Professional Documents
Culture Documents
Krupajal Engineering College: Biometrics Technology
Krupajal Engineering College: Biometrics Technology
Seminar on
Biometrics Technology
SUBMITTED BY:
NAME: PRIYAMBADA BEHERA
BRANCH:ELECTRONICS & TELECOM.ENGINEERING
REGD.NO: 0821223030
ROLL.NO:08ET131
12/08/21 1
INTRODUCTION:
• Biometrics is a technology which
is mainly used for the security
purpose.
• It is preferred over traditional
security methods.
12/08/21 2
TRADITIONAL SECURITY METHODS:
• Password in computer
• Pin number in ATM card
• Identity card
• Driving license
12/08/21 3
DISADVANTAGE OF TRADITIONAL
SECURITY METHOD:
12/08/21 4
DEFINITION OF BIOMETRICS:
12/08/21 5
PHYSIOLOGICAL:
12/08/21 7
BIOMETRICS :HOW DO THEY WORK?
Although biometric technologies differ, they all
work in a similar fashion:
• The user submits a sample using acquisition
device.
• Sample is then compared with the sample which
is already present in database.
• If it matches, it shows it is correct otherwise it is
incorrect.
12/08/21 8
LEADING BIOMETRIC TECHNOLOGY:
• Facial recognization
• Fingerprint matching
• Hand geometry
• Voice recognization
• Signature scan
12/08/21 9
FACIAL RECOGNIZATION SYSTEM:
• A facial recognization system is a
computer-driven application for automatically
identifying a person from a digital image.
It does that by comparing selected facial
features in the live image and a facial
database.
• It is typically used for security systems and
can be compared to other biometrics such as
fingerprint or eye iris recognition systems.
12/08/21 10
FACIAL RECOGNIZATION:
12/08/21 11
ACQUISITION DEVICE:
• Video Camera
• PC camera
• single-image camera
SAMPLE :
• Facial image
12/08/21 12
FACTORS AFFECT FACIAL LOCATION:
12/08/21 13
FINGERPRINT IDENTIFICATION:
• Among all the biometric techniques, it is
the oldest method which has been
successfully used in numerous
application.
• The uniqueness of a fingerprint can be
determined by the pattern of ridges &
furrows as well as the minutiae points.
12/08/21 14
Figure:1
12/08/21 15
FIGURE 2.
12/08/21 16
ACQUISITION DEVICE:
• Desktop peripheral
• PC card
• Mouse chip
SAMPLE :
• Fingerprint image
12/08/21 17
FACTORS AFFECT FINGERPRINTS:
• Cold finger
• Dry/oily finger
• Cuts to fingerprint
• Manual activity that affect fingerprints
12/08/21 18
HAND GEOMETRY:
12/08/21 19
12/08/21 20
ACQUISITION DEVICE:
SAMPLE :
12/08/21 21
FACTORS AFFECT HAND
GEOMETRY:
•Jewelry
• Bandage
• Swelling of joints
12/08/21 22
VOICE RECOGNIZATION:
• Voice recognization technology verifies
the identity of the individual who is
speaking.
• Voice recognization can utilize any
audio capture device, including mobile
and land telephones and PC
microphones.
12/08/21 23
ACQUISITION DEVICE:
• Microphone
• telephone
SAMPLE :
• Voice recording
12/08/21 24
FACTORS AFFECT VOICE
RECOGNIZATION:
12/08/21 25
SIGNATURE VERIFICATION:
12/08/21 26
ACQUISITION DEVICE:
• Signature Tablet
SAMPLE :
• Image of Signature
• record of related dynamics measurement
12/08/21 27
FACTORS AFFECT SIGNATURE:
12/08/21 28
APPLICATION OF BIOMETRICS:
• It is used in forensic lab for criminals
identification.
• It is used to prevent unauthorized access to
ATM card, smart card & computer.
• In automobile, biometrics can replace keys
with key less entry & key less ignition.
• Due to increased security threats, many
country have used this technique for border
control & national ID CARDS.
12/08/21 29
CONCLUSION:
– Biometric cannot be lost, stolen or
forgotten.
– it cannot be written down and stolen by
social re-engineering.
That’s why this technology is more
secure than others.
12/08/21 30
THA
NK
YOU
31