FIT3105 Semester 1 - 20111 Research in Digital Identification and Authentication Systems Lecture 12.

Slides:



Advertisements
Similar presentations
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Advertisements

Biometric Onno W. Purbo Biometric Measurable physiological and / or behavioural characteristics that can be utilised to verify the identity.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
FIT3105 Smart card based authentication and identity management Lecture 4.
FIT3105 Security and Identity Management Lecture 1.
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.
Restricted © Siemens AG 2013 All rights reserved.siemens.com/answers Multifactor Iris Recognition Biometric Reader.
Karthiknathan Srinivasan Sanchit Aggarwal
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6 BIOMETRICS.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometric Authentication in Infrastructure Security By: John Armington, Purdy Ho, Paul Koznek and Richard Martinez G. Davida, Y. Frankel and O. Rees (Eds.):
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
UNIT 15 WEEK 3 CLASS 2 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Hoda Jannati School of Computer Science
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Module 1 4 th November, Module 1 4 th November, 2010 Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain.
Access Control / Authenticity Michael Sheppard 11/10/10.
Physical security By Ola Abd el-latif Abbass Hassan.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Information Systems Design and Development Security Precautions Computing Science.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
3D Password.
COMP 2903 A9 – National ID: Biometrics Pinned to Social Secuiry Cards Danny Silver JSOCS, Acadia University.
Diane DiLorenzo Cosc 101 section 7
Challenge/Response Authentication
Athina Antoniou and Lilian Mitrou
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
COEN 351 Authentication.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

FIT3105 Semester Research in Digital Identification and Authentication Systems Lecture 12

FIT3105 Semester Reason for research in DIS Research in smart card technologies Research in biometric technologies –Finger print –Iris scan –Face recognition –Others Research in design and implementation Research in defence system Outline

FIT3105 Semester Research in smart card technologies and applications: –Smart cards will become the most commonly used devices. –Especially they are important for DIS issues/smart-cards/smart-cards-a-t-archive.html Research in Smart Card Technologies

Research in Biometrics Biometrics for DIS is important, however there can be frauds biometric-identification.html FIT3105 Semester

Research in Biometric Face Recognition Research in face recognition for id system: –Face recognition techniques have been improved and new ones have been invented. –It is a very desirable area for DIS. video-ID-system/ _ html FIT3105 Semester

Research in Biometric Iris Scan Many DIS developers prefer Iris biometric over finger print. However, more work needs to be done in order to achieve better outcome. FIT3105 Semester

Research in DIS Design and Implementation The design and implementation are the main parts of any DIS. There must be good research to improve these parts ( en&rlz=1G1ACAW_ENAU410&q=design+of+na tional+id+system&btnG=Google+Search&aq=f&a qi=&aql=&oq=) FIT3105 Semester

Research in Defence Systems for DIS DIS’ main attacks are –DoS attacks –Man-in-the-middle attacks –Unauthorised access to DIS –Wireless security attacks All these require a lot of research to be able to provide good security. Some of research work related to DIS can be found at ( html) FIT3105 Semester

Other sources http: // topics-identity-systems-and-identity-cards FIT3105 Semester

Conclusion DIS can be considered as the most expensive and sophisticated digital system. Best technologies should be used for DIS. DIS’ goals cannot be achieved without good research in many related fields. Well-researched DIS lasts longer and is more effective. FIT3105 Semester