Shakti Bio Metrics Full

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 25

Seminar On Biometric

submitted by: D.Shakti Raj Swami

Contents

Introduction Types uses Working Features

Introduction
The term "biometrics" is derived from the Greek words bio (life) and metric (to measure).The biometric provides most secure level of authorization.

Types Of Biometric
Physiological
Behavioral

Physiological
Physiological are related to the shape of the body. Examples include fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina.

Behavioral
Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm and voice.

Uses Of Biometrics
Identification Verification

Identification

Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power, some time, if the database is very large. It is often used in determining the identity of a suspect from crime scene information

Verification

Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information.

How It Works

Biometric devices consist of a reader or scanning device, software that converts the gathered information into digital form, and a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database

Physical Biometrics

Fingerprint Facial Recognition Hand Geometry Iris Scan Retina Scan Vascular Patterns DNA

Behavioral Biometrics
Speech

Recognition Signature Keystroke voice recognition

Finger Print
An extremely useful biometrics technology since fingerprints have long been recognized as a primary and accurate identification method.

Facial recognition
Biometric face recognition works by using a computer to analyze a subject's facial structure. Face recognition software takes a number of points and measurements, including the distances between key characteristics such as eyes, nose and mouth, angles of key features such as the jaw and forehead, and lengths of various portions of the face.

Hand geometry

Hand geometry systems are commonly available in two main forms. Full hand geometry systems take an image of the entire hand for comparison while Two Finger readers only image two fingers of the hand. Hand recognition technology is currently one of the most deployed biometrics disciplines world wide

Iris Scan
Analysis of the iris of the eye, which is the colored ring of tissue that surrounds the pupil of the eye.

Retina Scan

The blood vessels at the back of the eye have a unique pattern, from eye to eye and person to person. No two retinas are the same, even in identical twins.

Vascular patterns
Uses an infrared camera to measure the veins on the wrist and back of the hand.

DNA

DNA has been called the ultimate identifier Identify information from every cell in the body in a digital form.

Speech Recognition
Speech recognition converts spoken words to text. It is
based on two speech input: 1.Text dependent 2.Text independent

Signature
Many aspects of the signature in motion can be studied, such as pen pressure, the sound the pen makes

Keystroke
The rhythms with which one types at a keyboard are sufficiently distinctive to form the basis of the biometric technology known as keystroke dynamics

Voice Recognition
voices are unique to each person (including twins), and cannot be exactly replicated by using this recognition technique.

Features

Reduce password administration costs. Increase security Eliminate problems caused by lost IDs or forgotten passwords

Thanks
Any queries ?

You might also like