尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
www.oeclib.in
Submitted By:
Odisha Electronics Control Library
Seminar
On
Biometric Security Systems
Content
 Introduction
 Overview
 Classification of BIOMETRICS
 Odor and Scent cognitive systems
 Facial cognitive systems
 Performance cognitive systems
 Handwriting recognition
 Factors for determining characteristics
 Functions of biometric systems
 The Future
 Reference
•Biometrics = bios + metron. Bios means life and metron
means measure.
•Recognizing humans based on physical and behavioral
traits.
•Also called BEHAVIOMETRICS.
Biometrics are used to identify the input sample when compared to a
template, used in cases to identify specific people by certain characteristics.
1)possession-based
using one specific "token" such as a security tag or a card
2)knowledge-based
the use of a code or password.
Layered systems combine a biometric method with a keycard or PIN.
Multimodal systems combine multiple biometric methods, like an iris
scanner and a voiceprint system.
Physiological are related to the
shape of the body.
Behavioral are related to the
behavior of a person.
Cognitive biometrics is based
upon brain responses to stimuli. Classification of some biometric traits
• The use of blood hounds and other scent following dogs to
identify individual people or their scent trails in the
environment on the basis of a previous offered reference scent
article such as handkerchief, hat, and other items of clothing.
• Canine scent identification evidence is usually accepted in
court to suggest the unique identification of an accused
individual in the same way that finger prints are used.
• It is based on "individual odor theory," which hold that each
person has a unique scent that can be identified by the dog and
related back to a specific individual.
• Conventional biometric methods introduced to improve security
are mainly based on cross matching the face of the person with that
recorded in their identification materials.
• However, it is possible to train persons that could be referred to as
"face-minders", to memorize faces of suspects on a watch-list.
Trainees could acquire skills of cross-matching key features of faces
of persons seen at the ports as compared to that in the forensic facial
database.
Task performance using general intelligence must elicit responses in neural anatomic
structures for processing of the information. Working memory is typically associated
with activations in the prefrontal cortex (PFC), anterior cingulate, parietal and occipital
regions.
These brain areas receive blood supply from the middle cerebral arteries. Two
fundamental working-memory processes have been identified:
1)The passive maintenance of information in short-term memory
2)The active manipulation of this information
A pattern of blood flow velocity changes is obtained in response to a set intelligence
task, which is used to form a 'mental signature' that could be repeatedly recognized, in
an automated man-machine interface system.The device could be used as a 'lie detector'
based on the fact that, it could distinguish Wrong ANSWER from Correct ANSWER.
• Systems that measure hand and finger geometry use a
digital camera and light. To use one, we simply place
your hand on a flat surface, aligning your fingers against
several pegs to ensure an accurate reading.
• Then, a camera takes one or more pictures of your
hand and the shadow it casts. It uses this information to
determine the length, width, thickness and curvature of
your hand or fingers. It translates that information into a
numerical template.
• Fingers are less distinctive than fingerprints or irises
and people’s hands change over time due to many
reasons.
A hand geometry scanner
This Tablet PC has a signature verification system.
• Biometric systems don't just look at how
you shape each letter. They analyze the act
of writing. They examine the pressure you
use and the speed and rhythm with which
you write. They also record the sequence in
which you form letters.
•A handwriting recognition system's sensors
can include a touch-sensitive writing surface
or a pen that contains sensors that detect
angle, pressure and direction.
• Voice is unique for an individual because of
the shape of his/her vocal cavities and the way
they move their mouth when they speak.
• Voiceprint is a sound spectrogram, not a
wave form.
• Some companies use voiceprint recognition
so that people can gain access to information
or give authorization without being physically
present.
Speaker recognition systems use spectrograms
to represent human voices.
• It consists of a simple CCD digital camera. It
uses both visible and near-infrared light to
take a clear, high-contrast picture of a person's
iris.
• Usually, our eye is 3 to 10 inches from the
camera. When the camera takes a picture, the
computer locates:
i. The center of the pupil
ii. The edge of the pupil
iii. The edge of the iris
iv. The eyelids and eyelashes
It then analyzes the patterns in the iris and
translates them into a code.
Eye anatomy
•To use a vein recognition system, you simply
place your finger, wrist, palm or the back of
your hand on or near the scanner. A camera
takes a digital picture using near-infrared light.
•The hemoglobin in your blood absorbs the
light, so veins appear black in the picture. As
with all the other biometric types, the software
creates a reference template based on the shape
and location of the vein structure.
• Vein scans for medical purposes usually use
radioactive particles. Biometric security scans,
however, just use light that is similar to the light
that comes from a remote control Vein scanners use near-infrared light
to reveal the patterns in a person’s veins.
Universality
each person should have the characteristic
Uniqueness
is how well the biometric separates individually from
another.
Permanence
measures how well a biometric resists aging.
Collectability
ease of acquisition for measurement.
Performance
accuracy, speed, and robustness of technology used.
Acceptability
degree of approval of a technology.
Circumvention
ease of use of a substitute.
The basic block diagram of a biometric system
The main operations a system can
perform are enrollment and test.
• Enrollment
During the enrollment,
biometric information from an
individual is stored.
• Test
During the test, biometric
information is detected and
compared with the stored
information
It is the interface b/w real world and
system. Collects necessary data
based on the characteristic.
It removes artifacts from the data
obtained from sensor to enhance the
input.
It extracts the necessary features. Correct features are to
be extracted and in the optimal way.
A vector of numbers or an image is used to create a
template. A template is the synthesis of all
characteristics extracted.
Compares the obtained template with
other existing templates, estimating the
distance between using any algorithm.
 Verification
Authenticates its users in conjunction with a smart card, username or
ID number. The biometric template captured is compared with that stored
against the registered user either on a smart card or database for verification.
 Identification
Authenticates its users from the biometric characteristic alone
without the use of smart cards, usernames or ID numbers. The biometric
template is compared to all records within the database and a closest match
score is returned. The closest match within the allowed threshold is deemed
the individual and authenticated.
• False accept rate/False match rate(FAR/FMR)
The probability that the system incorrectly declares a successful match
between the input pattern and a non-matching pattern in the database. It measures the
percent of invalid matches.
• False reject rate/False non-match rate(FRR/FNMR)
The probability that the system incorrectly declares failure of match between
the input pattern and the matching template in the database. It measures the percent of
valid inputs being rejected.
• Receiver operating characteristic/relative operating characteristic
The ROC plot is obtained by graphing the values of FAR and FRR, changing
the variables implicitly. A common variation is the Detection error trade-off (DET),
which is obtained using normal deviate scales on both axes.
• Equal error rate/Crossover error rate(EER/CER)
When quick comparison of two systems is required, the ERR is commonly
used. Obtained from the ROC plot by taking the point where FAR and FRR have the
same value.
• Failure to enroll rate(FTE/FER)
Failure to enroll happens when the data obtained by the sensor are
considered invalid or of poor quality.
• Failure to capture rate(FTC)
the probability that the system fails to detect a biometric characteristic when
presented correctly.
• Template capacity
The maximum number of sets of data which can be input into the system..
• Privacy
A concern is how a person’s biometric, once collected, can be protected. Another
concern is that if the system is used at more than one location, a person's
movements may be tracked as with any non-anonymous authentication system.
• Biometrics Sensors’ obstacles
It is very difficult to create standard on identical encryption paths. Biometrics
standard can be obtained only if the common information is unconcealed.
• Marketing
Despite confirmed cases of defeating commercially available biometric
scanners, many companies marketing biometric products claim the products as
replacements, rather than supplements, for passwords. Consumers and other end
users must rely on published test data and other research that demonstrate which
products meet certain performance standards and which are likely to work best
under operational conditions.
• Sociological concerns
Physical
Some believe this technology can cause physical harm to an
individual using the methods, or that instruments used are
unsanitary. For example, there are concerns that retina
scanners might not always be clean.
Personal Information
There are concerns whether our personal information taken
through biometric methods can be misused.
•Danger to owners of secured items
If the item is secured with a biometric device, the damage to the owner
could be irreversible, and potentially cost more than the secured property.
• Interoperability
• Over reliance: The perception that biometric systems are foolproof might
lead people to forget about daily, common-sense security practices and to
protect the system's data.
• Accessibility: Some systems cant be adapted for certain populations, like
elderly people or people with disabilities.
Interoperability: In emergency situations, agencies using different systems may
need to share data, and delays can result if the systems can't communicate with
each other.
If biometric data is obtained, for example compromised from a database, by
unauthorized users, the genuine owner will lose control over them forever and lose
his/her identity.
one ordinary advantage of password does not exist in biometrics. That is re-issue. If a
token or a password is lost or stolen, they can be cancelled and replaced by a newer
version i.e. reissued. On the other hand, this is not naturally available in biometrics.
Cancelable biometrics is a way in which to inherit the protection and the replacement
features into biometrics.
Several methods for generating cancellable biometrics have been proposed.
Essentially, cancelable biometrics perform a distortion of the biometric image
or features before matching. The variability in the distortion parameters
provides the cancelable nature of the scheme.
• Australia
• Brazil
• Germany
• Iraq
• Israel
• Japan
• United States
•Some hospitals use biometric systems to make sure mothers
take home the right newborns
•New methods that use DNA, nail bed structure, teeth, ear
shapes, body odor, skin patterns and blood pulses
•More accurate home-use systems
•Opt-in club memberships, frequent buyer programs and rapid
checkout systems with biometric security
Reference
 www.google.com
 www.wikipedia.com
 www.oeclib.in
THANK YOU
QUERIES

More Related Content

What's hot

Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
Star Link Communication Pvt Ltd
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
Navin Kumar
 
biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
ANEESH SASIDHARAN
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
Usman Sheikh
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
sunjaysahu
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
Shreyans Jain
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
Vivek Kumar
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
Jignesh Prajapati
 

What's hot (20)

Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 

Similar to Biometric Security Systems ppt

CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
Lol36
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
Vignesh Ravichandran
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
AashishTanania
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition report
lavanya693
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics
BiometricsBiometrics
Biometrics
Shivani Gautam
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
RutikBhoyar
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
Shalika Dissanayaka
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
Biometrics
BiometricsBiometrics
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
Manoj Kumar
 
Biometrics
BiometricsBiometrics
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
Sn Moddho
 
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCAREBIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
International Journal of Technical Research & Application
 
Biometrics
BiometricsBiometrics
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
YUSRA FERNANDO
 

Similar to Biometric Security Systems ppt (20)

CSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptxCSE Biometric Security Systems ppt.pptx
CSE Biometric Security Systems ppt.pptx
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Biometrics for e-voting
Biometrics for e-votingBiometrics for e-voting
Biometrics for e-voting
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition report
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCAREBIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 

More from OECLIB Odisha Electronics Control Library

5G technology-ppt
5G technology-ppt5G technology-ppt
Futex ppt
Futex  pptFutex  ppt
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
OECLIB Odisha Electronics Control Library
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
OECLIB Odisha Electronics Control Library
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
OECLIB Odisha Electronics Control Library
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
Steganography ppt
Steganography pptSteganography ppt
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
OECLIB Odisha Electronics Control Library
 
Soa ppt
Soa pptSoa ppt
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
OECLIB Odisha Electronics Control Library
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
OECLIB Odisha Electronics Control Library
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
Wimax ppt
Wimax pptWimax ppt
Wibree ppt
Wibree pptWibree ppt
Wearable Computing
Wearable ComputingWearable Computing
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Recently uploaded

Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full NightVip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
JoyaBansal
 
🔥18+ Young Call Girls Lucknow 💯Call Us 🔝 8630512678 🔝💃Independent Lucknow Esc...
🔥18+ Young Call Girls Lucknow 💯Call Us 🔝 8630512678 🔝💃Independent Lucknow Esc...🔥18+ Young Call Girls Lucknow 💯Call Us 🔝 8630512678 🔝💃Independent Lucknow Esc...
🔥18+ Young Call Girls Lucknow 💯Call Us 🔝 8630512678 🔝💃Independent Lucknow Esc...
AK47
 
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
dhyaansingh0898#S07
 
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
ss728938
 
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
simrangupta87541
 
exammeessccglpyq2023exammeessccglpyq2023
exammeessccglpyq2023exammeessccglpyq2023exammeessccglpyq2023exammeessccglpyq2023
exammeessccglpyq2023exammeessccglpyq2023
SubhamMandal40
 
Erotic Call Girls Kolkata🫱9079923931🫲 High Quality Call Girl Service Right at...
Erotic Call Girls Kolkata🫱9079923931🫲 High Quality Call Girl Service Right at...Erotic Call Girls Kolkata🫱9079923931🫲 High Quality Call Girl Service Right at...
Erotic Call Girls Kolkata🫱9079923931🫲 High Quality Call Girl Service Right at...
$A19
 
Call Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
Call Girl Low Price Noida 9873777170 Cash Payment Free Home DeliveryCall Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
Call Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
hanshkumar9870
 
Fundamental physics and paper summary for p-contact on GaN
Fundamental physics and paper summary for p-contact on GaNFundamental physics and paper summary for p-contact on GaN
Fundamental physics and paper summary for p-contact on GaN
Brian Kim, PhD
 
🔥Mature Women / Aunty Call Girl Pune 💯Call Us 🔝 8094342248 🔝💃Top Class Call G...
🔥Mature Women / Aunty Call Girl Pune 💯Call Us 🔝 8094342248 🔝💃Top Class Call G...🔥Mature Women / Aunty Call Girl Pune 💯Call Us 🔝 8094342248 🔝💃Top Class Call G...
🔥Mature Women / Aunty Call Girl Pune 💯Call Us 🔝 8094342248 🔝💃Top Class Call G...
gajnagarg
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
sapna sharmap11
 
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
gujratescort#p11
 
❣Foreigners Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Surat Escort...
❣Foreigners Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Surat Escort...❣Foreigners Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Surat Escort...
❣Foreigners Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Surat Escort...
mahi02356
 
Premium Call Girls Gurgaon {9999965857} VVIP BHAWNA Call Girls in Gurgaon
Premium Call Girls Gurgaon {9999965857} VVIP BHAWNA Call Girls in GurgaonPremium Call Girls Gurgaon {9999965857} VVIP BHAWNA Call Girls in Gurgaon
Premium Call Girls Gurgaon {9999965857} VVIP BHAWNA Call Girls in Gurgaon
gurkirankumar98700
 
Low price call girls service Ghaziabad 📞 9711199171 👙 available 100% safe and...
Low price call girls service Ghaziabad 📞 9711199171 👙 available 100% safe and...Low price call girls service Ghaziabad 📞 9711199171 👙 available 100% safe and...
Low price call girls service Ghaziabad 📞 9711199171 👙 available 100% safe and...
rv4726893
 
💋High Class Call Girls Noida 💯Call Us 🔝 9899900591 🔝💃Independent Noida Escort...
💋High Class Call Girls Noida 💯Call Us 🔝 9899900591 🔝💃Independent Noida Escort...💋High Class Call Girls Noida 💯Call Us 🔝 9899900591 🔝💃Independent Noida Escort...
💋High Class Call Girls Noida 💯Call Us 🔝 9899900591 🔝💃Independent Noida Escort...
SAKSHI$L14
 
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your DoorstepNight Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Ak47
 
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
sonamrawat5631
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
sapna sharmap11
 
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
fyguxu
 

Recently uploaded (20)

Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full NightVip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
 
🔥18+ Young Call Girls Lucknow 💯Call Us 🔝 8630512678 🔝💃Independent Lucknow Esc...
🔥18+ Young Call Girls Lucknow 💯Call Us 🔝 8630512678 🔝💃Independent Lucknow Esc...🔥18+ Young Call Girls Lucknow 💯Call Us 🔝 8630512678 🔝💃Independent Lucknow Esc...
🔥18+ Young Call Girls Lucknow 💯Call Us 🔝 8630512678 🔝💃Independent Lucknow Esc...
 
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
 
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
 
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
 
exammeessccglpyq2023exammeessccglpyq2023
exammeessccglpyq2023exammeessccglpyq2023exammeessccglpyq2023exammeessccglpyq2023
exammeessccglpyq2023exammeessccglpyq2023
 
Erotic Call Girls Kolkata🫱9079923931🫲 High Quality Call Girl Service Right at...
Erotic Call Girls Kolkata🫱9079923931🫲 High Quality Call Girl Service Right at...Erotic Call Girls Kolkata🫱9079923931🫲 High Quality Call Girl Service Right at...
Erotic Call Girls Kolkata🫱9079923931🫲 High Quality Call Girl Service Right at...
 
Call Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
Call Girl Low Price Noida 9873777170 Cash Payment Free Home DeliveryCall Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
Call Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
 
Fundamental physics and paper summary for p-contact on GaN
Fundamental physics and paper summary for p-contact on GaNFundamental physics and paper summary for p-contact on GaN
Fundamental physics and paper summary for p-contact on GaN
 
🔥Mature Women / Aunty Call Girl Pune 💯Call Us 🔝 8094342248 🔝💃Top Class Call G...
🔥Mature Women / Aunty Call Girl Pune 💯Call Us 🔝 8094342248 🔝💃Top Class Call G...🔥Mature Women / Aunty Call Girl Pune 💯Call Us 🔝 8094342248 🔝💃Top Class Call G...
🔥Mature Women / Aunty Call Girl Pune 💯Call Us 🔝 8094342248 🔝💃Top Class Call G...
 
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call GirlCall Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
Call Girls Goa (india) ☎️ +91-7426014248 Goa Call Girl
 
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
 
❣Foreigners Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Surat Escort...
❣Foreigners Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Surat Escort...❣Foreigners Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Surat Escort...
❣Foreigners Call Girls Surat 💯Call Us 🔝 7014168258 🔝💃Independent Surat Escort...
 
Premium Call Girls Gurgaon {9999965857} VVIP BHAWNA Call Girls in Gurgaon
Premium Call Girls Gurgaon {9999965857} VVIP BHAWNA Call Girls in GurgaonPremium Call Girls Gurgaon {9999965857} VVIP BHAWNA Call Girls in Gurgaon
Premium Call Girls Gurgaon {9999965857} VVIP BHAWNA Call Girls in Gurgaon
 
Low price call girls service Ghaziabad 📞 9711199171 👙 available 100% safe and...
Low price call girls service Ghaziabad 📞 9711199171 👙 available 100% safe and...Low price call girls service Ghaziabad 📞 9711199171 👙 available 100% safe and...
Low price call girls service Ghaziabad 📞 9711199171 👙 available 100% safe and...
 
💋High Class Call Girls Noida 💯Call Us 🔝 9899900591 🔝💃Independent Noida Escort...
💋High Class Call Girls Noida 💯Call Us 🔝 9899900591 🔝💃Independent Noida Escort...💋High Class Call Girls Noida 💯Call Us 🔝 9899900591 🔝💃Independent Noida Escort...
💋High Class Call Girls Noida 💯Call Us 🔝 9899900591 🔝💃Independent Noida Escort...
 
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your DoorstepNight Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
 
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
 
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
一比一原版(aiti毕业证书)澳洲悉尼翻译学院毕业证如何办理
 

Biometric Security Systems ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronics Control Library Seminar On Biometric Security Systems
  • 2. Content  Introduction  Overview  Classification of BIOMETRICS  Odor and Scent cognitive systems  Facial cognitive systems  Performance cognitive systems  Handwriting recognition  Factors for determining characteristics  Functions of biometric systems  The Future  Reference
  • 3. •Biometrics = bios + metron. Bios means life and metron means measure. •Recognizing humans based on physical and behavioral traits. •Also called BEHAVIOMETRICS.
  • 4. Biometrics are used to identify the input sample when compared to a template, used in cases to identify specific people by certain characteristics. 1)possession-based using one specific "token" such as a security tag or a card 2)knowledge-based the use of a code or password. Layered systems combine a biometric method with a keycard or PIN. Multimodal systems combine multiple biometric methods, like an iris scanner and a voiceprint system.
  • 5. Physiological are related to the shape of the body. Behavioral are related to the behavior of a person. Cognitive biometrics is based upon brain responses to stimuli. Classification of some biometric traits
  • 6. • The use of blood hounds and other scent following dogs to identify individual people or their scent trails in the environment on the basis of a previous offered reference scent article such as handkerchief, hat, and other items of clothing. • Canine scent identification evidence is usually accepted in court to suggest the unique identification of an accused individual in the same way that finger prints are used. • It is based on "individual odor theory," which hold that each person has a unique scent that can be identified by the dog and related back to a specific individual.
  • 7. • Conventional biometric methods introduced to improve security are mainly based on cross matching the face of the person with that recorded in their identification materials. • However, it is possible to train persons that could be referred to as "face-minders", to memorize faces of suspects on a watch-list. Trainees could acquire skills of cross-matching key features of faces of persons seen at the ports as compared to that in the forensic facial database.
  • 8. Task performance using general intelligence must elicit responses in neural anatomic structures for processing of the information. Working memory is typically associated with activations in the prefrontal cortex (PFC), anterior cingulate, parietal and occipital regions. These brain areas receive blood supply from the middle cerebral arteries. Two fundamental working-memory processes have been identified: 1)The passive maintenance of information in short-term memory 2)The active manipulation of this information A pattern of blood flow velocity changes is obtained in response to a set intelligence task, which is used to form a 'mental signature' that could be repeatedly recognized, in an automated man-machine interface system.The device could be used as a 'lie detector' based on the fact that, it could distinguish Wrong ANSWER from Correct ANSWER.
  • 9. • Systems that measure hand and finger geometry use a digital camera and light. To use one, we simply place your hand on a flat surface, aligning your fingers against several pegs to ensure an accurate reading. • Then, a camera takes one or more pictures of your hand and the shadow it casts. It uses this information to determine the length, width, thickness and curvature of your hand or fingers. It translates that information into a numerical template. • Fingers are less distinctive than fingerprints or irises and people’s hands change over time due to many reasons. A hand geometry scanner
  • 10. This Tablet PC has a signature verification system. • Biometric systems don't just look at how you shape each letter. They analyze the act of writing. They examine the pressure you use and the speed and rhythm with which you write. They also record the sequence in which you form letters. •A handwriting recognition system's sensors can include a touch-sensitive writing surface or a pen that contains sensors that detect angle, pressure and direction.
  • 11. • Voice is unique for an individual because of the shape of his/her vocal cavities and the way they move their mouth when they speak. • Voiceprint is a sound spectrogram, not a wave form. • Some companies use voiceprint recognition so that people can gain access to information or give authorization without being physically present. Speaker recognition systems use spectrograms to represent human voices.
  • 12. • It consists of a simple CCD digital camera. It uses both visible and near-infrared light to take a clear, high-contrast picture of a person's iris. • Usually, our eye is 3 to 10 inches from the camera. When the camera takes a picture, the computer locates: i. The center of the pupil ii. The edge of the pupil iii. The edge of the iris iv. The eyelids and eyelashes It then analyzes the patterns in the iris and translates them into a code. Eye anatomy
  • 13. •To use a vein recognition system, you simply place your finger, wrist, palm or the back of your hand on or near the scanner. A camera takes a digital picture using near-infrared light. •The hemoglobin in your blood absorbs the light, so veins appear black in the picture. As with all the other biometric types, the software creates a reference template based on the shape and location of the vein structure. • Vein scans for medical purposes usually use radioactive particles. Biometric security scans, however, just use light that is similar to the light that comes from a remote control Vein scanners use near-infrared light to reveal the patterns in a person’s veins.
  • 14. Universality each person should have the characteristic Uniqueness is how well the biometric separates individually from another. Permanence measures how well a biometric resists aging.
  • 15. Collectability ease of acquisition for measurement. Performance accuracy, speed, and robustness of technology used. Acceptability degree of approval of a technology. Circumvention ease of use of a substitute.
  • 16. The basic block diagram of a biometric system The main operations a system can perform are enrollment and test. • Enrollment During the enrollment, biometric information from an individual is stored. • Test During the test, biometric information is detected and compared with the stored information It is the interface b/w real world and system. Collects necessary data based on the characteristic. It removes artifacts from the data obtained from sensor to enhance the input. It extracts the necessary features. Correct features are to be extracted and in the optimal way. A vector of numbers or an image is used to create a template. A template is the synthesis of all characteristics extracted. Compares the obtained template with other existing templates, estimating the distance between using any algorithm.
  • 17.  Verification Authenticates its users in conjunction with a smart card, username or ID number. The biometric template captured is compared with that stored against the registered user either on a smart card or database for verification.  Identification Authenticates its users from the biometric characteristic alone without the use of smart cards, usernames or ID numbers. The biometric template is compared to all records within the database and a closest match score is returned. The closest match within the allowed threshold is deemed the individual and authenticated.
  • 18. • False accept rate/False match rate(FAR/FMR) The probability that the system incorrectly declares a successful match between the input pattern and a non-matching pattern in the database. It measures the percent of invalid matches. • False reject rate/False non-match rate(FRR/FNMR) The probability that the system incorrectly declares failure of match between the input pattern and the matching template in the database. It measures the percent of valid inputs being rejected. • Receiver operating characteristic/relative operating characteristic The ROC plot is obtained by graphing the values of FAR and FRR, changing the variables implicitly. A common variation is the Detection error trade-off (DET), which is obtained using normal deviate scales on both axes.
  • 19. • Equal error rate/Crossover error rate(EER/CER) When quick comparison of two systems is required, the ERR is commonly used. Obtained from the ROC plot by taking the point where FAR and FRR have the same value. • Failure to enroll rate(FTE/FER) Failure to enroll happens when the data obtained by the sensor are considered invalid or of poor quality. • Failure to capture rate(FTC) the probability that the system fails to detect a biometric characteristic when presented correctly. • Template capacity The maximum number of sets of data which can be input into the system..
  • 20. • Privacy A concern is how a person’s biometric, once collected, can be protected. Another concern is that if the system is used at more than one location, a person's movements may be tracked as with any non-anonymous authentication system. • Biometrics Sensors’ obstacles It is very difficult to create standard on identical encryption paths. Biometrics standard can be obtained only if the common information is unconcealed. • Marketing Despite confirmed cases of defeating commercially available biometric scanners, many companies marketing biometric products claim the products as replacements, rather than supplements, for passwords. Consumers and other end users must rely on published test data and other research that demonstrate which products meet certain performance standards and which are likely to work best under operational conditions.
  • 21. • Sociological concerns Physical Some believe this technology can cause physical harm to an individual using the methods, or that instruments used are unsanitary. For example, there are concerns that retina scanners might not always be clean. Personal Information There are concerns whether our personal information taken through biometric methods can be misused. •Danger to owners of secured items If the item is secured with a biometric device, the damage to the owner could be irreversible, and potentially cost more than the secured property.
  • 22. • Interoperability • Over reliance: The perception that biometric systems are foolproof might lead people to forget about daily, common-sense security practices and to protect the system's data. • Accessibility: Some systems cant be adapted for certain populations, like elderly people or people with disabilities. Interoperability: In emergency situations, agencies using different systems may need to share data, and delays can result if the systems can't communicate with each other.
  • 23. If biometric data is obtained, for example compromised from a database, by unauthorized users, the genuine owner will lose control over them forever and lose his/her identity. one ordinary advantage of password does not exist in biometrics. That is re-issue. If a token or a password is lost or stolen, they can be cancelled and replaced by a newer version i.e. reissued. On the other hand, this is not naturally available in biometrics. Cancelable biometrics is a way in which to inherit the protection and the replacement features into biometrics. Several methods for generating cancellable biometrics have been proposed. Essentially, cancelable biometrics perform a distortion of the biometric image or features before matching. The variability in the distortion parameters provides the cancelable nature of the scheme.
  • 24. • Australia • Brazil • Germany • Iraq • Israel • Japan • United States
  • 25. •Some hospitals use biometric systems to make sure mothers take home the right newborns •New methods that use DNA, nail bed structure, teeth, ear shapes, body odor, skin patterns and blood pulses •More accurate home-use systems •Opt-in club memberships, frequent buyer programs and rapid checkout systems with biometric security
  翻译: