Customer Dr. Beigi, Recognition Tech., Inc Hugh Eng, DPS ‘16 Dr. Tappert, CSIS Vinnie Monaco, PhD’15 Smartphone/Laptop Security Acceptability/Ease-of-Use.

Slides:



Advertisements
Similar presentations
2.06 Understand data-collection methods to evaluate their appropriateness for the research problem/issue.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.
BIOMETRIC VOTING SYSTEM
ISECON 2011 A Decade Review of a Masters-Level Real-World-Projects Capstone Course Charles Tappert and Allen Stix Pace University, New York.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
PALM VEIN TECHNOLOGY.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Biometrics: Voice Recognition
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
JOINT BUY VALUE PROPOSITION TEST (BASED ON CUSTOMER INTERVIEW)
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Authentication Approaches over Internet Jia Li
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Confidential and proprietary to U.S. Bank 1 Corporate Payment Systems Adwebportal Training.
MULTIMEDIA What is Multimedia? The word MULTIMEDIA is made up from two words, MULTI meaning more than one and MEDIA meaning a way of displaying or passing.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Smart Homes TAJINDER SINGH CSC 490. Smart Home What is a Smart Home?
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Login on Laptop, Server or Internet Platform: The user will get a display on his screen of a randomized series of figures. He will subsequently.
Introduction to CBIRF and Biometrics Frank Yeong-Sung Lin Department of Information Management National Taiwan University EMBA 2009 – Information Systems.
Lecture 7. The Questions: What is the role of alternative assessment in language learning? What are the Reasons.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Conducting Usability Tests 4 Step Process. Step 1 – Plan and Prep Step 2 – Find Participants Step 3 – Conduct the Session Step 4 – Analyze Data and Make.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
ISECON 2011 A Decade Review of a Masters-Level Real-World-Projects Capstone Course Charles Tappert and Allen Stix Pace University, New York.
Speaker Verification System in a Security Application HŪDATBrian Bash Thomas Jonell Dustin Williams Advisor Dr. Les Thede.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometric for Network Security. Finger Biometrics.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Oman College of Management and Technology Course – MM Topic 7 Production and Distribution of Multimedia Titles CS/MIS Department.
BIOMETRICS.
Login on Laptop, Server or Internet Platform: The user will get a display on his screen of a randomized series of figures. He will subsequently speak.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
A Study of the Channel Mismatch Problem in a Multimodal Face-Voice Biometric Access System FALLON SARATOVSKY, TODD EDWARDS, RICH KUITERS, HUGH ENG, AND.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
11 Interviews. 11 Interviews Objectives Explain the purpose of gathering background before an interview. Create interview questions and topics based.
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
How to Protect Yourself from ID Theft and Social Engineering
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
State of e-Authentication in Higher Education Bernie Gleason
Seminar Presentation on Biometrics
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
Pace University IT691/Fall 2015
Presentation transcript:

Customer Dr. Beigi, Recognition Tech., Inc Hugh Eng, DPS ‘16 Dr. Tappert, CSIS Vinnie Monaco, PhD’15 Smartphone/Laptop Security Acceptability/Ease-of-Use Study Team Members Jimmy Leon George Chacko Emmanuel Ruiz Daniel Weise

Description of Project ●Project is a continuation from last semester. ●Main objective of this project is usability studies to evaluate the acceptability and the ease-of-use of two or more biometric prototype systems. ●The evaluations were obtained through interviews and surveys. ●Conducted study, and analyzed the results. Recognition Technologies, Inc. will allow us to use their proprietary facial and speaker verification systems for these studies.

 How often do you access a website that requires a login?  How valuable and sensitive is the information that will be stored in this website?  Do you really want to remember yet another password (“YAP”) so should I use an existing one?  How quickly do you want to do any particular transaction on a website, so do I even care what my password is right now?

What is Multimodal Biometrics???? Biometrics refers to technologies that measure and analyze human body characteristics. Multimodal biometric authentication merge two or more of these factors for improved security. In this project, we will be experimenting with this type of authentication system designed by Dr. Beigi of Recognition Technologies, Inc.

How is voice recognition used in biometrics? Voice recognition technology utilizes the distinctive aspects of the voice to verify the identity of individuals. Can utilize any audio capture device – including phones and PC mics Dr. Beigi’s technology only uses about 8 secs of a spoken sentence (during enrollment the system records 60 secs of audio)

How does facial recognition work Recognition is performed by frontal portrait face detection and recognition, to be used as a biometric. Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns. Facial recognition systems based on faceprints can quickly and accurately identify target individuals when the conditions are favorable. However, if the subject’s face is partially obscured or in profile rather than facing forward, or if the light is insufficient, the software is less reliable.

The Video Recruited a communication student (Masters program) to assist with the shooting 2 Camera angles Side view (of the user) Over the shoulder shot of the system Use of a child – to show ease of use Spoofing the system Change in physical appearance (Facial hair) Using a video Exchanging pins Team 2 Multimodal biometric authentication

Product Assessment & Features

The Surveyors  Our Target was 200 responses  We sent the survey out to 400+ friends and family as well as posted on social media  It was also sent to fellow capstone students and DPS students  We were only able to get 104 responses back (which was more than double from last year)

Our Findings This Bar graph displays result when respondents were asked how convenient the audio and visual biometric verification system to be. The majority of the survey pool found the technology to be somewhat convenient (47%) followed by extremely convenient (30%) and neutral (17%). Based on the overview and evaluation of this system, we find that biometric verification is viewed to be convenient by the public. This Bar graph displays how secure the audio and visual biometric verification appeared to the surveyors. The majority found it to be secure with 49% followed by 32% rating it as being very secure. This is often the main topic when it comes to how secure this type of security can be and what it can be trusted with. By means of our audience showing that most of them believe it to be secure, it shows how willing society is in accepting and feeling comfortable with biometric verification.

Our Findings cont. When users were questioned on the perceived delay time between the biometric verification and the system granting access to the user, 56% did not feel there was a significant delay in the time, where the system was being a hindrance. However, 44% of the surveyors did find that there was a significant lag between the two sequences. During testing, it was determined that access was either granted or denied rather quickly but the actual perceived delay was caused by the mechanical door lock solenoid. This Bar graph displays the question of how much delay would be acceptable for a user to still adopt a biometric system. This chart shows surveyors would be ok having a delayed response for higher security. Most of the surveyors preferred lesser authentication times, however, for sensitive information such as medical records, border crossing and banking information some surveyors did prefer a slower and more robust authentication system.

Our Findings cont. The question was posed as to whether society was ready for the adoption of a biometric system. In the previous semester’s survey, the respondents were split equally 50/50 on this matter but interestingly, this year, acceptance grew with 68% of the users willing to switch from a user- password combination to a biometric authentication system The question was asked to the survey pool whether a biometric system was acceptable for use with children at home, school, home and school or not at all. The majority (56%) of respondents stated it was acceptable at home and school. 22% determined it was not an acceptable method for use with children.

Lastly The respondents also agreed that a biometric authentication system with or without a pin code was more desirable than the use of a username/password or no security in place as all with regards to ease-of-use, convenience and security

Final Thoughts and Interesting tidbits ●Threshold ○Can be raised and lowered ■At only 20% Jimmy and Manny were able to use each others pin/facial/audio ■At 45% they were not able to spoof the system ●Spoofing the System ○Not able to use recorded audio/video ○Mustache and other add-ons did throw the system off ○Background music and audio was not an issue during authentication

WHAT IS THE FUTURE OF BIOMETRICS The user is the password 68% of the surveyors felt we are ready to take on Biometrics – this is double the positive response from last semester. There are studies that suggests the top four biometrics preferences are due to the current technologies on cell phones, tablets and laptops which already integrates biometrics security technologies. Border crossing and international travel can be revolutionized by this technology