Professional Documents
Culture Documents
General authentication
Sophisticate Secure
Modern approaches
Psychological verification
Finger Print. Hand Print. Facial scanning Retinal Scanning.
Matching Process
Method s in Verification :
Finger print:
Advantages: This technology is neither too expensive nor does it require extensive user training. It also simple to implement. It is oldest known technique that is still used in criminal records and forensic. Disadvantages: Any injures of fingers effect more.
Hand print:
Advantage: Accuracy is better than fingerprint. Cheap and easy to deploy. Disadvantage: Complex in usage. Implementation is expensive. Any damages to hand effect more.
Face Scanning:
Disadvantage: Inaccurate is affected by changes in lighting, age, and movement, glass. Face creams also effect the measurements.
Retinal scans:
Advantage: Accurate with no false match in 2 million people. It s sophisticated process. Disadvantages: Expensive, difficult to deploy and use. Focus of light effect measurements.
Biometrics is having its own advantages and disadvantages. It high expensive but it provides good security. Money is not important than security. It is more useful for confidential maters
Advantages
It provide good security mechanism than all other security methods
transit every day including known criminals. Face recognition systems attached to video surveillance systems are supposed to help catch them.
scanners. He found that Optical finger print scanners can be fooled by silicon rubber. However electro magnetic scanners would reject those, because electrical characteristics are different from that of a live finger.
Limitations
It needs high memory space in the back end. Collect data for security is difficult Sometimes fails the security with right users Any time data loose in database high effect
for security mechanism. So many equipments are needed for provide this technology. It highly expensive
Multi-Biometrics
matching Percentage
Applications
privacy, convenience, fraud reduction, or to deliver enhanced services. Applications include:
Physical security and access control (e.g. borders, airports) Computer/Network logins (e.g. laptops with fingerprint sensors built in Business transactions (e.g. ATM withdrawals) Credit and debit card protection Voting Receiving government benefits (e.g. welfare, pension) Healthcare services (e.g. patient ID) Law enforcement (e.g. drivers licenses, vehicle registration, smart gun criminal identification systems) Identification Documents (e.g. Visas, passports, SIN cards, Military/Govt./Corporate ID cards) Data protection (e.g. biometric tokens)
Presented by K.APARNA