biometrics 1

Category: Education

Presentation Description

No description available.


By: leeluviji (124 month(s) ago)

please send this ppt to this mail id

By: mrdarkknight (129 month(s) ago)

please allow me to download the presentation .

Presentation Transcript

Slide 1: 

By: Anusha Sreekumar Methil S2 amber Biometrics

What is biometrics? : 

What is biometrics? Biometrics is the analysis of certain systems with the purpose of identifying and verifying an identity or for any other sake but would be mainly used for security cases.

Slide 3: 

It analyzes results through human characteristics such as the iris, voice recognition, hand print, facial patterns and also the thumb prints ..etc

What is Biometrics used for? : 

What is Biometrics used for? They are mainly used for security purposes which are adopted by a few confidential ATM’s and government authorities to keep their important data’s or anything that are mend to keep. So, to do so, they use biometrical features to help.

The difference of ‘verification’ and of ‘identification’ in biometrics. : 

The difference of ‘verification’ and of ‘identification’ in biometrics. Verification- Biometric verification is analyzing the biometrical traits which have been prominent through the characteristics such as, hand geometry, iris scans, signatures, voice patterns , DNA and more.

Slide 7: 

Identification- It would be the process of identification through analyzing the results of biometrical background information against its characteristics.

Slide 8: 

Hand Geometry

how are ‘hands’ adapted in the biometrics? : 

how are ‘hands’ adapted in the biometrics? There are verification systems for the hand geometry. It is called the hand recognition systems. It is only used for verification and not for identification.

Slide 10: 

The system analyzes the measurements and features of the hand, which are basically such characteristics of the hand like the creases and the ridges.

Slide 11: 

While the system is scanning , it looks for 90 characteristics of the hand and does the process of scanning three times. The scanner would look like this:

Slide 12: 

Advantages and disadvantages

Slide 13: 

What is hand geometry used for? Its mainly used for security purposes. And its mainly used by schools and/ or businesses instead of using systems that are strong by it’s authentication.

Slide 14: 

How is it used? the system simply uses a digital camera and light. So, first your hand should be aligned across the surface where you’ve faced your hand flat. The camera then would take a shot of your hand and uses the key measurements of your hands. Which would be matched with it.

Slide 15: 


Fingerprints.. : 

Fingerprints.. As everyone has a unique fingerprint, this method would be the oldest and the most common one, that have been used. The fingerprint scanner scans the unique characteristics

Slide 17: 

There are more characteristics that are used to analyze for the fingerprints. And some of the others are mentioned in this picture. ridges ( A narrow line found in our fingerprint) -furrow (a deep line found in our fingerprint) -Minutiae points (Local ridge characteristics)

Slide 18: 

There would be a software that stores in all the fingerprints. And there would be a scanner to scan the fingerprint. After this, the processor would be comparing and matching the fingerprints which would also have a personal account of a person according to its characteristics.

Advantages and disadvantages : 

Advantages and disadvantages

Slide 20: 

why is Finger biometrics used? Instead of using cards, it is much accurate and easier to access doors or whatever as your finger is your own key. This is used as the cards can be lost and/or stolen by others, so they can just access themselves in.

Slide 21: 


Retina Biometrics : 

Retina Biometrics For security purposes, the iris is another biometrical system which requires scanning. The scanner would be analyzing over 200 characteristics of the iris. There wouldn’t be a paraphernalia that could change any characteristics of the iris. Even surgeries are unable to do so.

Slide 23: 

This is a picture of the iris with some characteristics marked:

Slide 24: 

How is the retina scanner used? the person is conditioned to remove anything that they are wearing for example, contact lenses or glasses. And they are remained to stay still and to look specifically at a place, and the special light equipment would be mirrored into your eye. After that, a photo would be taken, which would be analyzed and compared to find the results.

Advantages and disadvantages : 

Advantages and disadvantages

Slide 26: 

Voice Patterns

Voice recognition : 

Voice recognition This system would be recorded down and transformed into a digital format to identify the person’s voice.

Slide 28: 

As the recorded voice can be broken down to segments. And each segment would be called formants. And each of the segment would be recorded into the digital format as each of the segment have several tones that varies in it.

Slide 29: 

As everyone has their own voice trait no one would have the ability to imitate another voice perfectly and so it also recognizes the voice through its characteristics such as the behavioral component and the physiological component.

Slide 30: 

the system’s determination is to determine the recorded words into the translated version of whatever that has been captured.

Advantages and disadvantages : 

Advantages and disadvantages

Slide 32: 

Face Recognition Systems- Biometrics

Slide 34: 

Face recognition systems are used by computer software which examines the points and/or the distances between the key features of the face. After this, the software analyses the measurements that have been recorded as the data.

Slide 35: 

This is system is used also by the NEC. But the NEC has created the world’s first automated border control system. Which means, the camera’s can detect and identify a person under any automobiles.

Slide 36: 

Types of face biometrics -traditional -3D -Skin texture analysis

Advantages and Disadvantages : 

Advantages and Disadvantages

reference : 


Slide 39:

authorStream Live Help