Download presentation
1
Biometric Technologies
Presented By: Unique Star Student Id: S
2
Overview Definition of biometrics
Purpose of biometrics and what it provides over conventional security Introduction of subgroups of biometrics Current use of biometrics Conclusion and thoughts on future developments
3
Definition of Biometrics
Biometrics are automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Biometric scanning is used for two major purposes: identification and authentication. Identification: “Do I know who you are?” One to Many Authentication: “Are you who you claim to be?” One to One Biometric scans are more accurate, make it difficult to masquerade, and generally require less of the user than standard security measures such as password protection. Biometric technology falls roughly into eight categories: finger, hand, iris, retina, face, Signature Recognition , Keystroke Recognition, and voice recognition.
4
Types of Biometrics Physiological Biometrics Fingerprint Recognition
Hand Geometry Recognition Iris Recognition Retinal Scanning Facial Recognition Behavioral Biometrics. Voice Recognition Signature Recognition Keystroke Recognition
5
Fingerprint Scan The most widely-used biometric technology.
Measures the unique, complex swirls on a person's fingertip. The swirls are characterized and produced as a template requiring from 250-1,000 bytes
6
Hand Scan Hand scan, also known as hand geometry, is a biometric authentication technology. The system maps key features of the topography of a person's hand, measuring all the creases on the palm. This is more expensive and considered less accurate than other biometrics. Strength: requires only ~9 bytes to store template.
7
Iris Scan The technology examines the unique patterns of the iris, the ring around the pupil. Very complex. Iris scans are non-invasive. The person puts their face in front of a camera which then analyzes all the features. Even works with corrective lenses. Highest accuracy of all the biometric technologies.
8
Retinal Scan The Retinal scans examine the blood vessel patterns of the retina, the nerve tissue lining the inside of the eye that is sensitive to light. An infrared light source is used to illuminate the retina of the eye. The image of the enhanced blood vessel pattern of the retina is analyzed for characteristic points. It is also among the most difficult to use, and is perceived as being moderately to highly intrusive
9
Facial Scan One method is called feature analysis which tracks about 80 facial characteristics. A facial template requires ~1,300 bytes. Essentially, the technology measures the peaks and valleys of the face. more suitable for wide range. Expensive
10
Voice Scan Voice is a behavioral biometrics.
Voice verification is used with passwords and PIN numbers. Voice dynamics relies on the production of a "voice template" that is used to compare with a spoken phrase. A speaker must repeat a set phrase several times as the system builds the template.
11
Others Signature scan - analysis of characteristics in an individuals signature. May soon help address the very large demand for document authentication. Keystroke scan - analysis of an individual’s typing pattern. Can be used along with passwords for a very secure system. Body odor, skin pores, wrist/hand veins, DNA, Shape of ear, Gait, etc…
12
Use of Biometrics Network security - Authentication, ATM, Internet banking. Non-Network based security - Home use, content control. Sensitive environments, e.g. government buildings, prisons Schools - Library cards, Computer access, Enrollment. Businesses - Time and attendance. Law Enforcement - Casino Operations, Super Bowl. Etc…., The uses are endless.
13
Conclusion Imagine a secure world without passwords.
14
THANK YOU
15
QUERIES QUESTION ???
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.