0% found this document useful (0 votes)
75 views37 pages

Biometric Technology

This document discusses biometric technology, providing definitions and comparing it to traditional security methods. It outlines key terms, common uses of biometrics in commercial, medical, government and banking applications. The advantages of biometrics are increased security, accuracy and ease-of-use over traditional passwords or pins, which can be forgotten, shared or observed. However, biometric data can potentially be duplicated or damaged. The document also examines different types of biometric technologies and how they work.

Uploaded by

Bonginkosi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views37 pages

Biometric Technology

This document discusses biometric technology, providing definitions and comparing it to traditional security methods. It outlines key terms, common uses of biometrics in commercial, medical, government and banking applications. The advantages of biometrics are increased security, accuracy and ease-of-use over traditional passwords or pins, which can be forgotten, shared or observed. However, biometric data can potentially be duplicated or damaged. The document also examines different types of biometric technologies and how they work.

Uploaded by

Bonginkosi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

Biometric Technology

Computer Security
Bi
Table of Content – 8 Items

om
Computer Security

et
ri c
Te
ch
1 Definition and Key Terms

2 Discussing the Uses of Biometric Tech


3 Comparing Biometric with Traditional
4 General Advantages and Disadvantages
5 Discussing Types of Biometric Tech
6 How it Works and Equipment Needed
7 Applications of Biometric Tech
SlideModel.com 8 Prons and Cons of Each Biometric Application 2
Bi
Computer Security

om
et
ri c
Defination of Biometrics

Te
ch
Biometric is an
03 Emerging area with
many Opportunities for
Growth
The Term Biometric Comes
From The Greek Words
Bios(Life) and
Metrikos(Measure)
01 02
Biometrics Refers To The
Automatic Identification of a
Person Based on His or her
Physiological or Behavioral
Characteristics.

3
Bi
Computer Security

om
et
ri c
Terms Of Biometric

Te
ch
Verification
03
Lorem ipsum dolor sit amet, consectetur
adipiscing elit, sed do eiusmod tempor. Donec
facilisis lacus eget mauris.

Recognition
.

01 02
Identification
Lorem ipsum dolor sit amet, consectetur
adipiscing elit, sed do eiusmod tempor. Donec
facilisis lacus eget mauris.

4
Bi
Uses Of Biometrics Computer Security

om
et
ri c
Te
ch
Co
m
m
er
cia
al
c

l
di
Me

Government

Banking

These are the most


important things in our
every day life
5
Bi
Computer Security

om
Comparing Biometric with Traditional Security

et
ri c
Te
ch
Tradition Security Biometric

Somethings you know and have Something you are

e.g passwords, pin, id card e.g fingerprint, voice, eye iris

Can be lost or stolen Cannot be easily lost


Can be guessed Cannot be guessed

Can be forgotten Cannot be forgotten


Consume a lot of size to Reduced size in storing
store

6
Bi
Computer Security

om
Comparing Biometric with Traditional Security

et
ri c
Te
ch
Passwords Biometric

Can be duplicated Can be duplicated

Can be broken Can be broken or damaged

Pin can be duplicated Some can be duplicated

7
Bi
Computer Security

om
Comparing Biometric with Traditional Security

et
ri c
Te
ch
Passwords Biometric

Can be duplicated Identification(Determining if


someone is known to the
system)
Can be shared Authentication(Verifying the
identity of that person)

Pin can be duplicated Some can be duplicated

8
Bi
Computer Security

om
et
ri c
Te
General Advantages Of Biometric

ch
⬢ Increase Security
⬢ Make it possible, automatically to know who did what, where and when.
⬢ Replace hard-to-remember passwords which may be shared or observed.
⬢ Increased accuracy
⬢ Increased ease-of-use
⬢ Increased accountability
⬢ Fraud detection
⬢ Flexible
⬢ Quicker Authentication

9
Bi
Computer Security

om
et
ri c
General Disadvantages Of Biometric

Te
ch
Technology
⬢ Physical Disabilities
⬢ Expensive on the pocket
⬢ Physical traits can’t be altered
⬢ Scanner issues
⬢ Software malfunction
⬢ No remote access
⬢ Fake positives
⬢ Costs
⬢ Limit privacy for users

10
Bi
Computer Security

om
et
ri c
Te
Basically two types of Biometric Tech

ch
Physiological Behavioral
⬢ A specific physical pattern ⬢ Specific patterns that are related
on a person’s body. to an individual’s actions .
⬢ Physiological biometric ⬢ Behavioural biometric indicators
data is analyzed with are increasingly being used in
things like fingerprint digital applications and online to
readers items that are follow and determine who a
fairly common placed on person is based on a set of
mobile devices like smart patterns created by how they
phone behave 11
Bi
How Biometric Works Computer Security

om
et
ri c
Te
ch
Bi
Biometric Working System Computer Security

om
et
ri c
Te
ch
13
Bi
mo
Computer Security

et
Physical Biometric

ric
Te
ch
Fingerprint recognition

Bi
mo
Computer Security

et
ric
Te
ch
Fingerprint recognition is the identification by using
patterns of an individual’s fingertips which are unique to
Bi
mo
Computer Security

et
How It works

ric
Te
ch
▪ Biometric recognition systems capture and digitize salient features from
the fingerprint such as the arrangement of minutiae and the flow and
orientation of the ridges to create a biometric template.
▪ These templates are then stored in a dataset that allows the system to
select fingerprints to perform either individual comparisons or searches
through the appropriate database(s) depending on the use case.
▪ Fingerprints can be recorded using paper and ink but most current
biometric applications use either a scanner, where the finger is placed on
or rolled across a platen, or a contactless method that captures the
required detail at a proximal distance. 16
Bi
Fingerprint

mo
Computer Security

et
ric
Te
ch
Equipment Application
• Securing mobile phone
• Identification

Advantages Disadvantages
• It offers high accuracy for fingerprint
recognition. • The system is associated with
• It offers long term stability. forensic applications.
• It is easy to use/non-intrusive technique.
• Can't misplace fingerprints like one can • The accuracy and working of
misplace physical access cards. system is affected by skin
• Difficult to guess fingerprint pattern
than guessing password. conditions of people.

SlideModel.com 17
Bi
Computer Security

om
et
ri c
Facial

Te
ch
Recognition
Bi
SWOT Analysis

om
Computer Security

et
ri c
Te
ch
Strengths Weaknesses

S • Edit text here


• Edit text here

SWOT
• Edit text here
• Edit text here
W
Analysis

O T
Opportunities Threats

• Edit text here • Edit text here


• Edit text here • Edit text here

SlideModel.com 19
Bi
Computer Security

om
et
ri c
Hand Geometry

Te
ch
Add a main point Add a main point
Hand or finger geometry is
an automated
measurement of many
Dimensions of
The hand and fingers
Briefly elaborate on Briefly elaborate on
what you want to discuss. what you want to discuss.
How It works

Bi
mo
Computer Security

et
ric
▪ Images are taken while the hand is kept palm down on a support plate and

Te
ch
kept in position by the use of guide pegs.
▪ The length, width, thickness, and surface area of the individual’s hand is
measured and recorded.
▪ Multiple features and measurements are extracted during this process.
Several images of the same hand are often taken in order to produce a
single stored template that has sufficient detail for identification purposes.
▪ These images and the supporting data are then filed in a database and are
used to authenticate the identity of the enrollee in subsequent encounters
when the subject’s hands are imaged again and compared with the
21
reference images to confirm or reject the identity claim.
FR
SWOT Analysis

EE
BU
N
D
LE
Strengths Weaknesses

S • Edit text here


• Edit text here

SWOT
• Edit text here
• Edit text here
W
Analysis

O T
Opportunities Threats

• Edit text here • Edit text here


• Edit text here • Edit text here

SlideModel.com 22
Bi
Computer Security

om
et
ri c
Te
ch
Iris Recognition

Iris scannig measures the iris


pattern in the coloured part of the
eye.

23
How It works

Bi
mo
Computer Security

et
ric
Te
ch
▪ Iris recognition technology uses the unique patterns of the colored tissue that form the
iris. These patterns are captured by a camera operating in near infra-red wavelengths
▪ The first iris cameras had to be close to the eyes (but not in contact with them) in
order to record sufficient detail but technological advances now allow cameras to be
placed several feet away and capture the irises of those on the move such as at an airport
boarding gate.
▪ The system uses pattern-recognition algorithms, in a similar way to automated
fingerprint recognition systems, to perform comparisons in both the biometric one-to-
one (1:1) verification to authenticate a suggested identity and one-to-many (1:N)
identification modes as a probe to search a database to establish if any of the other iris
records provide a potential match. 24
FR
SWOT Analysis

EE
BU
N
D
LE
Strengths Weaknesses

S • Edit text here


• Edit text here

SWOT
• Edit text here
• Edit text here
W
Analysis

O T
Opportunities Threats

• Edit text here • Edit text here


• Edit text here • Edit text here

SlideModel.com 25
Bi
Computer Security

om
et
ri c
Te
ch
RETINA
RECOGNITION

Images back of the eye and


compares blood vessels with
exisiting data

26
FR
SWOT Analysis

EE
BU
N
D
LE
Strengths Weaknesses

S • Edit text here


• Edit text here

SWOT
• Edit text here
• Edit text here
W
Analysis

O T
Opportunities Threats

• Edit text here • Edit text here


• Edit text here • Edit text here

SlideModel.com 27
Bi
Computer Security

om
et
ri c
Te
ch
28
Bi
mo
Computer Security

et
Behavioural biometrics

ric
Te
ch
Bi
o
m
Computer Security

Voice

et
ric
Te
ch
Recognition
Voice recognition uses vocal characteristics to identify
individuals using a pass-phrase.
A telephone or microphone can serve as a sensor
Bi
mo
Computer Security

et
ric
Te
How It works

ch
▪ The voice is collected and analyzed by software that employs
artificial intelligence and machine learning techniques to produce
a vast array of data derived from factors such as modulation of
speech, tones, accent, frequency etc.
▪ These elements enable the system to create a reference template of
the voice (known as a ‘voice print’ or ‘voice model) that can be
used to authenticate the speaker in subsequent transactions
31
FR
SWOT Analysis

EE
BU
N
D
LE
Strengths Weaknesses

S • Edit text here


• Edit text here

SWOT
• Edit text here
• Edit text here
W
Analysis

O T
Opportunities Threats

• Edit text here • Edit text here


• Edit text here • Edit text here

SlideModel.com 32
Bi
om
Computer Security

Signature

et
ric
Te
ch
Verification
An automated method of measuring an
Individual’s signature.
FR
SWOT Analysis

EE
BU
N
D
LE
Strengths Weaknesses

S • Edit text here


• Edit text here

SWOT
• Edit text here
• Edit text here
W
Analysis

O T
Opportunities Threats

• Edit text here • Edit text here


• Edit text here • Edit text here

SlideModel.com 34
Bi
om
Computer Security

Keystroke

et
ric
Te
ch
Dynamics
An automated method of examining an
Individual’s keystrokes on a keyboard
FR
SWOT Analysis

EE
BU
N
D
LE
Strengths Weaknesses

S • Edit text here


• Edit text here

SWOT
• Edit text here
• Edit text here
W
Analysis

O T
Opportunities Threats

• Edit text here • Edit text here


• Edit text here • Edit text here

SlideModel.com 36
Bi
mo
Computer Security

et
ric
APPLICATIONS

Te
ch
ATMS Prevent unauthorized access to ATMS

Crime solving Criminal Identification

In automobiles biometric can replace keys with keyless


Automobiles
entry devices

Airports Airport Security

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy