ݺߣ

ݺߣShare a Scribd company logo
Seminar Presentation
  on Biometrics



           Shivank Garg
           B.Tech(6th Sem)
           IT(1003213047)
What is Biometrics ?
   Biometrics is the science and technology of
  measuring and analyzing biological data. In
  information technology, biometrics refers to
technologies that measure and analyze human
body characteristics, such as DNA, fingerprints,
 eye retinas and irises, voice patterns & facial
      patterns for authentication purpose.
USE OF BIOMETRICS
   Biometrics are used in two major ways : Identification and
    Verification.
   Identification is determining who a person is. It involves taking
    the measured characteristic and trying to find a match in a
    database containing records of people and that characteristic.
    This method can require a large amount of processing power
    and some time if the database is very large. It is often used in
    determining the identity 1of a suspect from crime scene
    information.
   Verification is determining if a person is who they say they are.
    It involves taking the measured characteristic and comparing it
    to the previously recorded data for that person. This method
    requires less processing power and time, and is often used for
    accessing places or information.
Working of Biometrics
Categories of Biometrics
Signature Verification :
Handwriting recognition system's
sensors can include a touch-
sensitive writing surface or a pen
that contains sensors that detect angle, pressure and
direction. The software translates the handwriting into a
graph and recognizes the small changes in a person's
handwriting from day to day and over time.
Fingerprint Analyzing



  Among all the biometric techniques,
fingerprint-based identification is the
oldest method, which has been
successfully used in numerous
applications. Everyone is known to have
unique fingerprints.
Facial Recognition
Facial recognition software uses the
ability to recognize a face and then
pinpoint various features of the face.
Face recognition works by using
a computer to analyze an
individual’s facial structure. The points
measured
include distances between key
characteristics such
as eyes, nose and mouth, angles of key
features
such as the jaw and forehead, and
lengths of
various portions of the face.
Iris recognition

 Iris recognition is a method of biometric
uses pattern recognition techniques
based on high-resolution images of the
irises of an individual's eyes. unique
structures converted into digital
templates, provide mathematical
representations of the iris that yield
unambiguous positive identification of an
individual.
Retinal Scan

 Oldest biometrics as 1930's
research suggested Scanning
involves using a low-intensity light
source and an optical coupler and
can read the patterns at a great
level of accuracy. It does require
the user to remove glasses, place
their eye close to the device, and
focus on a certain point. that the
patterns of blood vessels on the
back of the human eye were unique
to each individual
Speaker Recognition


 Voice authentication, also known
as “speaker verification”, is
defined as the automated
verification of a person’s claimed
identity, based on unique
characteristics of their voice. A
simple microphone is enough to
record the voice, and then most of
the algorithm are analyzing the
voice spectrum. Voice and
speech can be combined to get a
better system:
Advantages of biometrics:
1.   Uniqueness
2.   Universality
3.   Permanence
4.   Measurability
5.   User friendliness
6.   Accuracy
7.   Comfort
Disadvantages of Biometrics
1. Costly.



2. Facial imaging can also hinder accurate
    identifications.

3. Missing body part problem.


4. The scanning of eye is fearful.
Applications of Biometrics
 Banking
 Computer Access

 National Identity

 Electronic Data Transfer (EDT)

 Physical Access

 Telecommunications

 Time & Attendance
CONCLUSION
Biometrics is widely being used because of its
 user friendliness, flexibility in specifying required
 security level and long term stability.

In today's highly connected business
 environments, securing business-critical data is a
 vital concern. One of the most problematic areas
 of security is user authentication. Fortunately, the
 increasing popularity of biometric devices is
 making it easier to ensure that users logging into
 the network are really who they say they are.
Bio shiv

More Related Content

Bio shiv

  • 1. Seminar Presentation on Biometrics Shivank Garg B.Tech(6th Sem) IT(1003213047)
  • 2. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns & facial patterns for authentication purpose.
  • 3. USE OF BIOMETRICS  Biometrics are used in two major ways : Identification and Verification.  Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity 1of a suspect from crime scene information.  Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.
  • 5. Categories of Biometrics Signature Verification : Handwriting recognition system's sensors can include a touch- sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction. The software translates the handwriting into a graph and recognizes the small changes in a person's handwriting from day to day and over time.
  • 6. Fingerprint Analyzing Among all the biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Everyone is known to have unique fingerprints.
  • 7. Facial Recognition Facial recognition software uses the ability to recognize a face and then pinpoint various features of the face. Face recognition works by using a computer to analyze an individual’s facial structure. The points measured include distances between key characteristics such as eyes, nose and mouth, angles of key features such as the jaw and forehead, and lengths of various portions of the face.
  • 8. Iris recognition Iris recognition is a method of biometric uses pattern recognition techniques based on high-resolution images of the irises of an individual's eyes. unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual.
  • 9. Retinal Scan Oldest biometrics as 1930's research suggested Scanning involves using a low-intensity light source and an optical coupler and can read the patterns at a great level of accuracy. It does require the user to remove glasses, place their eye close to the device, and focus on a certain point. that the patterns of blood vessels on the back of the human eye were unique to each individual
  • 10. Speaker Recognition Voice authentication, also known as “speaker verification”, is defined as the automated verification of a person’s claimed identity, based on unique characteristics of their voice. A simple microphone is enough to record the voice, and then most of the algorithm are analyzing the voice spectrum. Voice and speech can be combined to get a better system:
  • 11. Advantages of biometrics: 1. Uniqueness 2. Universality 3. Permanence 4. Measurability 5. User friendliness 6. Accuracy 7. Comfort
  • 12. Disadvantages of Biometrics 1. Costly. 2. Facial imaging can also hinder accurate identifications. 3. Missing body part problem. 4. The scanning of eye is fearful.
  • 13. Applications of Biometrics  Banking  Computer Access  National Identity  Electronic Data Transfer (EDT)  Physical Access  Telecommunications  Time & Attendance
  • 14. CONCLUSION Biometrics is widely being used because of its user friendliness, flexibility in specifying required security level and long term stability. In today's highly connected business environments, securing business-critical data is a vital concern. One of the most problematic areas of security is user authentication. Fortunately, the increasing popularity of biometric devices is making it easier to ensure that users logging into the network are really who they say they are.