SECURITY MEASURE 2

Views:
 
Category: Entertainment
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

SECURITY MEASURE :

SECURITY MEASURE

PROFILE:

PROFILE NUR AIN RAMIAH BINTI MOHAMMAD ALI 950226-08-6468 4 ANGGERIK

BIOMETRIC:

BIOMETRIC Device that translate personal characteristic into a digital code stored in the database It is also used to identify individuals in groups that are under surveillance The example of biometric : Fingerprint recognition Facial recognition Hand geometry scanning Iris scanning Voice recognition Signature verification system

PowerPoint Presentation:

FINGERPRINT RECOGNITION To prevent fake finger from being used Measure blood flow or check correctly arrayed ridges FACIAL RECOGNITION Analyses the characteristic of an individual’s face images Capture through a digital video camera Touted as a fantastic system for recognizing potential threats HAND GEOMETRY SCANNING Measure and analysis of the shape of one’s hand Individual features are not descriptive for identification Possible to devise a method by combining various individual features and measurement of finger and hands

PowerPoint Presentation:

IRIS SCANNING Analyses the feature that exist in the coloured tissue surrounding the pupil The scan use a regular video camera and can be done from further away than a retinal scan Will work perfectly and get the accurate measurement that can be use in identification purpose Excellent but expensive VOICE RECOGNITION Compares a person’s live speech with their stored voice pattern Requires user to speak into a microphone and the word or anything that he speaks can be his password or an access phrase Most voice recognition devices require the high and low frequencies of the sound to match which is difficult for many recording instrument to recreate well Fair and the cost reasonable

PowerPoint Presentation:

SIGNATURE VERIFICATION SYSTEM Recognize the shape of user handwritten signature as measuring the pressure exerted and the motion use to write the signature Special pen and tablet are used The authenticity is determined by comparing an input signature to a stored reference set (template) consisting of three signature The similarity between input signature and reference set is computed using string matching and compared to a threshold Fair and the price is excellent

PowerPoint Presentation:

Picture 2: visualization of iris scan and extracted ‘ iriscode ’

PowerPoint Presentation:

Picture 3: digitized fingerprint image with the minutiae points extracted. Picture 4: hand with biometric measurements visualized image.

CONCLUSION:

CONCLUSION From this assignment I can conclude that authentication is one of the security measure. One of the method of authentication is Biometric Devices. The biometric method is the method that are commonly use. There are six example of Biometric. From this assignment , I also find out that the FINGERPRINT RECOGNITION is the best method because the fingerprint is very unique , different person will have the different fingerprint . It also the best method because the accuracy in this method is good and the cost involved is cheaper than the other method.

SOURCE OF REFERENCE:

SOURCE OF REFERENCE Book Score A.By : Ismail bin Shaari Note Introduction to information and communication technology SMK (F) BESOUT Internet http://www.iriscan.com/basic.htm http://biometrics.cse.msu.edu/fingerprint.htnl Network security 1998:biometric identification . Microsoft internet explore

PowerPoint Presentation:

THANK YOU

authorStream Live Help