Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
BIOMETRICS. SCOPE Biometrics – Still an Evolving Technology Biometrics – Past and Present How It Works? Machines for Bio Measurements Future Aspects Benefits.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
BIOMETRICS THE MAN MACHINE INTERFACE
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Review Future Technology. Definition Biometrics refers to technologies used to detect and recognize human physical characteristics.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
Diane DiLorenzo Cosc 101 section 7
Biometrics.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Campbell’s Security Co. ™
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Identification and Biometrics By Jay Eichler

Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy Controversy Interview Interview My thoughts My thoughts Conclusion Conclusion

What is Biometrics? Technique of studying physical characteristics of a person such as: Technique of studying physical characteristics of a person such as: fingerprints, voice, DNA, eyes, face, hand fingerprints, voice, DNA, eyes, face, hand Greek for life and measure Greek for life and measure Science and technology of authentication Science and technology of authentication by measuring: by measuring: physiological features physiological features behavioral features behavioral features

Common Biometrics Methods Fingerprinting Fingerprinting Voice Recognition Voice Recognition DNA Fingerprinting DNA Fingerprinting Retinal Scanning Retinal Scanning Iris Scanning Iris Scanning Face Recognition Face Recognition Hand Geometry Hand Geometry

Fingerprinting Oldest successful method used Oldest successful method used Early 1800s Early 1800s Most commonly used method for: Most commonly used method for: Forensic evidence tool Forensic evidence tool May outperform DNA identification May outperform DNA identification Measure ridges and grooves Measure ridges and grooves Minutiae-based technique Minutiae-based technique Maps points Maps points Correlation-based technique Correlation-based technique Gray-scale representation Gray-scale representation others others

Voice Recognition or Voice Print the technology by which: the technology by which: sounds, words or phrases spoken by humans are: sounds, words or phrases spoken by humans are: converted into electrical signals converted into electrical signals signals are transformed into coding patterns signals are transformed into coding patterns identified by a computer identified by a computer Input commands Input commands Differentiate a person’s voice Differentiate a person’s voice

DNA Fingerprinting Examine DNA pair sequence Examine DNA pair sequence Near perfect accuracy Near perfect accuracy Used for: Used for: Forensic evidence Forensic evidence Heredity checking Heredity checking Family Family evolution evolution Future heath advances Future heath advances

Retinal Scanning Scans retina of eye Scans retina of eye Blood vessels behind eye Blood vessels behind eye first time used first time used Uncomfortable but accurate Uncomfortable but accurate Must be close to machine Must be close to machine Light in eye for seconds Light in eye for seconds Must hold head still Must hold head still Used in high security areas Used in high security areas

Iris Scanning Scans iris of eye Scans iris of eye Unique patterns of colors, rings, specks, etc Unique patterns of colors, rings, specks, etc Takes picture of eye Takes picture of eye Algorithm developed, first used Algorithm developed, first used Used in James Bond movie in 1980s Used in James Bond movie in 1980s Easy to use Easy to use Stand up to 2 feet away Stand up to 2 feet away Take a few seconds Take a few seconds Used by airports, prisons, banks Used by airports, prisons, banks

Face Recognition Scan person’s face Scan person’s face Measures certain features: Measures certain features: Jaw, noise, space between eyes Jaw, noise, space between eyes Not very accurate Not very accurate Very expensive Very expensive Used with other biometric devices Used with other biometric devices

Hand Geometry Analysis of a hand Analysis of a hand Uses metal surface Uses metal surface Small pegs Small pegs Somewhat accurate Somewhat accurate Every hand is not unique Every hand is not unique Use with small database Use with small database Small corporation Small corporation

Controversy Threat to privacy Threat to privacy Scanning face, eyes, fingerprints in public Scanning face, eyes, fingerprints in public Fear of new technology Fear of new technology Scenarios such as placing chip under skin Scenarios such as placing chip under skin May not be as accurate as thought May not be as accurate as thought Criminals using fake eyes, burning fingerprints, etc Criminals using fake eyes, burning fingerprints, etc Mistakes could be made Mistakes could be made Place innocent people in jail Place innocent people in jail DNA issues DNA issues evolution evolution

Interview Richard Ortiz Richard Ortiz Security Specialist Security Specialist Moody Air Force Base Moody Air Force Base 2 years 2 years Asked about: Asked about: Biometrics used Biometrics used His thoughts His thoughts

My Thoughts Great possibilities Great possibilities More in future More in future Make life easier Make life easier Less passwords Less passwords No keys No keys Safer future Safer future I do not think chips will be implanted in people I do not think chips will be implanted in people

Conclusion Biometric methods used for centuries Biometric methods used for centuries Most accurate form of identification Most accurate form of identification Many methods used Many methods used Great for crime fighting Great for crime fighting Great for security Great for security Promising future Promising future