Jenna Lutton February 26th, 2007

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
By: Monika Achury and Shuchita Singh
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
PALM VEIN TECHNOLOGY.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics Authentication Technology
Biometrics.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Biometric Security Derek Foster. Overview What is Biometric Security? How it Works –Comparisons Types –Fingerprints –Iris Vs. Retina scans –Palm Vein.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
Fingerprint Sensor Market Demands
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Intelligent Face Recognition
Biometrics : From Yesterday to Tomorrow
A Seminar Report On Face Recognition Technology
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometric Security Fujitsu Palm Vein Technology
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometric Security Palm Vein Technology
Seminar Presentation on Biometrics
Facial Recognition in Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Jenna Lutton February 26th, 2007 Biometrics Jenna Lutton February 26th, 2007

Roadmap Introduction to Biometrics Facial Recognition Iris Scanning Fingerprint Scanning Palm-Vein Biometrics Behaviometrics Summary Questions

Introduction Biometrics – Use of physical characteristics to identify a person Two goals: Verification – Am I who I claim I am? Identification – Who am I? Future of security Border patrol ID Cards ATM access

Facial Recognition Compare a person’s face from a still image (or video capture) against a face stored in a database Two approaches: Geometric matching Distance between facial features Template matching Facial image – 2D array of pixel intensity values Compare against multiple templates of whole face

Issues Illumination Time Delay Pose Variation Facial Expression Multiple faces in image Wearing glasses, etc.

Fingerprint Scanning Very popular method of authentication Every person has unique fingerprint Scanner gets an image of your fingerprint Compares pattern of specific fingerprint features (minutiae) against another pattern in a database

Only finds adequate number of common minutiae patterns

Problems Some can be fooled by images of fingerprints Some can be fooled by molds Mythbusters: http://www.youtube.com/watch?v=ZncdgwjQxm0 Developing ways to bypass these: Scanner checks if cells are alive Scanner checks if blood flowing through finger

Iris Scanning Use infrared to capture an image of the iris (visible ring that surrounds the pupil)

Iris Scanning (cont.) Each eye has a unique iris, has measurable features (striations, pits, furrows) Controls the amount of light that enters the eye After an image of the iris is taken, a pattern or code is generated based on its features

Advantages Have to be present at scanner Non-invasive Not affected by contacts or glasses More points of comparison

Palm-Vein Biometrics Veins are also unique among people Uses near-infrared to identify all of the veins in your hand and captures that image

Advantages Change little with age Hard to spoof – not all veins visible Sanitary – don’t have to physically touch the scanner Used today as extra security layer at ATM machines

Behaviometrics Using behavioral characteristics of a person to verify or identify a person Example: Identify a person by the way they type Analyze keystroke timing Determined by finger length, motor skills, etc. Example: Handwriting analysis Speed/rhythm of writing Sequence in which you form letters

Summary Biometrics revolutionizing security Not all methods are reliable or secure Trying to find more ways to uniquely identify a person

Questions?

Sources http://www.iridiantech.com/index2.php http://www.howstuffworks.com/ http://www.face-rec.org/general-info/ http://www.face-rec.org/interesting-papers/General/gross_ralph_2001_4.pdf http://www.face-rec.org/interesting-papers/General/cr1182.pdf http://www.biometric-control.co.uk http://www.discover.com/web-exclusives-archive/computer-recognition1124/ Early, Mark. “ARE Biometrics the Key to Data Security?” EContent; Sep2006; Vol. 29 Issue 7; Pg 38-42. Hall, Kenji. “Biometrics: Vein Scanners Show Progress.” Business Week Online; Pg 22