Biometric Recognition Technologies and Biometric Applications

Views:
 
Category: Entertainment
     
 

Presentation Description

We offer quality biometric product solution that used for high security .A Biometric system is automated recognition of persons based on their biological or/and behavioral characteristics include eye retinas and iris, voice patterns, facial patterns etc.

Comments

Presentation Transcript

biometric Recognition Technologies and Applications :

biometric  Recognition Technologies and Applications AUTOMATED PROCESS OF IDENTIFYING

What is Biometrics ?  :

What is Biometrics ?  Biometrics Biometrics" is derived from the Greek words 'bios' and 'metric which means “life measurement" in other way , Biometry = Bio(life)+ Metry (to measure ). Is the term given to the use of biological traits OR behavioral characteristics to identify an individual . Biometrics: “bio”means life and “metrics”– to measure.  

Characteristics of Biometrics:

Characteristics of Biometrics Biometric technology measuring and analyzing biological data of human body, it’s capture & identify automatically through integrated biometric device which based on two major characteristics . Physical characteristics Behavioral characteristics http://ashtopustech.com

Mode of Biometric System:

M ode of Biometric System Identification One-to-many comparison It search for a sample against a database of templates It identifies an unknown individual. For e.g.: who is “x”? Verification One-to-one comparison It compares a sample against a single stored template It verifies that the individual is who he claims to be For e.g.: is this “x”?

How Does a Biometric System Work? :

How Does a Biometric System Work?

Why Use Biometrics?:

Biometrics is a method of *direct* human identification. Biometric access control systems, providing strong security at entrances.  Biometrics help to no need to remember passwords, or PINs. Biometrics cannot be lost, stolen or forgotten Automated identification can be done very rapidly and uniformly, with a minimum of training. Discourages fraud Enhances security Why Use Biometrics?

Applications of Biometrics Technology :

Applications of Biometrics Technology

Fingerprint Identification:

Fingerprint Identification Fingerprint recognition is a method of biometric authentication that uses pattern-recognition techniques based on images of human finger vein patterns beneath the skin's surface. Finger vein recognition is one of many forms of biometrics used to identify individuals and verify their identity.

Fingerprint Recognition Process:

Fingerprint Recognition Process

Fingerprint Technology Uses:

Fingerprint Technology Uses Door Locks Access Control Computer work stations Time Clocks In room safes Payment Systems

Hand Geometry:

Hand Geometry Person identification using hand geometry utilizes hand images to extract a number of features such as finger length, width, thickness, finger area etc. Scan hand surface area-to verify that the person using the device is really who he or she claims to be.

WorkOf Hand Geometry System:

WorkOf Hand Geometry System The user places the palm of his hand on a metal surface which has guidance pegs on it. the device can reads the hand attributes. The device then checks its database for verification of the user. The process usually takes less than 5 seconds.

Facial Recognition:

Facial Recognition Facial recognition systems Face Recognition is physiological characteristics of human that identify by predefine computer programs and analyze human faces for the purpose of identifying them. These include the position/size/shape of the eyes, nose, cheekbones and jaw line.

Facial Recognition Process:

Facial Recognition Process Facial recognition systems

Voice Recognition:

Voice Recognition Voice recognition system It uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes. A telephone or microphone can act as a sensor. Speaker recognition is often used where voice is the only available biometric identifier, such as telephone.

Biometrics Iris Recognition :

Biometrics Iris Recognition There are two different types of eye scans: retinal and iris, It measures the iris pattern of the eye i.e. the colored part of the eye that surrounds the pupil. The iris scanner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.

Signature verification:

Signature verification Signature recognition is a behavioral biometric. Signature to identify note the angle at which the pen is held, and count number of times the pen is lifted and how much time it takes to write the entire signature Actual signature recognition is carried out by writing on a pressure sensitive pad with a pen or stylus.

Advantage of Biometrics:

Advantage of Biometrics Biometric identification can provide extremely accurate, secured access to information; fingerprints, retinal and iris scans produce absolutely unique data sets when done properly Current methods like password verification have many problems (people write them down, they forget them, they make up easy-to- hack passwords) Automated biometric identification can be done very rapidly and uniformly, with a minimum of training.

Disadvantage of Biometrics:

Disadvantage of Biometrics The finger print of those people working in Chemical industries is often affected. Therefore these companies should not use the finger print mode of authentication. Biometrics is an expensive security solution. For people affected with diabetes, the eyes get affected resulting in differences. It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time

Conclusion:

Conclusion Biometric Solution read Biological factor and digitally identify human nature. Biometric Technology is very inexpensive and easy to use for many application area. Criminal identification Prison security ATM Aviation security Border crossing controls Database access Home/Office

Slide 21:

AshtopusTechnologies

authorStream Live Help