Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Biometrics and Authentication Shivani Kirubanandan.
Going beyond passwords
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Physical Security Secure the room Secure the machine – 6 ways.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Challenge/Response Authentication
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Input Devices.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated methods of verifying/recognizing the identity of a living person based on physiological or behavioral characteristics. Such characteristics are fingerprints, facial images, iris prints, and voice recognition.

The Basics of Biometric Devices Much like passwords, biometric devices have an enrollment and verification process. You must first let the device have a record of what will be used to be authenticated. Uses personally identifiable information. This includes your fingerprint, iris, voice, or face. Devices are publically available to anyone with money. It is possible to purchase a biometric scanner of any sort to suit your security needs.

Fingerprint scanners are used in a variety of devices now-a- days Fingerprint scanners are used in a variety of devices now-a- days. Most newer smartphones and laptops have them already built in, but you may also purchase them for your computer. Pros: Unique Identifier Quick enrollment Quick authentication Culturally accepted Cons: Injuries can affect authentication Storage of fingerprint algorithm may be replicated Personal identity used vs. passwords/PINs Fingerprint Scanners

Iris scanners are much like fingerprint scanners, but slightly more secure, and complex. Enrollment usually takes a little longer than fingerprint scanners. Enrollment usually takes a digital picture and infrared/night vision picture. Pros: Iris is protected, and not commonly disfigured Patterns/textures stay the same for decades Cons: Poor digital images affect enrollment and authentication process Distance to scan iris may affect authentication User needs to stay still Iris Scanners

Facial recognition is another camera-based authentication much like iris scanning. However, it is not widely used for account or information security. In most cases, facial recognition is used in public places by security or law enforcement officials. Facial recognition can be used to pinpoint a wanted felon or suspected terrorist out of a group people. Pros: Picking people out of a crowd Securing minimally important information Cons: Twins? Picture of authenticated user bypass Facial Recognition

Voice recognition has came a long way in recent years Voice recognition has came a long way in recent years. Most of it is used for Speech-to-text services like Google, Siri, Cortana, automated call centers, Xbox, and PlayStation. Not widely used for security. Voice recognition programs search from patterns detected in speech, tone, frequency, and use artificial neural networks. Pros: Hands-free use for multiple devices Good for typing-handicapped people Cons: Background noise can interfere Voices can be recorded; bad for security Voice Recognition

Radio Frequency Identification (RFID) Chips are used for multiple devices and objects, to identify and track them. NBC Predicts that in 2017, most humans will be implanted with RFID chips that contain all of our personal data, such as fingerprints, facial data, iris data, name. address, etc… Not a lot of people like the idea… RFID Chips

Biometric Impact on society Biometric devices are mostly used for identification and security. Places with a need for high security use biometrics to protect sensitive information or materials from being exposed to the public. Public places use biometric technology to monitor and track people; certain public places may be scanning for wanted criminals. Helps people authenticate themselves to use certain devices without the need for a password or pin, no need to remember such things. Has some personally identifiable information privacy concerns. (Can our PID be hacked and stolen? [or even used against us].) Biometric Impact on society

Almost all biometric technologies are already in place, or developed, but most of these technologies have room to improve. New(ish) biometric technologies could be: the use of thermal imagining scanners, hand geometry scanners, signature recognition, type-behavioral patter recognition, internet usage patterns, and DNA and vein pattern scanners. The more biometrics improve, the more controversy surrounding privacy will arise. Future of Biometrics

Drawbacks of biometrics Biometric devices are still under-developed, so most of these technologies have flaws concerning quality of performance, and questionable methods of storing personally identifiable information. Privacy issues concerning use of facial recognition technology in public places and on the internet. It would suck to have RFID chips forcefully implanted in us. Drawbacks of biometrics

References https://en.wikipedia.org/wiki/Biometric_device http://www.idcontrol.com/keystroke-biometrics/biometric-authentication-method-pros-and- cons http://www.explainthatstuff.com/how-iris-scans-work.html http://blog.atlasrfidstore.com/what-is-rfid-used-for-in-applications http://humansarefree.com/2015/03/nbc-reports-americans-will-receive.html http://blog.m2sys.com/guest-blog-posts/how-biometrics-is-bound-to-become-a-key-part-of- your-life-in-the-near-future/ References

Biometrics No passwords are used Stored information has a potential to be hacked and stolen/used Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated methods of verifying/recognizing the identity of a living person based on physiological or behavioral characteristics. Such characteristics are fingerprints, facial images, iris prints, and voice recognition. RFID chips can hold information such as fingerprints, facial data, blood type, address, etc… Iris scanners, are highly secured, but a lot of memory and data has to be stored, and is intrusive. Facial recognition is mostly used in public places to track and identify people, and if you’re a wanted felon or suspected terrorist, you may be confronted. Fingerprint scanners are the most widely accepted and used type of biometric security devices. They are in a multitude of devices now-a-days. Voice recognition is used is a multitude of devices now-a-days