BIOMETRIC

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

Information technology project

TOPIC: BIOMETRIC
AUTHENTICATION

Presented by ankit kumar prajapati of


Class X “B”
Roll no. 38
Presented to : Rahul Mittra Sir
Contents:
What is biometrics
Need of biometrics
Types of biometrics
Fingerprint recognition
Face recognition
Hand geometry
Iris scanning
Voice recognition
Signature recognition
Advantages
Disadvantages
Application of biometrics
Conclusion
What is biometrics?
Biometrics are physical or
behavioural human
characteristics that can be
used to digitally identify a
person to grant access to
systems, devices or data.
The word Biometrics comes
from the Greek words "bios"
(life) and "metron" (measure).
Need of biometrics
 Main purpose is security.
 Can not be stolen,
forgotten or lost.
 High secure than
passcode and pin.
 Easy and requires less
time..
 Fake person can be
identified.
Types of biometrics
Fingerprint recognition
Fingerprint recognition is a type
of physical biometrics. For this
authentication method, a
fingerprint scanner is used to
authenticate data. Fingerprint
scanners are security systems of
biometrics. They are used in
police stations, security
industries, smartphones, and
other mobile devices.
Face recognition
Facial recognition is the automatic
localization of a human face in an
image or video. If necessary, facial
recognition technology can be used
to confirm a person's identity based
on the available data - an image of
someone’s face stored in a database
as mathematical code. Interest in
this technology is high because this
method can be applied in
videoconferencing.
Hand geometry
Hand geometry is a biometric
that identifies users from the
shape of their hands. Hand
geometry readers measure a
user's palm and fingers along
many dimensions including
length, width, deviation, and
angle and compare those
measurements to
measurements stored in a file.
Iris scanning
Iris scanning technology was first
proposed in 1936 by
ophthalmologist Frank Bursch. In
the early 1990s, John Dufman of
Iridian Technologies patented an
algorithm for detecting differences
in the iris. At the moment, this
biometric authentication method is
one of the most accurate and is
performed with the help of
dedicated iris scanners.
Voice recognition
Voice is a feature as inherent to
each person as their fingerprints
or face. The fact that so many
companies worldwide use phones
for communication offers an
excellent opportunity for the use
of this biometric authentication
method. Moreover, voice
recognition is very convenient for
users and requires minimum
effort on their side.
Signature recognition
Dynamic signature verification can
be applied in areas requiring
workflow automation, such as
banking or judicial systems.
Signature recognition is based on
pattern recognition algorithms or
mathematical methods of curve
analysis, since a set of points can
represent a signature. Therefore,
these systems often use time series
decomposition or curve
approximation.
Advantages
Uniqueness
Universality
Permanence
Measurability
User friendliness
Accuracy
Comfort
Convenient
disadvantages
Costly.
Missing body part problem.
False acceptances and rejections.
The scanning of eye is fearful.
The nervousness that people feel
about the scanners identification.
If a person's biometric data is stolen,
it is not possible to replace it.
Application of biometrics
 Immigration Control
 Transactional Authentication
 Computer Security
 Mobile device
 Smart Doors
 Time and Attendance
 Prisons
conclusion
Biometrics, if used correctly, can and should be a valuable tool for
information security. However, like the other methods for
identifying and authenticating a person it has drawbacks of its
own. No system is ever foolproof, and because of that biometrics
needs to be used in conjunction with at least one other method.
This method is often referred to as two-factor authentication.
Requiring the user to either know something else or having
something else decreases the chances of type II errors. Also if
there is an issue with the biometric scanner it would then be easy
to fall back onto a password or a security card. The reason
biometrics will never be used by itself, is that is will never be
secure enough without other forms. While we may be able to
reduce type I and type II errors, it is not a fool prood method. The
requirement of another form of authentication gives us another
level of security that is a requirement.

You might also like