Author: Austin Kamrath Wednesday April 12th, 2017

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
FIT3105 Biometric based authentication and identity management
BIOMETRICS The Issue of Privacy in an Increasingly Secure World By: Joanna Moser.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
A device tat transfers data from the outside world into a computer
Access control techniques
A Seminar Report On Face Recognition Technology
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
Biometric Security Palm Vein Technology
Seminar Presentation on Biometrics
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Author: Austin Kamrath Wednesday April 12th, 2017 Biometric Sensing Author: Austin Kamrath Wednesday April 12th, 2017

Key Concepts “Problems with current security systems” “Possible Solutions” “Concept of Biometric Sensing” “Current Biometric technology” “Future Biometric technology”

“Problems with Current Security Systems” Primarily based on passwords or ID/swipe cards May be forgotten or lost Can easily be stolen by thief or hacker Not very cost efficient in long run

Statistics on Passwords Case Study: Telesis Community Credit Union Manages $1.2 billion in assets The vice president lead a team to run a network password cracker With in 30 seconds they identified 80% of most people passwords They then told employees to change their passwords and comply with password policies They were still able to identify 70% of the employees passwords http://www.computerworld.com/article/2556096/security0/biom etrics--getting-back-to-business.html

“Possible Solution” Biometric Sensing Better security Offers convenience Easy and safe to use Available for many applications More affordable than ever

“The Concept of Biometric Sensing” Derived from the Greek words bio, meaning life, and metric, meaning measure. Identify a persons physical and behavioral characteristics A transducer that changes the trait into a electronic signal Traits such as fingerprints, iris, face, voice, etc. Requires one type of sensor

Sensor measures or reads light, temperature , speed, electrical capacity and other energies to obtain these readings A few applications: HD cameras for facial recognition or a microphone for voice capture Some even designed to scan vein patterns

Types of Biometric Sensors Physiological Biometrics Face Fingerprint Hand Iris Scanning Vein Behavioral Biometrics Keystroke Signature Voice

Face: Capturing data for nodal points and the resulting data can be stored as a face print. Fingerprint: Records its features like arches, whorls and loops along with the outline of edges, minutiae and furrows. Hand: Examines palm-print, hand geometry or hand shape, finger-knuckle print, hand veins, etc. Iris Scanning: Based on single patterns in the region of ring shaped surrounding the pupil. Vein: Identifies the pattern of blood vessels Keystroke: Describes exactly when each key was pressed and released as a person is typing. Signature: Measure the pressure applied, stroke order and the speed. Voice: Properties – nasal tone, fundamental frequency, inflection, cadence.

Fingerprint Semiconductor sensors: prone to ESD Pros Cons Most commonly used Semiconductor sensors: low cost Optic sensors: high degree of stability and reliability Ultrasound sensors: precise and fraud-free Semiconductor sensors: prone to ESD Optic sensors: larger in size Ultrasound sensors: expensive to implement

Face Recognition Facial reconstruction surgery Pros Cons No contact needed, just picture or video Accurate and fast results Reliable matching Considered most accurate technology available today Facial reconstruction surgery Some businesses may not have video systems

Iris Scanning More individual characteristics than a fingerprint Pros Cons More individual characteristics than a fingerprint Almost 100% accurate Face scanners are not yet able to be as accurate as they should be Things such as contacts, tears, longer eyelashes or dark eyes can sometimes throw off the machine

Other Information Fingerprint Use a CMOS image sensor or CCD Solid state sensors work on transducer technology

“Current Biometric Technology” BIO-key SideSwipe a swipe fingerprint reader that operates on any Window device with a USB port Microsoft's new Biometric sign-in feature. Only scanner devices in the market to pass Microsoft’s security testing qualification process

NEXT Biometrics EcoID USB fingerprint reader Portable and small fingerprint reader Active thermal sensor from NEXT Biometrics Compatible with Android and Windows NEXT Biometrics On April 26th 2016 they launched the first fully flexible fingerprint sensor for smart cards NB-2023-S = Fingerprint are sensor module Its technology is tolerant against dirt, grease and varying environmental conditions. Large active area allowing intuitive user operation Application Examples: notebooks, tablets, time and attendance terminals, smart card readers

“Future Biometric Technology” The use of Biometrics in banks Biometrics in branch banking, internet/mobile banking, ATM’s Most likely remove the password and PIN system in banking Visa Europe Report

DNA recognition Earlobe Recognition It captures the unique features from the uncoded portion of the DNA sequence Finished image in known as the “Digital DNA Fingerprint” Earlobe Recognition Measuring the distances between the prominent landmarks of the ear Two specific techniques are being examined to create the Biometric Template PCA 3-D Analysis

Gait Recognition Study of ways people walk Known as Kinematics, study of motion Capture the features of a individuals stride such as angles lengths and speeds Two techniques Static shapes Dynamic shapes

Summary Current security systems are not reliable or efficient Biometric technology is superior Technology is advancing

References http://findbiometrics.com/solutions/biometric-sensors- detectors/ http://findbiometrics.com/bio-key-devices-amazon-305161/ http://findbiometrics.com/fpc-stock-europe-301041/ https://users.ece.cmu.edu/~jzhu/class/18200/F06/L10A_Savvi des_Biometrics.pdf https://www.elprocus.com/different-types-biometric-sensors/ http://www.bio-key.com/products/sideswipe/ http://findbiometrics.com/new-bio-key-device-aims-to- disrupt-market-23234/ http://nextbiometrics.com/ https://www.elprocus.com/know-about-iris-technology-using- biometric-systems/ http://www.biometric-security-devices.com/biometric- sensor.html

Five Questions The different types of Biometric Sensing. Advantages and disadvantages of a couple types. Why companies are starting to transition into Biometric technology? How do these sensors obtain these readings? What does this technology offer that will prevent people from getting accounts stolen or hacked?