0% found this document useful (0 votes)
36 views20 pages

Biometrics Technology

Biometrics uses biological and behavioral characteristics to identify individuals. The three main types of authentication are something you know, something you have, and something you are. Biometrics falls under something you are and uses traits like fingerprints, facial features, iris patterns, and hand veins. These traits are unique to each individual. Biometrics provides improved security over traditional authentication methods by being difficult to steal, borrow, or forget.

Uploaded by

AhmedEl-Menshawi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views20 pages

Biometrics Technology

Biometrics uses biological and behavioral characteristics to identify individuals. The three main types of authentication are something you know, something you have, and something you are. Biometrics falls under something you are and uses traits like fingerprints, facial features, iris patterns, and hand veins. These traits are unique to each individual. Biometrics provides improved security over traditional authentication methods by being difficult to steal, borrow, or forget.

Uploaded by

AhmedEl-Menshawi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Biometrics Technology

three main types of authentication


available today are:

• something you know, like a password, PIN,


or code.

• something you have, like a swipe card, smart


card, token, or key.

• something you are, which is biometrics.


What is a biometric?

Biometrics
• Is the term given to the use of

biological traits
OR
behavioral characteristics

to identify an individual.
Characteristics

The common Physical characteristics are:


 Fingerprint
 Face
 Retina
 Iris
 Vein pattern, and
 Hand and finger geometry
Characteristics

Behavioral characteristics are:

 Keystroke dynamics
 Voice
 Gait, and
 Signature dynamics
The Biometric importance

 The security is needed in every place.

 Alleviate the existing problems, Like


those which can be taken, stolen,
borrowed or even forgotten.
The Biometric importance (Cont.)

 Improves convenience, security, and privacy.

 The first and most critical link in the security


chain.

 presented to counteract security threats.


Biometrics History

 Theterm "biometrics" is derived from the Greek words


bio which means
(life)

and metric means


(to measure).
Biometrics History (Cont.)
 the first known example of biometrics in practice was a
form of finger printing being used in China in the 14th
century.
Biometrics History (Cont.)
 In the 1890s, 'Bertillonage', created a method of bodily
measurement with the criminals who repeated the
crimes with different names and looks.
Biometrics History (Cont.)
 After this, finger printing, which was developed
by Richard Edward Henry of Scotland Yard.
Biometrics Process

new biometric sample is requested.


No

Signal Processing, Quality


Biometric Transmission Feature Extraction, Sufficient?
Data Collection Representation

Yes

Generate Template

Database Template Match

Yes Decision
Confidence?
No
Physical Characteristics
Fingerprint Recognition:
 Fingerprint Recognition is the identification by
using patterns of friction ridges and valleys on
an individual's fingertips which are unique to
that individual.
Fingerprint Recognition steps:

Database
Face Recognition:
 Face recognition uses the visible physical
structure of the face and analyses the spatial
geometry of distinguishing features in it to
identify an individual.
Face recognition process:

Input face Extraction of


Extraction of face features
image face image

Positive

Database
negative
Iris Identification:
 The iris is the colored ring of textured tissue
that surrounds the pupil of the eye.
Iris Identification Steps:

Input of face Recognition of


Detection of
image Put iris in focus iris pattern
eye regions

accept

Database
reject
Veins Recognition:
 Venial Recognition: A system for Identification using
a person’s unique vein patterns.
Veins as a biometrics tool involve the measurement
of the blood vessels on the back of your hand.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy