biometric presentation

Post on 24-Jun-2015

119 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Biometric is a new technique that provides security,n help for identification purpose

TRANSCRIPT

BIOMETRICS

PRESENTED BY Priyanka Srivastava

INTRODUCTION

“A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.”

AUTOMATED IDENTIFICATION BASED ON Physiological or behavioral characteristics

Physiological examplesFingerprintsFaceEyesDNA

Behavioral examples 1-Voice 2-Keystroke

BIOMETRIC AS AUTHENTICATION

Authentication Depends On

What you have What you know What you ARE !

PHYSIOLOGICAL EXAMPLES

Fingerprints Face Eyes DNA

FINGERPRINT IDENTIFICATION

Matching the characteristics of a fingerprint on file to the one presented to the system.

Reliability depends on how many “points” you match.

FINGERPRINT TECHNOLOGY USES

Door LocksAccess ControlIn room safesPayment Systems

FACE WORKS AS A template is generated which is based on nodal

points and compared against templates.

It’s software is- FACEIT® which can take someone’s face out of a crowd.

FACIAL RECOGNITION Facial recognition

systems are built on computer programs that analyze images of human faces for the purpose of identifying them. The programs take a facial image.

• Iris – examines the unique patterns of ridges on colored portion of the eye

EYES WORKS ACCORDING TO Retinal – measures the pattern of

blood vessels

DNA WOKS AS-Length and protein sequence are

analyized to generate a DNA profile and compared against other profiles where it is used.

BEHAVIORAL EXAMPLES

1-Voice 2-Keystroke

HOW VOICE RECOGNITION WORKS

compares a pre-recorded voice message with the current user.

Can be a data-base system or a stand alone device

IT’S APPLICATION

In Banks

In Financial Firms

KEY STROKE

It works as

The user types his password or phrase on keyboard.

System then records the timing of the typing and compares the password itself .

APPLICATION OF KEY STROKE

In Recording Company

Technology for firms digital right management Company

ADVANTAGES Reduces cost within organizations Increases security Competitive advantage Convenience to employees Non-repudiation Eliminates a paper trail

DISADVANTAGES Accuracy of Performance Failure to enroll rate Information Abuse May violate privacy

CONCLUSION

Biometrics is a technology that can simplify the process of authentication

Biometrics can be best used in situations where specific identity or exception identity is desired

top related