Using Biometrics in Crime Prevention Presented by American Crime Prevention Institute.

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Biometrics Overview. Biometrics Identification or verification of an individual based on a physical characteristic or trait.
BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
Biometrics Pearl Brewer, Ph.D. HOA 725. Definition of Biometrics Automated identification based on physiological or behavioral characteristics  Examples.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
By: Monika Achury and Shuchita Singh
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Aladdin Security We supply what others can only assure.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Authentication.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Using Biometrics in Crime Prevention Presented by American Crime Prevention Institute

Biometrics can be defined as “the automated use of physiological or behavioral characteristics to determine or verify identity.” Biometrics can accomplish two goals: Tighten or improve security Reduce security costs

Biometric Industry Sales $20 Million in 1995 $200 Million in 2002 Project $6 Billion by 2006

Physiological biometrics are based on measurements and data derived from direct measurement of a relatively stable physical characteristic. Finger-scan, iris-scan, retina- scan, hand-scan and facial scan are leading physiological biometrics. This type of measurement is basically unchanging and unalterable without significant duress.

Behavioral biometrics are based on measurements and data derived from an action, and indirectly measure characteristics of the human body. Voice-scan, keystroke- scan and signature-scan are leading behavioral biometric technologies.

Two Basic Functions of Biometrics 1. Verify a person’s identity (authentication) - Iris, finger and hand scanners - Very good authentication tools 2. Picking someone out of a crowd (identification) - Facial scanners - Relatively poor identification tools

Identification versus Verification Identification compares the living sample to the entire database – example is facial recognition or AFIS (automated fingerprint identification systems) – the time, processing power and cost needed to scan the entire database can be excessive.

Verification is the process of establishing the validity of a claimed identity by comparing a verification template to an enrollment template. The user’s biometric template is retrieved from storage by a PIN and compared to a live sample – most frequently used – hand geometry, iris scan, signature recognition, etc. Must 1 st obtain a “sample” Samples are converted to digital templates Enrollment template and live sample are compared and contrasted.

Types of Biometrics Fingerprint Recognition Retinal Scan Iris Scan Hand Recognition Voice Recognition Facial Scan Signature Recognition

Three-Factor Security One factor (ID card) is not enough Finance and aviation moving toward three- factor security Three-Factor Security – User presents something he knows –password or PIN – least secure – User presents something he has – plastic card – Something he is – fingerprint or iris scan

Technologies and the Unique You Fingerprint Recognition - oldest form of formal biometrics - has been used for over 100 years - location and direction of ridge endings and bifurcations on a fingerprint. It is estimated that the chance of two people, including twins, having the same print is less than one in a billion.

Fingerprint scanners are the most commonly used form of biometrics – and the least expensive and easiest to deploy – Ridges on fingers are converted to a digital template that can be compared with database records or a person. Fingerprint scanners can be fooled – use gelatin to create gummy fingers.

Eyes – Retinal - vascular pattern (blood vessels) in the back of the eye is formed after 6 months of age - technology available since mid-1980s. Retinal scans shoot a low-intensity beam of light into the eyeball and record the pattern of veins in the eye. Users are required to stand close to the device and focus on a target, which makes the systems unattractive.

– Iris - composed of striations, filaments and coronas, - do not change over time – the iris pattern is on the eye surface. Iris scanning may become the leading biometric device of the future because of its accuracy, permanency and unobtrusiveness. The iris has more information in the infrastructure of its organ than any other component of the body.

Iris scanners measure over 200 different characteristics in a person’s eyeball. Identification can be made through eyeglasses and contact lenses. The system compensates for pupil dilation or contraction.

Iris scanners can photograph eyes from up to three feet away. The verification process takes about 2 seconds. The iris scan’s major advantage over a retinal scan is tat it does not require the user to focus on a target, because the iris pattern is on the eye’s surface (vs. the blood vessel pattern on the back of the eye – retinal scan.

Hand Recognition - measures the size, shape, thickness, width and length of a person’s fingers and hand – used in day care centers, hospitals, welfare agencies. Over 8,000 hand recognition systems are in use.

Voice Recognition – listens to various speech patterns to determine identity – pitch, tone, harmonic vibrations, cadence – is not one of the most reliable means of biometrics – is used for access control for medium- security or high-throughput situations such as offices and labs

Face Recognition (newest & oldest – picture on driver’s license) – size, shape, distances between parts of the face – can change over time – has experienced difficulties in achieving high level of performance

Signature Recognition – speed, stroke order, pressure and appearance of signature – the key in signature dynamics is to differentiate between the parts of the signature that are habitual and those that vary with almost every signing. Keystroke Recognition – keyed sequence, duration between characters – typing rhythms

Biometric Crime Prevention Applications Airports – Heathrow in England – using iris scan for 2,000 frequent flyers. Iris scan being used for prison identification Iris scans being used in ATM’s – Wells Fargo Many banks use thumbprints for identification It has been recommended that both facial and fingerprint scanning be used to identify documents issued to foreigners.

Some semi-tractors require thumbprints to start the engine – Kenworth. Some laptop computers require thumbprints for activation. Kroger supermarkets in Columbus, Ohio ask for thumbprints on checks Kroger’s in College Station, Texas - use of fingerprints to purchase groceries (“SecureTouch-N-Pay”) – scan fingerprint at checkout counter & enter 7-digit number

Texas is the nation’s leading proponent of consumer thumbprinting Disney World – handprint for season ticket holders Facial recognition is newest and oldest (photo ID) form of biometrics. Facial recognition used by Tampa PD (terminated) and Virginia Beach PD.

Gaming casinos use facial recognition to identify card cheats. Military bases are testing facial recognition systems (Visionics) Department of Veterans Affairs is planning to use fingerprint recognition to combat entitlement fraud.

Hospitals use fingerprint scanning devices to identify doctors Krispy Kreme and Sun-Maid use hand- geometry technology when workers clock in and out. Experimenting with biometric trigger locks for electronic gun – shine infrared light into small section of skin and measure reflection.

Social Security Administration testing biometrics tied to social security card Transportation ID cards (“Trusted Traveler”) – background checks – intended to ease congestion at airport security checkpoints and reduce security hassles for registered travelers. Several large corporations (AT&T, ITT, GM, Texas Instruments, Martin Marietta) employ voice recognition to protect computer, officer, lab and vault access.

Can Biometrics Be Defeated? Absolutely Yes! Every biometric can be defeated if one allows sufficient amount of time, money and attempts. Employing biometrics raises the bar to the point where the costs of defeating the system may not justify the rewards.

Good Biometric Information International Biometrics Group

THANK YOU American Crime Prevention Institute is a division of the AEGIS Protection Group, Inc. Thank you