By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.

Slides:



Advertisements
Similar presentations
Confidential – Do Not Distribute Iris Biometrics For Accurate Patient Identification Michael Trader President M2SYS Technology
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Biometrics and Authentication Shivani Kirubanandan.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
Marjie Rodrigues
Security-Authentication
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Equipment Equipment for preventing unauthorised access to data & information.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6 BIOMETRICS.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Biometrics.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Access Control / Authenticity Michael Sheppard 11/10/10.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
BIOMETRICS.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Physical Security Secure the room Secure the machine – 6 ways.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Overview of Bio-Tech Technology+- Fingerprint Popular Cheapest Less Accurate Voice Non invasive Least Accurate Iris & Retinal Very accurate Invasive Expensive.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Information Systems Design and Development Security Precautions Computing Science.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
BY: Michael Etse and Maverick Fermill
Presentation transcript:

By Aidan Summerville

 The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system as a means of confirming identity.( wse/biometrics) wse/biometrics  Commonly used as personal clock in methods by employers.  In more recent times used for personal devices such as laptops and smart phones.

 1.Iris.  2.Finger print.  3.Palm print.  4.Facial Recognition.  5.Hand shape.  6.Retina.  7.Ear.  8.Palm vein Imaging.  9.Voice.

 The first biometrics used was fingerprint analysis to prove criminal activity.  In the 1970s fingerprint identification started to be used on a large scale for personal clock ins for large companies.  Later palm print and hand size started to be used for clock ins at large companies.  Nowadays it is common practice among most large companies to use biometric check ins as it ensures that it is you using the machine.

 Iris and retina is used nowadays as it is more reliable than hand size, palm print and finger print, due to the fact that it is far less discriminatory.  People who have suffered disfigurement t or limb amputation are unable to use these machines. It is far less likely for an individual to be missing both eyes.  It is also much harder to impersonate someone else's, Iris or Retina.

 Biometrics for personal devices original was introduced by finger print scanners for laptops and later voice and facial recognition software for computers, laptops, smart phones and tablets.  Siri for iphone have a new voice recognition software usable instead of a password.  Finger print scanning technology is still the most commonly used today as it is by far the easiest and most reliable to use.  However usernames and personal passwords are by far and a way the most popular form of security.

PROSCONS  Protects against fraud.  Fast access no chance of forgetting the password.  Do not have to remember large amount of passwords.  Costly to implement.  Discriminatory.  Intrusive people have fears about the uses of their information.  Some biometrics such as voice recognition are possible to fake with a recording.

 In the future for personal devices I see some biometrics more realistically being used than others.  As cameras for phones become better facial recognition software may be used.  I also see palm print scanners possible for Tablets.  I don't for see voice recognition to last very long as it is not very secure and is open to theft.  Other biometrics may be used but the software and hardware are simply far to expensive in comparison to the ones in use today.

 To ensure against a fail in biometric or to just ensure the safety of a device it is almost necessary to use two biometrics.  For example palm print and facial recognition.  Using dual biometrics slows down the speed of use of biometrics but also increases the cost vastly.

 Certain biometrics are just not viable due to user acceptability.  Fingerprints are not social acceptable to use this may be due to the fact that they are associated with crime and government control.  Iris and retina scanners are extremely intrusive and would have a lot of people refusing to use them.

 Jain, Ask. Kumar, A. Biometrics of Next Generation: An Overview. 2010,Second Generation Biomtetrics Springer.  Anon,Biometric solutions to personal identification.  Trewin, S. Swart, C. Koved, L. Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption (2012)