Biometrics

Views:
 
Category: Entertainment
     
 

Presentation Description

No description available.

Comments

By: bhinder11 (41 month(s) ago)

sir plz send me dis ppt at www.manroopkaur90@gmail.com very soon. i need dis urgently.

By: dudo53775 (48 month(s) ago)

hai i want to dowload this BIOMETRIC ppt video. Can you tell me the procedure hoe to download it.Actually there was a seminar that was presented by me . i interest in this topic so plz tell me how to download it....

By: iasp (53 month(s) ago)

can any1 snd me anything related to biometric prediction based login system

By: marrymic (56 month(s) ago)

hi..i want to download this ppt ..plz allow me...

By: amrutha1201 (56 month(s) ago)

hi i am a assistent profe.This video is very useful to me to deliver the subject biometric to my engineering students .I could not able to download this video so could you please help me in telling the procedure to download the above video for which i will be thankful to you.

By: celemitchell (56 month(s) ago)

it works ok on my end

 
By: amrutha1201 (56 month(s) ago)

hi Thanks for allowing me for downloading this video but i could not able to download it.It is showing some error when downloading.could you please help in this side..

 
By: celemitchell (56 month(s) ago)

I've just allowed ppt download, hope this helps

 
See all

Presentation Transcript

ISM 6021Illumination 2CKKadi DrennonClarissa IgnacioCelesta Mitchell : 

ISM 6021Illumination 2CKKadi DrennonClarissa IgnacioCelesta Mitchell Biometrics

Biometrics Overview : 

Biometrics Overview Automated methods of identifying or verifying the identity of a person based on a physiological or behavioral characteristic What are Biometrics? Physical: Fingerprint Facial Recognition Hand Geometry Iris Scan Retinal Scan DNA Behavioral: Speaker Recognition Signature Recognition

Biometrics Overview : 

Biometrics Overview Verification Am I who I claim to be? Identification Who am I? Confirm or establish identity based on who person is NOT what person possesses ID card NOT what person remembers Password 2 ways to recognize a person:

Fingerprint : 

Fingerprint Fingerprint Pattern Analysis Typical System: fingerprint scanner maps the series of whorls, ridges, furrows and minutiae on the surface of the finger Applications: Law Enforcement Entry Devices for Buildings Computer Network Access New: grocery stores checkout, ATM authorization

Facial Recognition : 

Facial Recognition Face characteristics analysis Typical system: digital video camera input of a person’s face images- measures facial structure; compares against database Applications: Law enforcement Automated bank tellers- user verification purposes

Hand Geometry : 

Hand Geometry Hand shape analysis and measurement Typical system: scanners with guidance pegs that position the hand property for analysis Applications: San Francisco International Airport Immigration facilities Day Care Centers

Iris Recognition : 

Iris Recognition Iris analysis Typical system: scanner analyzes the colored tissue around the pupil – 200 points: rings, furrows, freckles Applications: Law Enforcement Employee Security Check Streamline boarding procedures (frequent passengers – Charlotte NC)

Retina Scanning : 

Retina Scanning Analysis of layer of blood vessels at the back of the eye Typical system: low-intensity light source and an optical coupler; the user needs to remove glasses, keep the eye focused on the light, 15 seconds Applications: High-end security: military, power plans

DNA (Deoxyribonucleic acid) : 

DNA (Deoxyribonucleic acid) A DNA sample is used to produce either a DNA fingerprint or a DNA profile Applications: Medical applications Paternity Tests Criminal identification and forensics Personal Identification: DNA PAK38 (Personal Archival Kit): conserving a sample so the person can be identified in case of kidnapping, accidents or natural disasters. Commercial applications limited

Speaker Recognition : 

Speaker Recognition Voice print analysis Typical system: uses the pitch, pattern, tone, rhythm of speech for identification purposes; only biometric that allows users to authenticate remotely Applications: Call Centers Law enforcement – house arrest authentication Electronic commerce Customer authentication for service calls

Signature Recognition : 

Signature Recognition Handwriting analysis Typical System: user will sign on a tablet, the device will record pressure, speed, sequence and shape of characters and compare to a database Cyber SIGN in Actionview the movie. 56K modem Applications Access to documents Execution of contracts Banking services

Comparison Chart Use : 

Comparison Chart Use Biometric not capable Biometric capable Verification: Input compared to data previously recorded to see if the person is who she claims to be. Identification: input compared to data previously recorded to see who the person is.

Comparison Chart Accuracy/Reliability : 

Comparison Chart Accuracy/Reliability Accuracy: How well can the specific biometric is able to tell individual apart Reliability: how dependable the specific biometric is for recognition purposes

Comparison Chart Characteristics : 

Comparison Chart Characteristics User Acceptance: willingness of the public to accept the use of the specific biometric Ease of Use: - for both user and personnel Low Cost: is there a low cost option for the specific biometric no Hardware: type and cost of hardware required to use the specific biometric .yes

Comparison Accuracy vs. Cost : 

Comparison Accuracy vs. Cost

What Biometrics are Replacing : 

What Biometrics are Replacing Passwords PIN numbers Tokens Photo ID cards Smart cards Magnetic strip cards Physical keys Key chains Traditional verification methods:

Benefits of Biometrics : 

Benefits of Biometrics - Increased security - Convenience - Opportunity to build a sustainable competitive advantage - Growing technology and advancement

Benefits of Biometrics : 

For Employers For Employees Increased security measures due to lack of sharing passwords and identification cards Reduce costs of password and ID card maintenance Reduce payroll costs of “buddy punching” timecards Sustainable competitive advantage for businesses – advanced technology to ensure security for clientele Ability to track employees and link activities Convenience – no passwords to forget Eliminate problems of long passwords and lost/stolen identification cards and PIN numbers Faster login time Improved security of sensitive information Benefits of Biometrics

Concerns with Biometrics : 

Concerns with Biometrics - Sensitive biometric information susceptible to hackers - Lack of privacy for employees - Costly and time consuming to implement

Concerns with Biometrics : 

For Employers For Employees Biometric data is very sensitive and security of this information is vital – more susceptible to hackers It is possible to steal fingerprints by using the “latent fingerprint” – residue left from touching a surface Text-based voice recognition may have errors identifying individuals if their voice changes Biometrics can’t be used with certain groups such as people with disabilities Biometrics, like all other security identification methods, is not foolproof Biometric systems costly and time consuming to implement Biometrics can seem intrusive to employees – intrudes on personal space Employees may be reluctant to change Biometric identification cannot work with all employees, such as disabled individuals Employees scared of biometric information to be abused or stolen Concerns with Biometrics

Concerns with Biometrics : 

Concerns with Biometrics As with many emerging technologies, there are concerns with the abuse of biometric technology and identification. The BITE Project (Biometric Identification Technology Ethics) is a team in Europe that looks at the social, cultural and ethical factors arising from emerging biometric identification technologies.

Concerns with Biometrics : 

Concerns with Biometrics The information gathered from The BITE project is helpful to understand the scope of how employees view biometric technology and their concerns of ethics and privacy. 99.51% surveyed feel the general public is not clearly or poorly informed of biometrics 82.09% feel that biometrics can potentially used to discriminate against ethnic/cultural/racial/religious groups 86.26% feel biometrics should not be permitted to use information to create its own profile of the individual’s habits and activities

Biometrics in Business : 

Biometrics in Business Current Biometric Applications: Computer logins ATMs Grocery stores Airport kiosks Driver’s licenses Internet banking National ID cards Welfare disbursement International border crossing Forensics – criminal identification Annual amusement park pass holders Speaker verification for television home shopping

Biometrics in Business : 

Biometrics in Business Signature verification: Electronic commerce E-business essential factors for growth: Highly secure Trustworthy Speaker recognition: Large voice processing Verify customer during transactions via telephone Fingerprint identification: Social services Background checks Criminal identification

Biometrics in Business : 

Biometrics in Business Automobiles Replace keys for keyless entry and keyless ignition E-passports Passports with embedded chip containing person’s facial image and other traits Other biometric technology being used:

Biometrics in Business : 

Biometrics in Business

Biometrics in Business : 

Biometrics in Business Travel and Transport Biometrics is growing in the travel and transportation industry due to heightened security measures since 9/11 Examples of how biometrics will be used in the future: Identification of employees in secure areas at airports, ports Identification of passengers and monitor of international travel against illegal immigrants Surveillance of individuals in terminals in regards to criminal activities Visa control

Recommendations : 

Recommendations Biometrics as a way to achieving a sustainable competitive advantage must be significant to the users/customer experience and business processes.

Recommendations : 

Recommendations Implementation of a Biometrics program is important in high exposure and businesses with high information intensity.

Recommendations : 

Recommendations Businesses must evaluate “relative accuracy, cost, intrusiveness, and effort of Biometric Technology” Relative Effort = Facial, Signature, Iris Scan Relative Cost = Keystroke Scan Relative Intrusiveness = Voice Scan Accuracy = Iris Scan

Recommendations : 

Recommendations

Thank you! : 

Thank you! For additional information please visit Illumination 2ck Wiki http://sites.google.com/site/illumination2ck/