Various Aspects of Biometric Security

Views:
 
Category: Education
     
 

Presentation Description

Biometric-security can be implemented in any device by installing the software and providing scanner as an additional hardware to provide input device. Read this document, we have mentioned some information regarding Biometric Security.

Comments

Presentation Transcript

slide 1:

Information Technology

slide 2:

INTRODUCTION • Biometric consists of two words bio means life and metrics which means metrikos. • Biometric-security is used for the purpose of identification and verification of individual. • For the purpose of identification different biological traits are considered.

slide 3:

Implementation of Biometric Security • Biometric-security can be implemented in any device by installing the software and providing scanner as an additional hardware to provide input device. • Then comparison between provided input and store data takes places on the basis of that locking and unlocking depends.

slide 4:

To Avail the Best Information Technology Assignment Help Australia Contact Us:- Phone:- +61 879 057 034 Email:- helpinstantassignmenthelp.com.au Website:- www.instantassignmenthelp.com.au

slide 5:

Steps involved in investigation The investigation process of biometric-fingerprintscanner depends on three stages such as: • Image enhancement • Minutiae extraction • Minutiae matching

slide 6:

Image Enhancement Under this methodology image is capture and processed through algorithm. Stages of algorithm are mentioned below. • Normalization • Local orientation estimation • Local frequency estimation • Region mask identification • Filtering

slide 7:

Minutiae extraction matching • The process of minutiae extraction convert image into binary formate and then compare with other adjacent pixels in order to produce considerable output image. • In the process of minutiae matching comparison of image takes place between the image in database and input one.

slide 8:

Types of fingerprint scanner They are described on the basis of technologies and properties such as mentioned below: • USB fingerprint devices: They can be attached through USB port and available at cost of 77.77 pound.

slide 9:

Cont... • Keyboard fingerprint devices: They are attached with keyboard and provide security to user. They are available at price of 124.40 pound. • Fingerprint scanner and card reader: they are provided in the combination of scanner and card reader at the price of 31.03 pound. • Car fingerprint scanner: This is considered as new feature of auto mobiles and available at the price of 27686120.00 pounds.

slide 10:

To Avail the Best Information Technology Assignment Help Australia Contact Us:- Phone:- +61 879 057 034 Email:- helpinstantassignmenthelp.com.au Website:- www.instantassignmenthelp.com.au

slide 11:

Reviews of device • USB Fingerprint Device: On the basis of users review. This device is useful for individual as well as businesses for security purpose. As they are provided with USB so they provide easy installation interface to users. And also provided at considerable price. • Keyboard Fingerprint Device: On the basis of users review. This reduces the chances of data lost and stole from individuals device.

slide 12:

Cont... • Fingerprint Scanner and card reader: On the basis of users review the price of product is affordable along with this it is portable and mobile. • Car Fingerprint Scanner: On the basis of users review this decreases the chances of car stolen and also give ride of carrying keys.

slide 13:

Advantages of Biometrics security • As the process involve identification through biological traits therefore level of security automatically get improved. • As customers are not require to remember password and codes which improves their experience.

slide 14:

Disadvantages of Biometrics security • The main disadvantage of using biometric security is it is not 100 secure. • Secondly it requires additional hardware such as scanner camera etc.

slide 15:

Conclusion On the basis of above presentation the following conclusion drawn: • ICT is used to provide reliable and safe devices to business and industries. • Biometric security devices are produced by ICT. • They use to provide security by using biological traits.

slide 16:

To Avail the Best Information Technology Assignment Help Australia Contact Us:- Phone:- +61 879 057 034 Email:- helpinstantassignmenthelp.com.au Website:- www.instantassignmenthelp.com.au

slide 17:

References • Devaraj S. Ow T.T. and Kohli R. 2013. Examining the impact of information technology and patient flow on healthcare performance: A Theory of Swift and Even Flow TSEF perspective. Journal of Operations Management. 314. pp.181-192. • Han K. and Mithas S. 2013. Information technology outsourcing and non-IT operating costs: An empirical investigation. Mis Quarterly. 371. pp.315-331. • Ingebrigtsen T. Georgiou A and et.al. 2014. The impact of clinical leadership on health information technology adoption: systematic review. International journal of medical informatics. 836. pp.393-405.

slide 18:

THANK YOU

authorStream Live Help