Download presentation
Presentation is loading. Please wait.
Published byDarleen Goodwin Modified over 8 years ago
1
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to storing your data at a blood bank. Biometrics are unique from person to person, making it a good tool to use for identification.
2
Table of Contents What is it? Advantages Types of scanners Fingerprint Retina Iris Security issues Uses
3
What is it? Automated methods of recognizing a person based on unique physical characteristic Fingerprints Hand Geometry Handwriting Iris Retinal Voice Very difficult to reverse engineer or steal
4
Advantages of Biometric Scanning More secure than password or PIN No need to remember password or PIN No need for a token or key card to gain access Adding a new person is easy
5
Fingerprint Sensing Everyone has a unique fingerprint Even among identical twins 140 years of research, and no two have ever been found to be alike Easy to build and install, which makes them cheap http://www.askdavetaylor.com/wp-content/uploads/2015/06/hp-elitebook-folio-1020- fingerprint-scanner-800x417.jpg http://www.bayometric.com/media/catalog/product/ cache/1/image/9df78eab33525d08d6e5fb8d27136e95/l /u/lumidigm_v-series-sensor-v30x-usb-fingerprint- scanner.jpg
6
How does a fingerprint scanner work? Image comparison Capture image of fingerprint and compare ridges and crests to a pre- scanned image Create binary map of ridges and crests Use CMOS to measure capacitances Ridges and crests differ in height so capacitance is different Compare to saved “image” of fingerprint http://www-micro.deis.unibo.it/~tartagni/Finger/cell_lr.gif
7
CMOS Scanner Uses array of capacitive sensors along with a microprocessor Ridges and crests create electrical signals based on capacitance Signals are processed and interpreted to create a digital image of the fingerprint Much harder to fool than image fingerprint sensor Person must be present for signals to be generated properly http://g01.a.alicdn.com/kf/HTB10JzlHVXXXXa8XXXXq6xXFXXXt/-font- b-Fingerprint-b-font-font-b-module-b-font-font-b-fingerprint-b-font.jpg http://www.ntt.co.jp/RD/OFIS/active/2005pdfe/hot/img/ct03.gif
8
Retina Sensing Retina is made up of a network of blood vessels in the back of the eye Everyone has a unique and different retina Typically remains unchanged during a person’s life Diabetes, glaucoma, and retinal degenerative disorders can change it http://www.aao.org/image.axd?id=0f878257-588b-43d1-a7a7- 7c17e9610093&t=635859497175800000
9
Retina Sensing Scanner casts infrared light into the eye Traces path of blood vessels Reflection is encoded and stored as a binary map “Image” is compared with pre-scanned image Takes about 15 seconds of careful concentration Used in medical world frequently AIDS, syphilis, malaria, chicken pox, leukemia, lymphoma, and sickle cell can be seen in the eyes Congestive heart failure, atherosclerosis, and cholesterol issues first appear in the eyes More secure than fingerprint
10
Iris Sensing Thin, circular structure in the eye Acts as the aperture, controlling how much light is let in through the pupil Colored part of the eye Every iris is unique from person to person More secure than both fingerprint and retina scanning Deteriorates very quickly once removed from the body Much faster and more accurate than retina scanning Iris doesn’t change during a person’s life https://s-media-cache- ak0.pinimg.com/236x/57/ef/8d/57ef8d0749a1992b 9db0c6b4b1be8898.jpg https://lh5.googleusercontent.com/o7cR_JiweR37zqgYcBoP2dnwV yWjGa2lONKfaFXaEXOGocy9iQn_hL2z42kjqnx- bCMnbxncS_s0h5nJIDPIb1IB859ji1YIwTYJATghv57M3Syex4lfVN 8Xp2J1YbHe9U6g
11
Security Issues Can be considered invasive to privacy Facial recognition on security cameras Person is basically under surveillance all the time Stolen data from data centers Credit card can be replaced Good luck replacing or changing your iris Thieves cutting off a finger to gain access or steal a car Rapid-fire camera developed by Carnegie Mellon University Funded by Department of Defense Facial recognition on an entire crowd Law is not yet able to handle most of these issues No court has said whether or not law enforcement can collect this data without the knowledge of the person Extremely useful and helpful but poses a large security risk
12
Uses Cell phones Laptops Access Airports Cars Blood Bank Schools http://i.dailymail.co.uk/i/pix/2012/02/17/article-0- 11C5E3C4000005DC-346_468x286.jpg https://i.ytimg.com/vi/1TMGl- 09Ozk/maxresdefault.jpg http://blog.m2sys.com/wp- content/uploads/2015/08/Woodoo_WD800_women.j pg http://www.v3.co.uk/IMG/367/297367/vein-scanner.jpg
13
Summary Very useful in technology today Fingerprint is the most widely used Most research has been done Uses capacitance in the ridges and crests to generate signals Biometrics are used in a wide variety of applications Still more work to be done in the law to standardize
14
References http://www.bioelectronix.com/what_is_biometrics.html http://www.ievoreader.com/biometrics-explained http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=16 http://blog.m2sys.com/biometric-hardware/iris-recognition-vs-retina- scanning-what-are-the-differences/ http://www.scientificamerican.com/article/biometric-security-poses-huge- privacy-risks/ https://www.fbi.gov/about-us/cjis/fingerprints_biometrics/biometric-center- of-excellence/files/face-recognition.pdf http://nextbiometrics.com/products/the_next_advantage/ http://www.globalspec.com/learnmore/semiconductors/sensor_ic/biometric_ sensors http://www.securityworldmag.com/tech/tech_view.asp?idx=1156&part_code =030170070&page=1 http://blog.m2sys.com/guest-blog-posts/5-ways-biometric-technology-is- used-in-everyday-life/ http://whatis.techtarget.com/definition/capacitive-scanner
15
Five Key Points Biometric sensing is an automated method of recognizing a person based on unique physical characteristic Much more secure than a password or pin Fingerprint scanning uses capacitance from the ridges and crests on your finger to generate signals which are stored Very difficult to reverse engineer or steal 140 years of research has been done in the area of fingerprints and no two have ever been found to be alike – even among identical twins
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.