Pace University IT691/Fall 2015

Slides:



Advertisements
Similar presentations
Touch-Screen Mobile- Device Data Collection for Biometrics Studies W. Ciaurro, B. Major, D. Martinez, D. Panchal, G. Perez, M. Rana, R. Rana, R. Reyes,
Advertisements

Biometrics Kayla Burke.
(Biometrics Consortium)
Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PALM VEIN TECHNOLOGY.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Chapter 5 Input By: Matthew D McCoog What Is Input? Any data or instructions entered into the memory of a computer.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Customer Dr. Beigi, Recognition Tech., Inc Hugh Eng, DPS ‘16 Dr. Tappert, CSIS Vinnie Monaco, PhD’15 Smartphone/Laptop Security Acceptability/Ease-of-Use.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
WELCOME TO PALM VEIN TECHNOLOGY M.Sravanthi K.Raga Ranjitha
Biometric Authentication in Infrastructure Security By: John Armington, Purdy Ho, Paul Koznek and Richard Martinez G. Davida, Y. Frankel and O. Rees (Eds.):
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
I can be You: Questioning the use of Keystroke Dynamics as Biometrics Tey Chee Meng, Payas Gupta, Debin Gao Ke Chen.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Physical Security Secure the room Secure the machine – 6 ways.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
Diane DiLorenzo Cosc 101 section 7
SUBMITTED BY ATHIRA BALAKRISHNAN
Biometric Security Technology Acceptance Study
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
FACE RECOGNITION TECHNOLOGY
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Keystroke Biometric Authentication on Smartphones Using Short Numeric Input Greg: Our project covers the topic of Keystroke Biometric Authentication, which.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Pace University IT691/Fall 2015 IT691 Capstone Project: Team 2 A Biometric Acceptability and Ease-of-Use Study for High Security Access Client: Dr. Homayoon Beigi Recognition Technologies, Inc Instructor: Dr. Charles Tappert, CSIS Supervisor: Hugh Eng, DPS’16 Presented by: Nattakarn Osborne Jonte’ Campbell Phillip Nassetta Timothy Truhn Pace University IT691/Fall 2015

Introduction/Acknowledgment Thank you to Dr. Beigi and Recognition Technologies, Inc. for allowing us to use his proprietary biometric authentication system, RecoMadeEasy®. Overview of biometrics Issues and concerns with biometrics Scope of study Conclusion / Future study

Biometric Characteristics Physiological Face Recognition DNA Fingerprint Hand Geometry Speaker Recognition IRIS Scan Hand Writing Keystroke Hand Waving Gait Behavioral

Problems FINGERPRINT IRIS SPEAKER Cataract surgery requiring PERCEPTIONS Cataract surgery requiring re-enrollment Illness Hygiene physical touching Damage due to manual labor SPOOFING Issue with cancer treatments Fingerprint/ Iris REGULATORY Privacy Issues Damage due to Injury

Beyond Previous Work Our study is the continuation of three previous research groups Our team’s goal was to increase the number of survey responses Produced a video demonstrating enrolling and authenticating using facial and speaker recognition. Distributed Survey Increase the number of female responders Get greater female participation in the RecoMadeEasy® study was requested Demonstrate multilingual capabilities Demonstrate the “liveness” feature Our study is a continuation of three previous research groups. Our team wanted to gather data from a broader and more diverse demographic. Not only did we want to increase the overall number of surveys, but we also wanted to increase the number of female respondents and participants, as well as demonstrate the use of multi-lingual capabilities and the liveness feature.

Female & Multilingual Participants SPANISH ENROLLMENT AUTHENTICATE SPANISH ENROLLMENT THAI AUTHENTICATE ENGLISH We had a total of 6 participants, 2 males and 4 females (myself and Nattakarn and 2 volunteers) Of the 4 females, 3 of which were bilingual. We had a participant enroll in spanish and authenticate in spanish, one enroll in thai and authenticate in english, one enroll in english and authenticate in russian, and one enroll in english and authenticate in english. ENROLLMENT ENGLISH AUTHENTICATE RUSSIAN ENROLLMENT ENGLISH AUTHENTICATE ENGLISH

Liveness Test RecoMadeEasy® system generates a string of text. Unless the generated text is recited exactly, the user will not authenticate. Our testing included intentional failures to check against false acceptance. When testing for liveness, the biometric system displayed a string of text. If the user was not able to recite the text exactly as displayed on the screen, he was not able to successfully authenticate. The test also included intentional failures to check against false acceptance.

Survey Results 204 ? Increased female participation More than half are interested in using Biometrics in home Increased female participation THERE WERE 204 PARTICIPANTS AGE BETWEEN 18 - 56+ Less than one-third currently using biometrics for mobile devices ? Over 75% are comfortable using Biometrics for banking One-half feel privacy and security are equally important Favorable comfort level for both IT and Non-IT related fields

Survey Results: Age & Gender

Using Biometric for Accessing Computer/Mobile Device Facial Recognition Speaker Recognition

Study Results On a scale of 1-10, more than 75% of participants rated the biometric system as being easy to use and roughly 75% of participants rated the biometric system as being convenient.

Conclusions and Future Work The overall perception is the biometric system is both easy to use and convenient Concerns with how deviations in voice will impact the authentication process Concerns with authentication in high-traffic areas Hygiene concerns with touching a device Multi-language increases versatility Greater testing for spoofing circumventions Impacts on those with disabilities and impairments

Palm Vein Scanner by Fujitsu Why Vein patterns recognition? Hygienic concern for Contactless authentication. Promote high-level of user acceptance. High level of accuracy and application versatility. http://www.fujitsu.com/global/solutions/business-technology/security/palmsecure/

Any Questions... Q A &