BIOMETRICS.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC VOTING SYSTEM
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Using Biometrics in Crime Prevention Presented by American Crime Prevention Institute.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Retinal Scanning Biometrics Presentation by Ajinkya Bhave 30 th April, 2003.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6 BIOMETRICS.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Physical Security Secure the room Secure the machine – 6 ways.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
A Seminar Report On Face Recognition Technology
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

BIOMETRICS

____________________________________________________ What is Biometrics? ____________________________________________________ Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic.  Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics Next

BIOMETRIC CHARACTERISTICS FINGERPRINTS HAND GEOMETRY HAND WRITING IRIS RETINAL VOICE FACIAL Chart

FINGERPRINTS The most widely used and least expensive biometric technology is fingerprint scanning A fingerprint is made of a series of ridges and furrows on the surface of the finger. Everyone is known to have unique, immutable (unchangeable) fingerprints. This has 1/1000 misidentification rate and is used in medium security facilities. Relatively high accuracy rate. Characteristics

HAND GEOMETRY Every hand is unique due to its length, width, and thickness. A scanner takes 90 measurements of the hand that are three-dimensional - all in just one second. The scanner then stores all this data The misidentification rate is 1/700 it’s used in low security buildings. Characteristics

HANDWRITING A user writes a name or word on the screen of the PDA. Functions are provided to capture that handwriting, extract the relevant features, and compare two different samples. Misidentification 1/100 low security facilities. Characteristics

IRIS RECOGNITION Characteristics Iris recognition is technology based on individual iris patterns. The iris, a thin interior eyeball membrane, is comprised of extremely complex patterns. The patterns are unique and virtually impossible to imitate. Iris patterns are stable within a year of birth, and remain the same for life. The iris has a misidentification rate of 1/1,200,000. Iris recognition is used in high-security facilities Characteristics

RETINAL Based on blood vessel patterns at the back of the eye. Captured by an individual looking through a reticule where a low-intensity light source is shone through the pupil to illuminate the retina. Involves 360º circular scan, taking 400 readings. Generally used for high-end security applications, primarily for physical access control. Characteristics

Voice Recognition Voice recognition uses a neural net (relating to) program to recognize your voice. Works on the physical characteristics of one’s voice. The user would dictate text fluently into the computer. Banks are starting to use this technology, instead of dialing in a pin # you would speak and the computer would recognize your voice. Misidentification1/30 low security Characteristics

FACIAL RECOGNITION Analyzes images of the human face for the purpose of identifying them. This program takes a facial image, measures the characteristics such as the distance between the eyes, length of the nose, and the angle of the jaw, and create a unique file called a template. The technology hasn’t proved reliable. Misidentification 1/100, low security facilities. Characteristics

Next

By the year 2004 biometrics will increase 100%. Next

Why Biometrics? Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. Biometrics is expected to be incorporated in solutions to provide for homeland security. This would include airport security, strengthening our borders, travel documents and preventing ID theft. Utilizing biometrics for personal authentification is becoming convenient and considerably more accurate than current methods (remembering pins and passwords). This is because biometrics links the event to a particular person and is convenient because there is nothing to carry around and remember. Next

GROUP 4 JOE IVY BAO SUSAN MARK