slide 1: Information Technology
slide 2: INTRODUCTION
• Biometric consists of two words bio means life and
metrics which means metrikos.
• Biometric-security is used for the purpose of
identification and verification of individual.
• For the purpose of identification different biological
traits are considered.
slide 3: Implementation of Biometric Security
• Biometric-security can be implemented in any
device by installing the software and providing
scanner as an additional hardware to provide input
device.
• Then comparison between provided input and store
data takes places on the basis of that locking and
unlocking depends.
slide 4: To Avail the Best Information Technology Assignment
Help Australia
Contact Us:-
Phone:- +61 879 057 034
Email:- helpinstantassignmenthelp.com.au
Website:- www.instantassignmenthelp.com.au
slide 5: Steps involved in investigation
The investigation process of biometric-fingerprintscanner
depends on three stages such as:
• Image enhancement
• Minutiae extraction
• Minutiae matching
slide 6: Image Enhancement
Under this methodology image is capture and
processed through algorithm. Stages of algorithm are
mentioned below.
• Normalization
• Local orientation estimation
• Local frequency estimation
• Region mask identification
• Filtering
slide 7: Minutiae extraction matching
• The process of minutiae extraction convert image into
binary formate and then compare with other adjacent pixels
in order to produce considerable output image.
• In the process of minutiae matching comparison of image
takes place between the image in database and input one.
slide 8: Types of fingerprint scanner
They are described on the basis of technologies and
properties such as mentioned below:
• USB fingerprint devices: They can be attached through
USB port and available at cost of 77.77 pound.
slide 9: Cont...
• Keyboard fingerprint devices: They are attached with
keyboard and provide security to user. They are available at
price of 124.40 pound.
• Fingerprint scanner and card reader: they are provided in
the combination of scanner and card reader at the price of
31.03 pound.
• Car fingerprint scanner: This is considered as new feature
of auto mobiles and available at the price of 27686120.00
pounds.
slide 10: To Avail the Best Information Technology Assignment
Help Australia
Contact Us:-
Phone:- +61 879 057 034
Email:- helpinstantassignmenthelp.com.au
Website:- www.instantassignmenthelp.com.au
slide 11: Reviews of device
• USB Fingerprint Device: On the basis of users review. This device
is useful for individual as well as businesses for security purpose. As
they are provided with USB so they provide easy installation
interface to users. And also provided at considerable price.
• Keyboard Fingerprint Device: On the basis of users review. This
reduces the chances of data lost and stole from individuals device.
slide 12: Cont...
• Fingerprint Scanner and card reader: On the
basis of users review the price of product is
affordable along with this it is portable and mobile.
• Car Fingerprint Scanner: On the basis of users
review this decreases the chances of car stolen
and also give ride of carrying keys.
slide 13: Advantages of Biometrics
security
• As the process involve identification through
biological traits therefore level of security
automatically get improved.
• As customers are not require to remember password
and codes which improves their experience.
slide 14: Disadvantages of Biometrics
security
• The main disadvantage of using biometric security is it is
not 100 secure.
• Secondly it requires additional hardware such as scanner
camera etc.
slide 15: Conclusion
On the basis of above presentation the following conclusion
drawn:
• ICT is used to provide reliable and safe devices to
business and industries.
• Biometric security devices are produced by ICT.
• They use to provide security by using biological traits.
slide 16: To Avail the Best Information Technology Assignment
Help Australia
Contact Us:-
Phone:- +61 879 057 034
Email:- helpinstantassignmenthelp.com.au
Website:- www.instantassignmenthelp.com.au
slide 17: References
• Devaraj S. Ow T.T. and Kohli R. 2013. Examining the impact of information
technology and patient flow on healthcare performance: A Theory of Swift and Even
Flow TSEF perspective. Journal of Operations Management. 314. pp.181-192.
• Han K. and Mithas S. 2013. Information technology outsourcing and non-IT
operating costs: An empirical investigation. Mis Quarterly. 371. pp.315-331.
• Ingebrigtsen T. Georgiou A and et.al. 2014. The impact of clinical leadership on
health information technology adoption: systematic review. International journal of
medical informatics. 836. pp.393-405.
slide 18: THANK YOU