Download presentation
Presentation is loading. Please wait.
1
Jenna Lutton February 26th, 2007
Biometrics Jenna Lutton February 26th, 2007
2
Roadmap Introduction to Biometrics Facial Recognition Iris Scanning
Fingerprint Scanning Palm-Vein Biometrics Behaviometrics Summary Questions
3
Introduction Biometrics – Use of physical characteristics to identify a person Two goals: Verification – Am I who I claim I am? Identification – Who am I? Future of security Border patrol ID Cards ATM access
4
Facial Recognition Compare a person’s face from a still image (or video capture) against a face stored in a database Two approaches: Geometric matching Distance between facial features Template matching Facial image – 2D array of pixel intensity values Compare against multiple templates of whole face
5
Issues Illumination Time Delay Pose Variation Facial Expression
Multiple faces in image Wearing glasses, etc.
6
Fingerprint Scanning Very popular method of authentication
Every person has unique fingerprint Scanner gets an image of your fingerprint Compares pattern of specific fingerprint features (minutiae) against another pattern in a database
7
Only finds adequate number of common minutiae patterns
8
Problems Some can be fooled by images of fingerprints
Some can be fooled by molds Mythbusters: Developing ways to bypass these: Scanner checks if cells are alive Scanner checks if blood flowing through finger
9
Iris Scanning Use infrared to capture an image of the iris (visible ring that surrounds the pupil)
10
Iris Scanning (cont.) Each eye has a unique iris, has measurable features (striations, pits, furrows) Controls the amount of light that enters the eye After an image of the iris is taken, a pattern or code is generated based on its features
11
Advantages Have to be present at scanner Non-invasive
Not affected by contacts or glasses More points of comparison
12
Palm-Vein Biometrics Veins are also unique among people
Uses near-infrared to identify all of the veins in your hand and captures that image
13
Advantages Change little with age
Hard to spoof – not all veins visible Sanitary – don’t have to physically touch the scanner Used today as extra security layer at ATM machines
14
Behaviometrics Using behavioral characteristics of a person to verify or identify a person Example: Identify a person by the way they type Analyze keystroke timing Determined by finger length, motor skills, etc. Example: Handwriting analysis Speed/rhythm of writing Sequence in which you form letters
15
Summary Biometrics revolutionizing security
Not all methods are reliable or secure Trying to find more ways to uniquely identify a person
16
Questions?
17
Sources http://www.iridiantech.com/index2.php
Early, Mark. “ARE Biometrics the Key to Data Security?” EContent; Sep2006; Vol. 29 Issue 7; Pg Hall, Kenji. “Biometrics: Vein Scanners Show Progress.” Business Week Online; Pg 22
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.