Biometrics Security in Banking Systems Image processing in ATM

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC VOTING SYSTEM
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Challenge/Response Authentication
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Access control techniques
Challenge/Response Authentication
A Seminar Report On Face Recognition Technology
Authentication.
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Presented By Sapin.M.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Seminar Presentation on Biometrics
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Biometrics Security in Banking Systems Image processing in ATM MISY 4342, sec 201 Group Project Presentation Zainab A. Al-Dawood 200800915 Arwa Al-Ahmed Doha Al-Mohsin   Instructor: Dr. Nazeeruddin Mohammed

1. 0 An Over View of Image Processing 1. 1 Introduction 2 1.0 An Over View of Image Processing 1.1 Introduction 2.0 Classification of Biometrics 3.0 Applications of Biometrics 3.1 E-commerce Applications 3.2 convert Surveillance 4.0 Types of Biometrics 4.1 Finger scan 4.2 Retina Scan 4.3 Iris Scan 5.0 Drawbacks 6.0 Future of Biometrics 7.0 Works on Biometrics 7.1 Algorithm 1 7.2 Algorithm 2 8.0 Conclusion 9.0 References The Outline

1.0 An Overview of Image Proccessing A) Discretization and Representation: where it Converts all the visual displayed information into a discrete form that goes suitable with the computerized language to understand and then save it in the storage space. (B) Processing: where it improves the image quality by filtering compressing and saving changes during the transmission. (C) Analyzing: where it extracts the image features, shapes and cognition. 1.0 An Overview of Image Proccessing

The use of biometrics is shown in several areas, it can be used to protect and prevent the unauthorized access to some security systems like ATM’s, smart cards and others. The advanced solution of the biometrics is used to protect a large database system that is more sophisticated method, called “the identification”. Lets get in details with how this technology is applied and used in banking systems. 1.1 Introduction

2.0 Classification of biometrics: The two categories of biometric techniques are: The physiological based techniques measure the physiological characteristics of a person. These include fingerprint verification, iris analysis, facial analysis, hand geometry-vein patterns, ear recognition, odor detection and DNA pattern analysis.

Cont. 2. The behavioral based techniques measure the behavior of a person. These include hand written signature verification and speech analysis hand written signature verification and speech analysis. These techniques involve two major steps. These are the Authentication & the verification. Cont.

2.1 How biometric technology works During enrollment there are 8 steps: 1) Capture the biometrics, which has to be stored in the database; 2) Process the biometric, extract and enroll the biometric template; 3) Store the template in a local repository, a central repository, or a portable token such as a smart card. During access to database: 4) Live-scan the biometric feature;

5) Process the biometric and extract the biometric template; 6) Match the scanned biometric against stored templates; 7) Incase of successful verification; provide a matching score to business application; 8) Record a secure audit trail with respect to system use Biometric applications depend on comparing as new measure against previously captured information. Cont.

3.0 Applications of biometrics All the information regarding the fingerprints, retina etc… Are digitalized and stored. This can be compared with a database in seconds and with an extraordinary degree of accuracy. Fingerprints have the advantage of being cheaper and simpler than most other biometrics.

3.1E-commerce Applications: E-commerce developers are exploring the use of biometrics to more accurately verify a trading party’s identity.

3.2 Covert Surveillance: Facial and body recognition biometric techniques come in to picture automatically to identify known suspects entering buildings or traversing crowed security areas such as airports

4.0 Types of Biometrics 4.1 Finger scan: Finger-scan biometrics is base on the distinctive characteristics of the human fingerprint. A fingerprint image is read from a capture device, features are extracted from the image, and a template is created

4.2 Retina Scan: Retina scan requires the user to situate his or her eye with ½ inch of the capture device and hold still while the reader ascertains the patterns. The user looks at a rotating green light as the patterns of the retina are measured

4.3 Iris Scan: The iris has colored streaks and lines that radiate out from the pupil of the eye. The iris provides the most comprehensive biometric data after DNA. And the chance that any two people may have the same pattern is one in 10 to-the- power-78, which is way above the current population of the Earth

5.0 Drawbacks:   A major problem with biometrics is how and where to store the user’s template. Its storage introduces privacy concerns. On the other hand, storing the template on a smart card enhances individual privacy and increases protection from attack, because individual users control their own templates.

6.0 The Future of Biometrics There will be no doubts that the Biometric technology is one area that no any field of the IT industry can dismiss. It provides huge security benefits toward business and technological industry proved from the previous study of its pros and cons.

7.0 Works on Biometrics 7.1 Algorithm 1: STEP 1: A User enters a bank that uses a biometric system (either; finger scan, voice and hand scan) for higher protective degree. STEP 2: The person scans his /her fingerprint (as input) on the finger scan pad so it captures his/her identity.   Then it would be a 7.0 Works on Biometrics

__________________________________________________________ ____________________________________________ STEP 4: User is requested to speak few words, which is converted into digitalized code by the voice scanner. STEP 5: A comparison of this voice code entered with some other in the database if someone else has the same voice code _________________________________________________________________ _______________________________ (CONDITION) if the code is matched THEN, GOTO ALGORITHM 2 ELSE if the code does not find a match GOTO STEP 6 __________________________________________________________ _______________________________________ Cont.

___________________________________________________________________________ _____________________ (CONDITION): If the figure print is matched with any one stored in the database available in the system. THEN, GOTO STEP 8, ELSE (if finger print does not find a match!) GOTOSTEP 4, STEP6: The user is required to place his/her hand over the hand scanner so its recorded. STEP 7: A Comparison between the current scanned entered with those already stored in database. ___________________________________________________________________________ ______________________ (CONDITIO) if the data is matched THEN,……. GOTO STEP8. ELSE If the data does not find a match ….GOTO Algorithm 2. ___________________________________________________________________ ______________________________ STEP 8: access the matched file in the database. STEP 9: Exit. Cont.

7.2 Algorithm 2: STEP 1: A message sent to the database asks for the password file from the OS security files. The passwords are received in an encrypted from (DES-data Encryption Standards).   STEP 2: The User Spell his/her password STEP3: converting the vocal password spoken into textual password by the speech processing circuit. STEP 4: A Comparison between the password got and others stored in the file in step 1 _______________________________________________________ ________________________________________ (CONDITION) if match is found THEN, …… Access the database. ELSE, …… Glow the danger light _________________________________________________ ________________________________________________ STEP5: Exit.

The technologies behind biometrics are still emerging and developing within the time. This article gives a snapshot of the dynamic impacts under this emerging of biometric in the market, and we hope this beginning helps lately the new technology of biometrics. 8.0 Conclusion

Douhou, S., & Magnus, J. R. (2010). The reliability of user authentication through keystroke dynamics. Statistica Neerlandica, Nov2009, Vol. 63 Issue 4. Retrieved from EBSCOHOST 365 Computer Security Training. (2010). What is Biometric Fingerprint Scanning. Retrieved from http://www.computer- network-security-training.com/what-is-biometric-fingerprint- scanning/ Daily Mail. (2011). Log-in to Facebook with an iris scan: Eye- scanner for your PC set to go on the market in months. Retrieved from http://www.dailymail.co.uk/sciencetech/article- 1385959/Under-look-key-PC-iris-scanner-security-device-set- market-months.html 9.0 References