biometrics ppt

Post on 05-Jul-2015

211 Views

Category:

Education

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Biometrics

TRANSCRIPT

BIOMETRIC SENSOR INTEROPERABILITY

CONTENTS

bullIntroduction

bullBiometrics

bullThe Need for Biometric Systems

bullBiometric System

bullFingerprint Sensors

bullPSYCHOLOGICAL VERIFICATION

bullAdvantages

bullLimitations

bullConclusion

Biometrics is an advanced technology for superb security and authentication The very term biometricrdquo

bio means related to the biological study and metric means something which is related to measurement

Two security methodologies

1Token-based security

2Secret based security

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

CONTENTS

bullIntroduction

bullBiometrics

bullThe Need for Biometric Systems

bullBiometric System

bullFingerprint Sensors

bullPSYCHOLOGICAL VERIFICATION

bullAdvantages

bullLimitations

bullConclusion

Biometrics is an advanced technology for superb security and authentication The very term biometricrdquo

bio means related to the biological study and metric means something which is related to measurement

Two security methodologies

1Token-based security

2Secret based security

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Biometrics is an advanced technology for superb security and authentication The very term biometricrdquo

bio means related to the biological study and metric means something which is related to measurement

Two security methodologies

1Token-based security

2Secret based security

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Two security methodologies

1Token-based security

2Secret based security

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

THANK YOU

top related