17
BIOMETRIC SENSOR INTEROPERABILITY

Biometrics ppt

Embed Size (px)

DESCRIPTION

Biometrics

Citation preview

Page 1: Biometrics ppt

BIOMETRIC SENSOR INTEROPERABILITY

CONTENTS

bullIntroduction

bullBiometrics

bullThe Need for Biometric Systems

bullBiometric System

bullFingerprint Sensors

bullPSYCHOLOGICAL VERIFICATION

bullAdvantages

bullLimitations

bullConclusion

Biometrics is an advanced technology for superb security and authentication The very term biometricrdquo

bio means related to the biological study and metric means something which is related to measurement

Two security methodologies

1Token-based security

2Secret based security

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 2: Biometrics ppt

CONTENTS

bullIntroduction

bullBiometrics

bullThe Need for Biometric Systems

bullBiometric System

bullFingerprint Sensors

bullPSYCHOLOGICAL VERIFICATION

bullAdvantages

bullLimitations

bullConclusion

Biometrics is an advanced technology for superb security and authentication The very term biometricrdquo

bio means related to the biological study and metric means something which is related to measurement

Two security methodologies

1Token-based security

2Secret based security

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 3: Biometrics ppt

Biometrics is an advanced technology for superb security and authentication The very term biometricrdquo

bio means related to the biological study and metric means something which is related to measurement

Two security methodologies

1Token-based security

2Secret based security

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 4: Biometrics ppt

Two security methodologies

1Token-based security

2Secret based security

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 5: Biometrics ppt

The Need for Biometric Systems

1What you know

2What you have

3Who you are

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 6: Biometrics ppt

Biometric System

bull Sensor Module

bull Feature Extraction Module

bullMatching Module

bull Decision Module

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 7: Biometrics ppt

Fingerprint Sensors

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 8: Biometrics ppt

Optical Fingerprint Sensor

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 9: Biometrics ppt

Capacitive Fingerprint Sensor

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 10: Biometrics ppt

Ultrasound Fingerprint Sensor

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 11: Biometrics ppt

PSYCHOLOGICAL VERIFICATION

I Fingerprint

II Handprint

III Face measurement IV Retinal scans

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 12: Biometrics ppt

Advantages

bullneeds high memory space in the back end

bullIt provide good security mechanism than all other security methods

bull It never fails in security constraints

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 13: Biometrics ppt

Limitations

1048766 Collect data for security is difficult

1048766 Some times fails the security with right users

1048766 Any time data loose in database high effect for security mechanism

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 14: Biometrics ppt

Conclusion

Security is not just about putting big locks on the front door it also involves making sure all the windows are shut

THANK YOU

Page 15: Biometrics ppt

THANK YOU