Management 345 Topic Project Topic: Biometrics. Group Members Jason Lang Jason Lang Kasey Minor Kasey Minor Christopher Doub Christopher Doub Eric Pulley.

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

Biometric Onno W. Purbo Biometric Measurable physiological and / or behavioural characteristics that can be utilised to verify the identity.
Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Mentor: Mr. Roland Foster.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
Biometrics in Education Biometrics Summit July 2006.
By: Monika Achury and Shuchita Singh
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Biometrics: Identity Verification in a Networked World
Financial Services & Electronic Banking Ch PoB 2011.
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Registration systems in Migration Management
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics: The Future of Security Peter Bruno Lucy Gong Jared Layne Supriya Sundaram.
WELCOME.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
TOPIC: AUTHENTICITY CREATED BY SWAPNIL SAHOO AuthenticityAuthorisation Access Control Basic Authentication Apache BASIC AUTHENTICATIONDIGEST ACCESS AUTHENTICATIONDHCP.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Retinal & Iris Scanners
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Technical Devices for Security Management Kathryn Hockman COSC 481.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
Diane DiLorenzo Cosc 101 section 7
Challenge/Response Authentication
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
State of e-Authentication in Higher Education Bernie Gleason
Global Biometric System Market : Trends, Forecast, and Opportunity Analysis 1.
Two Way Authentication
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Management 345 Topic Project Topic: Biometrics

Group Members Jason Lang Jason Lang Kasey Minor Kasey Minor Christopher Doub Christopher Doub Eric Pulley Eric Pulley

Introduction to Biometrics Definition: methods of using the human body to identify or verify an individual. Definition: methods of using the human body to identify or verify an individual. Increases level of security for data security & access control. Increases level of security for data security & access control. Ex: Cell Phones, Computer Networks, ATMs Ex: Cell Phones, Computer Networks, ATMs Higher level of security is necessary. Higher level of security is necessary.

History of Biometrics Branch of biology that deals with data statistics and all biometric information saved in a particular database. Branch of biology that deals with data statistics and all biometric information saved in a particular database. Data embedded cards Data embedded cards Fingerprint scanning Fingerprint scanning Facial geometry analysis Facial geometry analysis Hand Dimensions Hand Dimensions

History Cont. Iris Scanning Iris Scanning Retina Scanning Retina Scanning Handwriting: oldest type of biometric. Handwriting: oldest type of biometric. Effective Effective 2 types: Static & Dynamic 2 types: Static & Dynamic

Current Applications Schools Schools Global use Global use ID Cards ID Cards Passports Passports Fingerprinting Fingerprinting Retina Scan Retina Scan Iris Scan Iris Scan Voice Authentication Voice Authentication Facial Recognition Facial Recognition Handwriting Handwriting Military Use Military Use

State of the Art Biometrics Most Advanced or Up-to-Date Most Advanced or Up-to-Date Rapidly Expanding Rapidly Expanding Biometric Passports Biometric Passports Doorkeeper 7.0 Doorkeeper 7.0 Biometrics in Banks Biometrics in Banks More Secure Verification of IndividualMore Secure Verification of Individual ATMs and Smart CardsATMs and Smart Cards

Conclusion Security upgraded with biometrics Security upgraded with biometrics Security is a top area on businesses agenda Security is a top area on businesses agenda Biometrics address problems of current security levels. Biometrics address problems of current security levels. Reduces Theft (Identity) Reduces Theft (Identity) Upgrade of security is necessary. Upgrade of security is necessary.

References df df menu=4&displayPage=402 menu=4&displayPage=402 Filippini, Steve. “Biometrics 101.” Oct. 2005, Vol. 23 Issue 10, p36-42, 4p, 2c. EBSCOhost academic premier. Southern Illinois University Carbondale Morris Library. 8 April, hid=13&sid=4ac3f81c-226d-49a1-aace- 1560b650fb7d%40sessionmgr2 Filippini, Steve. “Biometrics 101.” Oct. 2005, Vol. 23 Issue 10, p36-42, 4p, 2c. EBSCOhost academic premier. Southern Illinois University Carbondale Morris Library. 8 April, hid=13&sid=4ac3f81c-226d-49a1-aace- 1560b650fb7d%40sessionmgr2