biometrics n.
Skip this Video
Loading SlideShow in 5 Seconds..
BIOMETRICS PowerPoint Presentation
Download Presentation

Loading in 2 Seconds...

play fullscreen
1 / 17

BIOMETRICS - PowerPoint PPT Presentation

  • Uploaded on

BIOMETRICS. Presented By Rickie Jackson. Outline Introduction Biometrics techniques Strengths, and weaknesses FAR/FRR Major Players Summary. What Is Biometrics. Biometrics is the reading of a unique human physical attribute as data, which is then applied to actuating a system. .

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'BIOMETRICS' - Gabriel

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript


Presented By Rickie Jackson

    • Introduction
    • Biometrics techniques
    • Strengths, and weaknesses
    • FAR/FRR
    • Major Players
    • Summary
what is biometrics
What Is Biometrics

Biometrics is the reading of a unique human physical attribute as data, which is then applied to actuating a system.

  • Access control of Secure areas
  • Replacing passwords on computers or PDAs
biometrics techniques
Biometrics Techniques
  • Retina scanning
  • Iris scanning
  • Fingerprint scanning
  • Hand scanning
  • Face recognition
  • Voice recognition & DSV
  • Signature recognition
  • Keystroke recognition
retinal scanning

Retinal Scanning

Iris Scanning

User Looks Into a Viewer and Focuses on a Point; Infrared Light Scans Retina

User looks at a camera (distance from camera increasing rapidly to 2-3 feet)

finger scanning

Finger Scanning

User Places Finger on Scanning Device

hand scanning

Hand Scanning

User Places Hand on Device

facial recognition

Facial Recognition

User Looks at Camera

other techniques
Other Techniques

Voice Recognition & DSV

User speaks into a microphone or other device, such as a telephone handset

Signature Recognition

User signs name on a device

Keystroke Recognition

User types standard sample on keyboard

strengths and weakness




Hand/Finger Geometry

Face Recognition

Voice Recognition

Signature Recognition

Keystroke Recognition

Strengths, and Weakness




Highly accurate


Highly accurate; works with eyeglasses; more acceptable to users than retina scan


Mature technology; highly accurate; low cost; small size, becoming widely acceptable

Hand/Finger Geometry

accurate and flexible; widely acceptable to users

Face Recognition

Widely acceptable to users; low cost; no direct contact; passive monitoring possible

Voice Recognition

Usable over existing telephone system; good for remote access and monitoring;

Signature Recognition

Widely acceptable to users

Keystroke Recognition

Widely acceptable to users; low cost; uses existing hardware





Inconvenient for persons with eyeglasses; dislike contact with device and light beam


New technology, cost, although this is rapidly changing


Users can create high FRR; some persons dislike contact with device

Hand/Finger Geometry

User interface is bulky; dislike contact with device

Face Recognition

Face recognition is less accurate than other methods

Voice Recognition

Less accuracy; subject to background noise

Signature Recognition

Less accuracy; not widely used yet, but has potential with PDAs

Keystroke Recognition

Less accuracy;

far frr

FAR(False Acceptance rate) – refers to how often the system accepts someone it should reject


FRR(False Rejection Rate) is how often the system rejects someone it shouldn’t.

relation of far and frr
Relation of FAR and FRR


Accept wrong person


Reject the correct person

Security Level



major players
Major Players
  • Computer access
  • Physical access
  • Handheld devices
  • Military/Govt. Agencies/DOD
  • Financial services
  • Hospitals
  • Telecommunication
  • As biometric technology advances, the cost of systems will decrease.
  • At the same time, biometrics systems will become increasingly sophisticated and accurate.
  • Scientist will physical and behavioral traits will increase the usefulness of biometrics.
  • The general public will gradually come to accept biometric system.

Fuller, Scott and Pagan, Kevin 1997. Intranet Firewalls “Planning and Implementing Your Network Security System.” Ventana Communications Group, Inc.

Conry-Murray, Andrew. Network Magazine. Oct. 1, 2002. p28 Securing End Users from Attack.

 McCollum, T. Security concerns prompt new initiatives. The Internal Auditor. Oct. 2002.

Short, Bob. September 2002. Getting the 411 on Biometrics. Security Magazine. p48.

Tocci, Salvatore. 2000. High-Tech IDs: From Finger Scans To Voice Patterns. Grolier Publishing

 Mitnick, Kevin & Simon, William L. The Art of Deception: Controlling the Human Element of Security. Library Journal.