Kottam College of Engineering Chinnatekur Kurnool
Kottam College of Engineering Chinnatekur Kurnool
Kottam College of Engineering Chinnatekur Kurnool
Chinnatekur
kurnool
Prepared By
A.Goutami
REG NO:13EH1D5814
What is Authentication ?
Types of Authentication
What is Biometric?
Why Biometric?
Characteristics of Biometric
Conclusion
By using Biometric
[3]
Identification
One-to-many comparison
It search for a sample against a database of templates
It identifies an unknown individual.
For e.g.: who is x?
Verification
One-to-one comparison
It compares a sample against a single stored template
It verifies that the individual is who he claims to be
For e.g.: is this x?
Steps:
Capturing
Pre-processing
Feature extraction
Template matching
Matcher/Comparison
Application Device
[3]
A scanning device
A software which converts scanned
information into digital forms and compares on
some matching points
A database that stores biometric features for
further comparison
Fingerprint technology:
It is the oldest and most widely used method.
It needs a fingerprint reader.
Registered points are located and compared.
Optical sensors are used for scanning purpose.
It can be used for many applications like pc login
security, voting system,
attendance system etc.
[12]
Finger Image
Minutiae
Places
[6]
[3]
Criminal identification
Internet banking
Attendance system
Airport, Bank security
PC login security
Prevents unauthorized access to private data
Financial transaction management