The Role of Computers in Surveillance ~ Katie Hatland.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Marjie Rodrigues
Presented by Adam Alcock.  Germany 1942 by Siemens AG. Walter Bruch.  September 1968 Olean, New York.  CCTV in Banks and Stores.  1990s and 2000s.
Data Protection Act. Lesson Objectives To understand the data protection act.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Chapter 5 Input By: Matthew D McCoog What Is Input? Any data or instructions entered into the memory of a computer.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Massachusetts Digital Government Summit / Session - Smile You're On CameraPage 1.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Record Keeping How should our data be handled? Katie Fore.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Infinova Solutions Central Station Integration. Video Verification Infinova Digital Video Recorders can be integrated with a new or existing alarm system.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Surveillance and More Porsha J. Rice. Surveillance Cameras Nowadays surveillance cameras are virtually everywhere and in places such as: Schools Stores.
BETTER SAFE THAN SORRY Unit 6. Which item do you think is the most/least useful? How often do you/your parents use these items? What other pieces of equipment.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
1 Vehicle Dynamic Monitoring VDM1 Claus B. Nielsen.
INPUT DEVICES. Keyboard & Mouse  Keyboard: Enter text and commands  Mouse: Point, Select & enter Commands.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
CCTV SYSTEM There is a phrase commonly used among internet users i.e. “Nothing is Safe”. Adhering to this phrase industries have been trying from years.
Face Recognition Technology By Catherine jenni christy.M.sc.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Loss Prevention, Auditing & Safety Conference 2009 Title Sponsor:
Input Devices.
Athina Antoniou and Lilian Mitrou
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Privacy and Information
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
RECORDING AND DOCUMENTING IMMIGRATION CONTROLS
Presentation transcript:

The Role of Computers in Surveillance ~ Katie Hatland

Background Types of Surveillance Red light cameras Photographic or video data Located at intersections Used to catch and prevent vehicles from running red lights

Background Types of Surveillance Biometric Physical and behavioral characteristics of people Would be integrated into all aspects of daily activities Used for identification, verification, and screening

Background Before Computers Physical presence of police necessary Continuous monitoring not practical Waste of resources

Ethical Issues Safety vs. Profit Red light cameras used to increase profit Cameras don’t prevent accidents Cameras actually cause accidents

Ethical Issues Privacy Information from red light cameras can be used for other purposes Biometric data stores too much information on individuals Protection on who is able to access information Certain groups will be targets

Conclusion Computers have made it possible to: Easily store and access information Reduce human characteristics to numeric codes Monitor activity as a means of protection and law enforcement

History of Impact Current Technology Red light cameras use digital photographs and video recordings Collection and maintenance is less expensive Biometric uses fingerprinting, handwriting, and iris recognition Used in some banks for verifying identity

History of Impact Future Technology Biometric data to monitor for suspicious behavior Would replace passwords