Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
BioLynx, Inc.™ Biometrics and Enrollment. Overview Biometrics Hand Geometry and templates Enrollment Command Mode.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
By: Monika Achury and Shuchita Singh
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Jim Parson Secure Systems Administration. History Babylonian business transactions included fingerprints 500 B.C. Chinese - tracked young children 14th.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
BIOMETRICS VOICE RECOGNITION. Meaning Bios : LifeMetron : Measure Bios : LifeMetron : Measure Biometrics are used to identify the input sample when compared.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Biometrics : From Yesterday to Tomorrow
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
بیومتریک تهیه کننده : احمد محمدی نام مدرس : استاد حسین زاده.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Biometrics and Standards ITU-T Technology Watch Report December 2009.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics Group 3 Tina, Joel, Mark, Jerrod

Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics Automated methods or recognizing a person based on a physiological and behavioral characteristics Derived from the Greek words bios (life) and metron (to measure) Derived from the Greek words bios (life) and metron (to measure)

A Little History First known example was in China in the 14 th century in the form of fingerprinting First known example was in China in the 14 th century in the form of fingerprinting Chinese merchants began stamping children’s palm prints and footprints in order to distinguish the young children from one another Chinese merchants began stamping children’s palm prints and footprints in order to distinguish the young children from one another

“Bertillonage” (a method of body measure) “Bertillonage” (a method of body measure) Started in 1890’s Started in 1890’s Alphonse Bertillion developed “Bertillonage” in order to fix the problem of identifying criminals. Alphonse Bertillion developed “Bertillonage” in order to fix the problem of identifying criminals. Thus, turning Biometrics into a distinct field of study Thus, turning Biometrics into a distinct field of study

How does it work? Step 1 = Capture Step 1 = Capture A physical or behavioral sample is captured by system during enrolment A physical or behavioral sample is captured by system during enrolment Step 2 = Extraction Step 2 = Extraction Unique data are extracted from the sample and a template is created; unique features are then extracted by system and then turned into mathematical code; template is then stored Unique data are extracted from the sample and a template is created; unique features are then extracted by system and then turned into mathematical code; template is then stored

Step 3 = Comparison Step 3 = Comparison Template is then compared to new sample; computer algorithm normalizes captured biometric signature; biometric data are then stored as the biometric template for that person Template is then compared to new sample; computer algorithm normalizes captured biometric signature; biometric data are then stored as the biometric template for that person Step 4 = Match / Non-match Step 4 = Match / Non-match System decides whether the features extracted from the new sample are a match or a non-match with the template; if so, the person’s identity is confirmed System decides whether the features extracted from the new sample are a match or a non-match with the template; if so, the person’s identity is confirmed

A Video! - SciQ - - SciQ - - SciQ - SciQ -

Types of Biometrics PHYSICAL PHYSICAL BEHAVORIAL BEHAVORIAL Behavioral biometrics are generally used for verification while physical biometrics can be used for either identification or verification.

PHYSICAL Bertillonage - measure body lengths (no longer used) Bertillonage - measure body lengths (no longer used) Fingerprint – analyzing fingertip patterns Fingerprint – analyzing fingertip patterns Facial Recognition – measuring facial characteristics Facial Recognition – measuring facial characteristics Hand Geometry – measuring the shape of the hand Hand Geometry – measuring the shape of the hand Iris Scan - analyzing features of colored ring of the eye Iris Scan - analyzing features of colored ring of the eye Retinal Scan – analyzing blood vessels in the eye Retinal Scan – analyzing blood vessels in the eye Vascular Patterns – analyzing vein patterns Vascular Patterns – analyzing vein patterns DNA – analyzing genetic makeup DNA – analyzing genetic makeup

BEHAVORIAL Speaker Recognition – analyzing vocal behavior Speaker Recognition – analyzing vocal behavior Signature – analyzing signature dynamics Signature – analyzing signature dynamics Keystroke – measuring the time spacing of typed words Keystroke – measuring the time spacing of typed words

Two Major Uses Verification Verification Identification Identification

BIOMETRIC FUTURE The future of biometrics holds great promise for law enforcement applications, as well for private industry uses. The future of biometrics holds great promise for law enforcement applications, as well for private industry uses.

QUESTIONS or COMMENTS