Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.

Slides:



Advertisements
Similar presentations
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Mentor: Mr. Roland Foster.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Investigation of Two Licensed Biometric Products Using Neurotechnology’s VeriLook and VeriFinger software.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
1 Biometrics and the Department of Defense February 17, 2003.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Jim Parson Secure Systems Administration. History Babylonian business transactions included fingerprints 500 B.C. Chinese - tracked young children 14th.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
A Seminar Report On Face Recognition Technology
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometric technology.
بیومتریک تهیه کننده : احمد محمدی نام مدرس : استاد حسین زاده.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
INTRODUCTION TO BIOMETRICS Comp. Lab. C Dulce-Garcia Bldg. University of San Agustin February 28, Ronald C. Tantiado Computer Engineer.
Examples of biometric traits.
Presentation transcript:

Biometrics Austen Hayes and Cody Powell

Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of Authentication  Constraints on Biometrics  Biometric Research at Clemson

What is Biometrics?  Automated method for recognizing individuals based on measurable biological and behavioral characteristics

Finger Print Recognition  Minutiae  Pattern Matching  Problems: sometimes unusable

Vascular Pattern Matching  LED infrared light  Fingers and back of hand  Not completely viable

Iris Recognition  Uses infrared light  Converts Images to vectors  Needs further development

Facial Recognition  Location and position of facial features  Dependent on background and lighting conditions

Voice Verification  Factors: pitch, intensity, quality and duration  Text dependent  Text independent  Problems: include background noise

Hand Geometry  Scan both sides of hand  Primarily used for verification  Not as accurate as other methods

Dynamic Signature  Factors: velocity, acceleration and speed  Mainly used for verification  Problems: forgers could reproduce

Retina Recognition  One of the most secure means of biometrics  Unique to each person  Unique to each eye  Problems: require effort on the part of subjects

Other Types  Keystroke  Gait  DNA  Odor

Commercial Applications  Computer login  Electronic Payment  ATMs  Record Protection

Government Applications  Passport control  Border control  Access Control

Forensic Applications  Missing Persons  Corpse identification  Criminal investigations

Type of Authentication  Authentication  1:1  Verification  1:N

Constraints on Biometrics  Typical “Constrained” Image  Constraints:  Lighting  Distance  Pose  Expression  Time Lapse  Occlusion

Constraints on Biometrics  “Unconstrained” Image

Biometrics Research at Clemson  Biometric and Pattern Recognition Lab  Goals: 1. Usable Biometrics 2. Unconstrained Biometrics

Biometrics Research at Clemson  Aging Research

Biometrics Research at Clemson  Demographics  Older vs. Younger  Males vs. Females  Geographic origin of algorithms

Biometrics Research at Clemson  Periocular Region Recognition  Texture, color, eye shape  Overcome facial occlusion

Biometrics Research at Clemson  Ear Recognition  Not affected by aging or expression  Covert collection of images  Little research performed

Conclusion  Questions?

Sources  Biometrics.gov. Web. 05 Dec  Jain, Anil K., Arun Ross, and Salil Prabhakar. "An Introduction to Biometric Recognition." IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY 14.1 (2004): IEEE Xplore. Web. 5 Dec  Jain, Anil K., Patrick J. Flinn, and Arun A. Ross. Handbook of Biometrics. New York: Springer. Web. 5 Dec  Phillips, Jonathon P., Alvin Martin, C. L. Wilson, and Mark Przybocki. "An Introduction Evaluating Biometric Systems." Computer 33.2 (2000): IEEE Xplore. Web. 5 Dec  