Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ACADEMY OF TECHNOLOGY
Adisaptahgram, Hooghly.
BIOMETRIC
SECURITY
BY: KUNAL ADHIKARI (Roll no: 100) & OLIVE GHOSH (Roll no: 88)
INTRODUCTION
BIOMETRIC SECURITY TECHNOLOGY
• Biometrics= BIOS+METRON,
(Bios means life and Metron means measure)
BIOMETRIC
TRAITS
BIOMETRIC SECURITY TECHNOLOGY
TECHNOLOGICAL
PROCESS
BIOMETRIC SECURITY TECHNOLOGY
DATA
BASE
Decision
DIGITAL INPUT SIGNAL Maker
Matching
Feature
Extraction
Sensor
BIOMETRIC SECURITY TECHNOLOGY
: INPUT THRO
BIOMETRIC SENSOR
BIOMETRIC SECURITY TECHNOLOGY
: EXTRACTIN
BIOMETRIC SECURITY TECHNOLOGY
: MATCHIN
BIOMETRIC SECURITY TECHNOLOGY
: DECISION
PROCESS
BIOMETRIC SECURITY TECHNOLOGY
INPUT
• Input Signal using Biometric Scanner
APPLICATION
BIOMETRIC SECURITY TECHNOLOGY
BIOMETRIC SECURITY TECHNOLOGY
ADVANTAGES &
DISADVANTAGES
BIOMETRIC SECURITY TECHNOLOGY
BIOMETRIC SECURITY TECHNOLOGY
BIOMETRIC SECURITY TECHNOLOGY
BIOMETRIC SECURITY TECHNOLOGY
Error Rate
Cost
Delay
Scanning Difficulty
Physical Disabilities
BIOMETRIC SECURITY TECHNOLOGY
FUTURE SCOPE
• Some Hospitals use Biometrics security System to make Sure
Mothers takes home the right Newborn.
• New Methods that use DNA, Nail bed Structure, Teeth, Ear
Shapes, Body Odour, Skin Patterns and Blood Pulses.
CONCLUSION
On an Overview, Biometric Security Technology is a Reliable, slowly
growing its trust among the population, while securing themselves without
any loss of Data while they being the token of the Security System, But,
While Implementing a Biometric Security System, we must keep the
Following points in Mind,
• Biometric is not Secret, therefore, Cryptographic Keys can be generated.
• Must trust the Biometric Input Devices and make the communication Line
SECURE.
• Input Devices needs to be Verified.
BIOMETRIC SECURITY TECHNOLOGY
REFERENCES
[1] N. K. Ratha, K. Karu, S. Chen, and A. K. Jain ,” A real-time matching
system for large fingerprint databases ,” IEEE Trans.Pattern
Anal.Mach Intell.,vol.18,no.8.pp 779-813,Aug.1996.
[3] Kumar, A., Zhang, D.,” Combining fingerprint, palmprint and hand-
shape for user authentication. In Pattern Recognition, ICPR 2006. 18th
International Conference on (Vol. 4, pp. 549-552). IEEE. 2006.
[5] www.wikipedia.org