Investigation of Two Licensed Biometric Products Using Neurotechnology’s VeriLook and VeriFinger software.

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRIC VOTING SYSTEM
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
Face Biometric Applications Team Members: Faune Hughes, Daniel Lichter, Richard Oswald, and Michael Whitfield Clients: Fred Penna and Robert Zack.
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics & Security Tutorial 6. 1 (a) Understand why use face (P7: 3-4) and face recognition system (P7: 5-10)
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Uba Anydiewu, Shane Bilinski, Luis Garcia, Lauren Ragland, Debracca Thornton, Joe Tubesing, Kevin Chan, Steve Elliott, and Ben Petry EXAMINING INTRA-VISIT.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
+ Hand Biometrics Measurement and biometric technologies for identification and security applications.
Introduction to Biometric Systems
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
BIOMETRICS THE MAN MACHINE INTERFACE
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Physical Security Secure the room Secure the machine – 6 ways.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Jim Parson Secure Systems Administration. History Babylonian business transactions included fingerprints 500 B.C. Chinese - tracked young children 14th.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
Diane DiLorenzo Cosc 101 section 7
A Seminar Report On Face Recognition Technology
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Seminar Presentation on Biometrics
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Investigation of Two Licensed Biometric Products Using Neurotechnology’s VeriLook and VeriFinger software

What is Biometrics? The application of statistical analysis to biological data Extracts certain features, analyzes them, and by using algorithms, identifies data matches Extractable features include face, fingerprint, iris, retina, voice, hands and DNA

Why is Biometrics important?

Software Used Neurotechnology’s VeriLook 4.0 and VeriFinger 6.3 System requirments PC or Mac with processor of 1GHz or better Microsoft Windows 2000 or newer Mac OS X Tiger or newer

How does it work? VeriLook Facial detection Distance between eyes, face length/width, etc. VeriFinger Distance between lines, degree of curves and patterns

Screenshot

What is being proven? Is the software able to do as advertised? Is it a good method of recognition? What is the extent of the SDK’s security?

VeriFinger experiments Lotion Hand-sanitizer Weather

Verification of a fingerprint

VeriLook experiments Accepted Facial Area Disguises Age

Facial Regions

Disguises

Age

Conclusions Under what conditions does each software operate optimally?

Neurotechnology’s software Is it able to do as advertised? Yes but with exceptions Is it able to do as advertised? Yes but with exceptions

Thoughts and Ideas Is there a way to increase accuracy and security? A combination of both?..