Upload
raga-deepthi
View
211
Download
0
Embed Size (px)
DESCRIPTION
Biometrics
Citation preview
BIOMETRIC SENSOR INTEROPERABILITY
CONTENTS
bullIntroduction
bullBiometrics
bullThe Need for Biometric Systems
bullBiometric System
bullFingerprint Sensors
bullPSYCHOLOGICAL VERIFICATION
bullAdvantages
bullLimitations
bullConclusion
Biometrics is an advanced technology for superb security and authentication The very term biometricrdquo
bio means related to the biological study and metric means something which is related to measurement
Two security methodologies
1Token-based security
2Secret based security
The Need for Biometric Systems
1What you know
2What you have
3Who you are
Biometric System
bull Sensor Module
bull Feature Extraction Module
bullMatching Module
bull Decision Module
Fingerprint Sensors
Optical Fingerprint Sensor
Capacitive Fingerprint Sensor
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
CONTENTS
bullIntroduction
bullBiometrics
bullThe Need for Biometric Systems
bullBiometric System
bullFingerprint Sensors
bullPSYCHOLOGICAL VERIFICATION
bullAdvantages
bullLimitations
bullConclusion
Biometrics is an advanced technology for superb security and authentication The very term biometricrdquo
bio means related to the biological study and metric means something which is related to measurement
Two security methodologies
1Token-based security
2Secret based security
The Need for Biometric Systems
1What you know
2What you have
3Who you are
Biometric System
bull Sensor Module
bull Feature Extraction Module
bullMatching Module
bull Decision Module
Fingerprint Sensors
Optical Fingerprint Sensor
Capacitive Fingerprint Sensor
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Biometrics is an advanced technology for superb security and authentication The very term biometricrdquo
bio means related to the biological study and metric means something which is related to measurement
Two security methodologies
1Token-based security
2Secret based security
The Need for Biometric Systems
1What you know
2What you have
3Who you are
Biometric System
bull Sensor Module
bull Feature Extraction Module
bullMatching Module
bull Decision Module
Fingerprint Sensors
Optical Fingerprint Sensor
Capacitive Fingerprint Sensor
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Two security methodologies
1Token-based security
2Secret based security
The Need for Biometric Systems
1What you know
2What you have
3Who you are
Biometric System
bull Sensor Module
bull Feature Extraction Module
bullMatching Module
bull Decision Module
Fingerprint Sensors
Optical Fingerprint Sensor
Capacitive Fingerprint Sensor
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
The Need for Biometric Systems
1What you know
2What you have
3Who you are
Biometric System
bull Sensor Module
bull Feature Extraction Module
bullMatching Module
bull Decision Module
Fingerprint Sensors
Optical Fingerprint Sensor
Capacitive Fingerprint Sensor
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Biometric System
bull Sensor Module
bull Feature Extraction Module
bullMatching Module
bull Decision Module
Fingerprint Sensors
Optical Fingerprint Sensor
Capacitive Fingerprint Sensor
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Fingerprint Sensors
Optical Fingerprint Sensor
Capacitive Fingerprint Sensor
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Optical Fingerprint Sensor
Capacitive Fingerprint Sensor
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Capacitive Fingerprint Sensor
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Ultrasound Fingerprint Sensor
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
PSYCHOLOGICAL VERIFICATION
I Fingerprint
II Handprint
III Face measurement IV Retinal scans
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Advantages
bullneeds high memory space in the back end
bullIt provide good security mechanism than all other security methods
bull It never fails in security constraints
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Limitations
1048766 Collect data for security is difficult
1048766 Some times fails the security with right users
1048766 Any time data loose in database high effect for security mechanism
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
Conclusion
Security is not just about putting big locks on the front door it also involves making sure all the windows are shut
THANK YOU
THANK YOU