Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
(Biometrics Consortium)
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Biometrics Technology Jie Meng. What is Biometrics ? Biometrics is the science and technology of measuring and analyzing biological data. In information.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
The Role of Computers in Surveillance ~ Katie Hatland.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Biometrics.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Biometric Technologies
Biometrics: The Future of Security Peter Bruno Lucy Gong Jared Layne Supriya Sundaram.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
SUBMITTED BY ATHIRA BALAKRISHNAN
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett

How does Biometrics Work? What are the different types of Biometrics? Who uses Biometrics and why? What are the moral, ethical, and legal aspects? What are the benefits and disadvantages of Biometrics?

 Biometrics is the science and technology of measuring and analyzing biological data.  In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.  Biometric devices, such as fingerscanners, consist of:  A reader or scanning device  Software that converts the scanned information into digital form and compares match points  A database that stores the biometric data for comparison

☼Fingerprint Recognition Solution based on Physiological factors Typically used by Police, Immigration ☼Iris Recognition Solution based on Physiological factors Typically used in private security/increasingly used with law enforcement ☼Face Recognition Solution based on Physiological and Behavioral factors Used private, public such as airports, public throughfares ☼Hand Geometry Recognition Solution based on Physiological factors/Geometry on Hand Used Privately, Government, growing media

 Person is required to be physically present to gain access  Biometric techniques eliminate the need to carry PIN’s, ID cards, Tokens  High Security Applications may require more than one Biometric system at once, these are called “Multimodal Biometric Systems”  Replacing time punch cards with a Biometrics system can ensure employee is present as well as time-stamp  Can’t lose finger, face, voice, eye very easily or leave them at home  Voice recognition allows for positive identification over telephone

 The biggest concern regarding the use of Biometrics is the issue of violation of privacy. People who are subjected to a biometrics scan or reading generally feel that such procedures are physically invasive, especially if they involve reading of body parts.  Another concern is the issue of information security. Biometric readings are often stored in a database that can be accessed by the employer or government agency. Questions have been raised regarding the use of information obtained through biometric systems. Such information may include very private information such as medical histories and bank accounts.  Since biometric technology is so new, there are very few laws that specifically address its use and application.

 Biometric identification systems are commonly used when granting or denying access to secured areas or information. Biometric technology is also commonly used for:  Immigration- confirming the identity and immigration status of a particular alien (the Secure Communities Program uses fingerprint technology to identify and deport certain classes of illegal aliens)  National security concerns- identifying potential terrorists  Various health service applications- for example, accessing records, maintaining medical files, storing pharmaceutical and medical histories, etc.

 The solutions only needs for the user to possess a minimum of require user knowledge and effort. A biometric solution with minimum user knowledge and effort would be very welcomed to both the purchase and the end user. But, keep in mind that at the end of the day all that the end users care about is that their computer is functioning correctly and that the interface is friendly, for users of all ability levels.