logging in or signing up SECURITY MEASURE 2 ain_ramiah Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 98 Category: Entertainment License: All Rights Reserved Like it (0) Dislike it (0) Added: April 03, 2012 This Presentation is Public Favorites: 0 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript SECURITY MEASURE : SECURITY MEASUREPROFILE: PROFILE NUR AIN RAMIAH BINTI MOHAMMAD ALI 950226-08-6468 4 ANGGERIKBIOMETRIC: BIOMETRIC Device that translate personal characteristic into a digital code stored in the database It is also used to identify individuals in groups that are under surveillance The example of biometric : Fingerprint recognition Facial recognition Hand geometry scanning Iris scanning Voice recognition Signature verification systemPowerPoint Presentation: FINGERPRINT RECOGNITION To prevent fake finger from being used Measure blood flow or check correctly arrayed ridges FACIAL RECOGNITION Analyses the characteristic of an individual’s face images Capture through a digital video camera Touted as a fantastic system for recognizing potential threats HAND GEOMETRY SCANNING Measure and analysis of the shape of one’s hand Individual features are not descriptive for identification Possible to devise a method by combining various individual features and measurement of finger and handsPowerPoint Presentation: IRIS SCANNING Analyses the feature that exist in the coloured tissue surrounding the pupil The scan use a regular video camera and can be done from further away than a retinal scan Will work perfectly and get the accurate measurement that can be use in identification purpose Excellent but expensive VOICE RECOGNITION Compares a person’s live speech with their stored voice pattern Requires user to speak into a microphone and the word or anything that he speaks can be his password or an access phrase Most voice recognition devices require the high and low frequencies of the sound to match which is difficult for many recording instrument to recreate well Fair and the cost reasonablePowerPoint Presentation: SIGNATURE VERIFICATION SYSTEM Recognize the shape of user handwritten signature as measuring the pressure exerted and the motion use to write the signature Special pen and tablet are used The authenticity is determined by comparing an input signature to a stored reference set (template) consisting of three signature The similarity between input signature and reference set is computed using string matching and compared to a threshold Fair and the price is excellentPowerPoint Presentation: Picture 2: visualization of iris scan and extracted ‘ iriscode ’PowerPoint Presentation: Picture 3: digitized fingerprint image with the minutiae points extracted. Picture 4: hand with biometric measurements visualized image.CONCLUSION: CONCLUSION From this assignment I can conclude that authentication is one of the security measure. One of the method of authentication is Biometric Devices. The biometric method is the method that are commonly use. There are six example of Biometric. From this assignment , I also find out that the FINGERPRINT RECOGNITION is the best method because the fingerprint is very unique , different person will have the different fingerprint . It also the best method because the accuracy in this method is good and the cost involved is cheaper than the other method.SOURCE OF REFERENCE: SOURCE OF REFERENCE Book Score A.By : Ismail bin Shaari Note Introduction to information and communication technology SMK (F) BESOUT Internet http://www.iriscan.com/basic.htm http://biometrics.cse.msu.edu/fingerprint.htnl Network security 1998:biometric identification . Microsoft internet explorePowerPoint Presentation: THANK YOU You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.