Download - Biometric System
BIOMETRIC SYSTEM
My Presentation• Introduction• History• Working Process• Technologies• Advantages And Disadvantages• Conclusion
INTRODUCTION
Biometric system is defined as an automated methods of identifying or authenticating the identity of a living person based on a physiological or behavioral characteristics.
Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
H I S
TORY
The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century by “Joao de Barros.”
“Bertillonage” a method of bodily measurement was used by police authorities.
The police then used finger printing, which was developed by Richard Edward Henry of Scotland Yard.
BIOMETRICS is derived from the Greek words bio(life) and metric(to measure).
WORKING PROCESS
The selection of a particular biometric for use in a specific application involves a weighing of several factors :
Universality describes how commonly a biometric is found in each individual
Uniqueness how well the biometric separates one individual from another
Permanence measures how well a biometric resists aging
Collectability ease of acquisition or measurement of the trait
Performance accuracy , speed and robustness of technology used
Acceptability how well relevant population accept the technology
Circumvention ease with which a trait might be imitated using an artifact
BIOMETRIC SYSTEM
Identification System Verification System
Verification System- One to One: Biometrics can also be used to verify a person's identity. For example, one can
grant physical access to a secure area in a building by using finger scans or can grant access to a bank account at an ATM
by using retinal scan.
Identification System- One to Many: Biometrics can be used to determine a person's identity even without his
knowledge or consent. For example, scanning a crowd with a camera and using face recognition technology, one can
determine matches against a known database.
Biometric systems can seem complicated, but they all use the same
three steps:• Enrollment: The first time you use a biometric system, it
records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait.
• Storage: Contrary to what you may see in movies, most systems don't store the complete image or recording. They instead analyze your trait and translate it into a code or graph. Some systems also record this data onto a smart card that you carry with you.
• Comparison: The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be.
Systems also use the same three components:
A sensor that detects the characteristic being used for identification.
A computer that reads and stores the information.
Software that analyzes the characteristic, translates it into a graph or code and performs the actual
comparisons.
Multi-modal biometric system Multimodal biometric systems are those that utilize more than one physiological or behavioral characteristic for enrollment, verification, or identification.Multi-modal biometric systems are looked to as a means of:
• Reducing false non-match and false match rates• Providing a secondary means of enrollment, verification, and identification if sufficient data cannot be acquired from a given biometric sample
• Combating attempts to fool biometric systems through fraudulent data sources such as fake fingers
TECHNOLOGIES
Various Biometrics Technologies
Biometric Machines
Advantages and Dis-
advantages
Current, Emerging And Future Applications Of Biometrics
India’s national ID Program [ Aadhar ]Biometrics based on brain and heart signals
have emergedProposal calls for biometric authentication to
certain public networks
Issues and Concern• Privacy and discrimination- data obtained during biometric
enrollment may be used in ways for which the enrolled individual has not consented
• Dangers to owner of secured items- When thieves cannot get access to secure properties, there is a chance that the thieves will stalk and assault the property owner to gain access
• Cancelable biometrics- If someone's face is compromised from a database, they cannot cancel or reissue it
• Soft biometrics- traits such as height,odour,colour etc. are low in identification performance capability
• International sharing of biometric data- Many countries, including the United States, are planning to share biometric data with other nations.
• Governments are unlikely to disclose full capabilities of biometric deployment- Certain members of the civilian community are worried about how biometric data is used but full disclosure may not be forthcoming
CONCLUSION
Conclusion on Biometric & Workforce Management->Despite widespread use, confusion and misconceptions about the technology and its capabilities persist. These concerns are easily dispelled when the facts about biometrics are established.
-> Biometrics offers unparalleled ability to quickly and accurately capture real-time, labour data and provide a non-repudiated audit trail.
-> Biometrics has undergone intense scrutiny and the results are in - when properly deployed, biometrics work well and are safe, secure, and accurate.
-> Biometrics offers organizations a broader range of direct and indirect time, cost, and operational benefits than alternative time and attendance methods
·->Today over one hundred thousand thriving organizations rely on Easy Clocking’s time & attendance systems to automate their employee attendance and as a result they are seeing a significant reduction in direct and indirect labour costs.
THANK YOUA project by
Mercy and Priyanshi