Download presentation
Presentation is loading. Please wait.
Published byAmice Parsons Modified over 9 years ago
2
Increase overall security Reduce plastic and paper waste Allow limited access over the phone, inside the bank, and at ATMs Insure trust in new clientele Modernize banks in the U.S. through technological advancements Be cost-effective
3
We propose that iris scanners are installed in ATMs to provide access to only members of the bank. When entering the building members must scan their eyes and provide a 10 digit code; members must scan themselves in and out of the building. Facial recognition will be used inside the bank 24 hours a day to increase security. When transactions are made over the phone, voice recognition services will be used.
4
Contact and glasses friendly Considered the most effective form of biometric identification Only 4% in trials weren’t correctly identified “…iris recognition uses camera technology with subtle infrared illumination to acquire images of the detail- rich, intricate structures of the iris. Digital templates encoded from these patterns by mathematical and statistical algorithms allow unambiguous positive identification of an individual. Databases of enrolled templates are searched by matcher engines at speeds measured in the millions of templates per second per (single-core) CPU, and with infinitesimally small False Match rates.” 1 Decreasing costs Increasing accuracy
6
A person’s unique iris patterns are complete by the time they are about 8 months old, and do not change later in life. There is no way to surgically alter the iris without damage to a person’s vision. No two irises are alike, not even in identical twins or in the right or left eye in the same person. When using a certain coordinate system iris images can be represented that are not affected by factors such as distance of eye from camera, pupil size, camera angles, and location of the iris in the image. Iris and computed iris code
7
Colored contacts or pupil-enlarging drugs can reduce the effectiveness of the scan Some scanners have been beat by holding up a very high resolution photo of an eye to the camera Watery eyes or debris on the surface of the eye can cause problems with the scanner
8
“Members of the Privium programme have been using iris recognition for border passage for the past ten years. This application is also used for the staff of companies located at Schiphol who require access to areas which are protected or are not open to the public. The countless numbers of people who work at the airport carry a Schiphol pass containing a unique photograph of their iris. The pass, combined with an iris scan, provides access to protected areas and makes it impossible for anyone to gain access to a protected area by using someone else’s pass.” http://www.schiphol.nl/B2B/SecurityInProgress/SuccessStory.htm
9
Doesn’t work well when/in; Poor lighting Profile (side) views The user is wearing sunglasses Objects covering individuals faces Low resolution images Varying facial expressions When the user is wearing hats or hoods This will serve as extra security to monitor the behavior of members of the bank and will keep track of suspicious behavior. Members must; Remove sunglasses when entering the building Allow their id picture to be entered into the bank database Remove hoods and hats when entering the building
10
A traditional facial recognition system will identify peoples faces by examining facial features such as; Size, position, and shape of: eyes, nose, mouth and cheekbones This information is taken and compared to a gallery of images. Algorithms can use two approaches when analyzing the facial features. One approach is geometry that looks directly at the distinguishing facial features. The other approach is photometric that captures a distil photo then translates it into values that are compared to values of other templates
12
“The man said his name was Erik Lopez and his birthday was Nov. 22, 1971, but Deputy Mark Eastty wasn't so sure. The man, a passenger in a car Eastty pulled over in February for expired tags, said he didn't have a driver's license. So the Pinellas deputy took the man's picture. He put the digital image into his laptop and ran it through software that sifted through 7.5 million jail mug shots. Within seconds, he had a hit. The man, it turned out, was Elisur Velazquez-Lopez of Clearwater. He was born in 1973. And he had an active warrant for failing to appear in court for a charge of solicitation of prostitution. Eastty took the man to jail. "If we had played the name game I could've been there 30 minutes," Eastty said. "If I take their picture, it'll take two.”” http://www.tampabay.com/news/publicsafety/crime/article1019492.ece
13
Fingerprint scanners? › Pros; No fingerprints exactly alike Scanners are cheap (some at only $50.00 US) › Cons; Scanners need constant cleaning Easy to beat if you know how Debris or scars on the hands can cause inaccuracy or no match DNA? › Pros; DNA has a 1 in 1 billion chance of being like someone else’s Cannot change or remove DNA › Cons; Can take days, even weeks to process Invasive process (requires blood, saliva, hair, semen, or other bodily fluid/tissue)
14
When calling the bank, a spoken PIN and password must be provided and compared to data on record in order for the member to access their account. It works by; A microphone records the users voice and a number of features are extracted to form a template or model of the users voice, basically the voice is translated into a format the computer can understand. It is then saved and new data is compared to what was saved on file. Always use same password and PIN number PIN number must also be entered into the phone’s dial pad
15
Computer reads and assigns numbers to; › Amplitude › Frequency › Tone › Rhythm And creates a “voice print” that is saved on file. The words spoken over the phone are then compared to the saved voice prints in the system until it is identified.
16
Pros; Cost effective (some as low as $40.00 US) Software can “learn” to recognize voices better over time Cons; Easily affected by the physical condition of the user (i.e. colds) Affected by background noise Can be easily beaten Although the software is easily beaten, by having the user provide their password and PIN number fewer people will be able to access accounts that aren’t theirs when the password and PIN are compared as voices.
17
http://www.cylab.cmu.edu/partners/success-stories/iris-recognition.html http://www.cylab.cmu.edu/partners/success-stories/iris-recognition.html http://www.c4isrjournal.com/story.php?F=4736046 http://www.c4isrjournal.com/story.php?F=4736046 http://www.pcworld.com/article/120889/biometrics_from_reel_to_real.html http://www.pcworld.com/article/120889/biometrics_from_reel_to_real.html http://www.cse.msu.edu/biometrics/fingerprint.htmlhttp://www.cse.msu.edu/biometrics/fingerprint.html http://www.sans.org/reading_room/whitepapers/authentication/dont-blink- iris-recognition-biometric-identification_1341 http://www.sans.org/reading_room/whitepapers/authentication/dont-blink- iris-recognition-biometric-identification_1341 http://www.theregister.co.uk/2004/05/07/watery_eyes_iris_scan/ http://www.theregister.co.uk/2004/05/07/watery_eyes_iris_scan/ http://en.wikipedia.org/wiki/Speaker_recognition http://en.wikipedia.org/wiki/Speaker_recognition http://www.pcmag.com/category2/0,2806,4830,00.asp http://www.pcmag.com/category2/0,2806,4830,00.asp http://www.biometricsinfo.org/prosandconsofbiometrics/index.html http://www.biometricsinfo.org/prosandconsofbiometrics/index.html
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.