characteristics </li></ul><ul><li>Biometrics recognition techniques </li></ul><ul><li>Applications </li></ul><ul><li>conclusion </li></ul>
  3. 4. Biometrics refers to the automatic identification of a person based on his or her physiological or behavioral characteristics . DEFINITION OF BIOMETRICS
  4. 5. BIOMETRIC TERMS <ul><li>Recognition </li></ul><ul><li>Identification </li></ul><ul><li>verification </li></ul>
  5. 6. Biometric characteristics 1) Physiological 2) Behavioral
  6. 7. <ul><li>Physical biometrics </li></ul><ul><li>Fingerprint </li></ul><ul><li>Facial recognition/face location </li></ul><ul><li>Hand geometry </li></ul><ul><li>Iris scan </li></ul><ul><li>Retina scan </li></ul>
  7. 8. Fingerprint recognition <ul><li>A live acquisition of a person’s fingerprint. </li></ul><ul><li>Dots (very small ridges), </li></ul><ul><li>Space between two temporarily divergent ridges), </li></ul><ul><li>Spurs (a notch protruding from a ridge), </li></ul><ul><li>Bridges (small ridges joining two longer adjacent ridges), crossovers (two ridges that cross each other). </li></ul>
  8. 9. Facial Recognition <ul><li>Capture image </li></ul><ul><li>2. Find face in image </li></ul><ul><li>3. Extract features </li></ul><ul><li>(store template) </li></ul><ul><li>4. Compare templates </li></ul><ul><li>5. Declare matches </li></ul>
  9. 10. Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers. Hand Geometry
  10. 11. Iris recognition Iris scanning measures the iris pattern in the colored part of the eye,
  11. 12. Retina recognition Images back of the eye and compares blood vessels with existing data
  12. 13. <ul><li>Behavioral biometrics </li></ul><ul><li>Speaker/voicerecognition </li></ul><ul><li>Signature/handwriting </li></ul><ul><li>Keystroke/patterning </li></ul>
  13. 14. Speaker / Voice Recognition Voice or speaker recognition uses vocal characteristics to identify individuals using a pass-phrase. A telephone or microphone can serve as a sensor,
  14. 15. Signature Verification An automated method of measuring an individual’s signature. This technology examines speed,direction, and pressure of writing; the time that the stylus is in and out of contact with the “paper’’.
  15. 16. Keystroke dynamics Keystroke dynamics is an automated method of examining an individual’s keystrokes on a keyboard. This technology examines such dynamics as speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys.
  16. 17. <ul><li>Prevent unauthorized access to ATMs, Cellular phones Desktop PCs </li></ul><ul><li>Criminal identification </li></ul><ul><li>In automobiles biometrics can replace keys with keyless entry devices </li></ul><ul><li>Airport security </li></ul>APPLICATIONS
  17. 18. <ul><li>Conclusion </li></ul><ul><li>Biometric is an emerging area with many opportunities for growth. </li></ul><ul><li>Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past. </li></ul>

Notizen

  • http://www.hhsc.state.tx.us/Consolidation/Consl_home.html . www.rediris.es/cert/doc/ unixsec/node14.html
  • ×