 Increase overall security  Reduce plastic and paper waste  Allow limited access over the phone, inside the bank, and at ATMs  Insure trust in new.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Aladdin Security We supply what others can only assure.
Physical Security Secure the room Secure the machine – 6 ways.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
By: Suvigya Tripathi (09BEC094) Ankit V. Gupta (09BEC106) Guided By: Prof. Bhupendra Fataniya Dept. of Electronics and Communication Engineering, Nirma.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Black Ice Security Services
Face Recognition 1.
Stovall and Klee Security
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Facial Recognition in Biometrics
Biometric technology.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
Presentation transcript:

 Increase overall security  Reduce plastic and paper waste  Allow limited access over the phone, inside the bank, and at ATMs  Insure trust in new clientele  Modernize banks in the U.S. through technological advancements  Be cost-effective

We propose that iris scanners are installed in ATMs to provide access to only members of the bank. When entering the building members must scan their eyes and provide a 10 digit code; members must scan themselves in and out of the building. Facial recognition will be used inside the bank 24 hours a day to increase security. When transactions are made over the phone, voice recognition services will be used.

 Contact and glasses friendly  Considered the most effective form of biometric identification  Only 4% in trials weren’t correctly identified “…iris recognition uses camera technology with subtle infrared illumination to acquire images of the detail- rich, intricate structures of the iris. Digital templates encoded from these patterns by mathematical and statistical algorithms allow unambiguous positive identification of an individual. Databases of enrolled templates are searched by matcher engines at speeds measured in the millions of templates per second per (single-core) CPU, and with infinitesimally small False Match rates.” 1 Decreasing costs Increasing accuracy

A person’s unique iris patterns are complete by the time they are about 8 months old, and do not change later in life. There is no way to surgically alter the iris without damage to a person’s vision. No two irises are alike, not even in identical twins or in the right or left eye in the same person. When using a certain coordinate system iris images can be represented that are not affected by factors such as distance of eye from camera, pupil size, camera angles, and location of the iris in the image. Iris and computed iris code

 Colored contacts or pupil-enlarging drugs can reduce the effectiveness of the scan  Some scanners have been beat by holding up a very high resolution photo of an eye to the camera  Watery eyes or debris on the surface of the eye can cause problems with the scanner

 “Members of the Privium programme have been using iris recognition for border passage for the past ten years. This application is also used for the staff of companies located at Schiphol who require access to areas which are protected or are not open to the public. The countless numbers of people who work at the airport carry a Schiphol pass containing a unique photograph of their iris. The pass, combined with an iris scan, provides access to protected areas and makes it impossible for anyone to gain access to a protected area by using someone else’s pass.”

Doesn’t work well when/in; Poor lighting Profile (side) views The user is wearing sunglasses Objects covering individuals faces Low resolution images Varying facial expressions When the user is wearing hats or hoods This will serve as extra security to monitor the behavior of members of the bank and will keep track of suspicious behavior. Members must; Remove sunglasses when entering the building Allow their id picture to be entered into the bank database Remove hoods and hats when entering the building

 A traditional facial recognition system will identify peoples faces by examining facial features such as; Size, position, and shape of: eyes, nose, mouth and cheekbones This information is taken and compared to a gallery of images. Algorithms can use two approaches when analyzing the facial features.  One approach is geometry that looks directly at the distinguishing facial features.  The other approach is photometric that captures a distil photo then translates it into values that are compared to values of other templates

 “The man said his name was Erik Lopez and his birthday was Nov. 22, 1971, but Deputy Mark Eastty wasn't so sure. The man, a passenger in a car Eastty pulled over in February for expired tags, said he didn't have a driver's license. So the Pinellas deputy took the man's picture. He put the digital image into his laptop and ran it through software that sifted through 7.5 million jail mug shots. Within seconds, he had a hit. The man, it turned out, was Elisur Velazquez-Lopez of Clearwater. He was born in And he had an active warrant for failing to appear in court for a charge of solicitation of prostitution. Eastty took the man to jail. "If we had played the name game I could've been there 30 minutes," Eastty said. "If I take their picture, it'll take two.””

 Fingerprint scanners? › Pros;  No fingerprints exactly alike  Scanners are cheap (some at only $50.00 US) › Cons;  Scanners need constant cleaning  Easy to beat if you know how  Debris or scars on the hands can cause inaccuracy or no match  DNA? › Pros;  DNA has a 1 in 1 billion chance of being like someone else’s  Cannot change or remove DNA › Cons;  Can take days, even weeks to process  Invasive process (requires blood, saliva, hair, semen, or other bodily fluid/tissue)

When calling the bank, a spoken PIN and password must be provided and compared to data on record in order for the member to access their account. It works by; A microphone records the users voice and a number of features are extracted to form a template or model of the users voice, basically the voice is translated into a format the computer can understand. It is then saved and new data is compared to what was saved on file. Always use same password and PIN number PIN number must also be entered into the phone’s dial pad

 Computer reads and assigns numbers to; › Amplitude › Frequency › Tone › Rhythm And creates a “voice print” that is saved on file. The words spoken over the phone are then compared to the saved voice prints in the system until it is identified.

Pros; Cost effective (some as low as $40.00 US) Software can “learn” to recognize voices better over time Cons; Easily affected by the physical condition of the user (i.e. colds) Affected by background noise Can be easily beaten Although the software is easily beaten, by having the user provide their password and PIN number fewer people will be able to access accounts that aren’t theirs when the password and PIN are compared as voices.

     iris-recognition-biometric-identification_ iris-recognition-biometric-identification_1341    