Margaret Brown 3rd period October 14, 2007

Slides:



Advertisements
Similar presentations
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Advertisements

By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Biometrics.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Emerging Biometric Applications Expectations and Reality (in 29 minutes or less!) (C) Mr David Heath of Triton Secure.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
Security-Authentication
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Authentication Technology
Biometrics.
By Hafez Barghouthi. Definition ”Biometric Technologies” are automated methods of verifying or recognizing the identity of a living person based on a.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Retinal & Iris Scanners
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Jim Parson Secure Systems Administration. History Babylonian business transactions included fingerprints 500 B.C. Chinese - tracked young children 14th.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
Stovall and Klee Security
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
بیومتریک تهیه کننده : احمد محمدی نام مدرس : استاد حسین زاده.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Presented by: k.ramya krishna
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Margaret Brown 3rd period October 14, 2007 Hand Biometrics Margaret Brown 3rd period October 14, 2007

History of Biometrics Biometrics were first used in China in the 14th century to distinguish small children. Their palm and hand prints were taken. In the 1800’s the Bertillion System was used until William and Willy West had similar measurements, but different finger prints. After this incident, the Bertillion Method was not used and they decided to use fingerprints instead.

History of Biometrics cont. Today, biometrics are used all over the world with ten different methods. Biometrics are becoming more popular and the prices continue to decrease.

Uniqueness of Hand Biometrics Every one has a different shaped hand After you get to be a certain age your hand size doesn’t change significantly. Its is not good in one-to-many comparisons

Comparison of Different Biometrics All biometric techniques are good for verification, but only fingerprinting, iris and retinal scanning and DNA is good for identification. Fingerprinting, Iris and Retinal Scanning, and DNA are the most accurate, followed by Hand geometry, Facial Recognition, Speaker Recognition, Signature Recognition and finally Keystroke recognition. Fingerprinting, iris and retinal scanning and DNA are the most reliable.

Comparison cont. Hand geometry and facial recognition have medium reliability and keystroke, signature and voice have low reliability.

Collectibility of Hand Biometrics Hand prints are hard to collect Unless ink or some kind of dye has been put on the hand, hand prints are hard to find and need tools to find them.

Performance of Hand Biometrics The performance of hand biometrics is acceptable. The rate of error for hand geometry is about 1 in 500 Some things that could weaken its performance are hand injury and age.

Universality of Hand Biometrics Even if someone is missing a finger, they can still use hand biometrics All you need is a hand to scan Used since the 1980’s in hundreds of places all over the world

Permanence of Hand Biometrics Once a person hits a certain age, there hand doesn’t grow much more Hand Biometrics does not have the same degree of permanence as other biometrics

Acceptability of Hand Biometrics Hand Biometrics is one of the most common forms User friendly Requires least amount of data Easily integrated into an existing system

Circumvention of Hand Biometrics Hand Biometrics has a medium Circumvention rate Hand sizes could be similar to each other and outsmart the system Used more for verification that identification

Biometric identifier Universality Distinctiveness Permanence Collect ability Performance Acceptability Circumvention DNA H L Ear M Face Facial thermo gram Fingerprint Gait Hand geometry Hand vein Iris Keystroke Odor Palm print Retina Signature Voice

Application of Hand Biometrics The 1996 Olympic Games where access to and from the Olympic Village was controlled. Colombian legislature San Francisco International Airport Child day care centers use hand geometry systems to verify the identity of parents.   Lotus Development and New Mexico Elementary schools are examples of this. Hospitals use hand geometry systems to monitor payroll accuracy and access control.

Application of Hand Biometrics The University of Georgia has used hand geometry systems since 1973 for their student meal programs. All branches of the United States military. Over 90 percent of all United States nuclear power plants. Used to track prisoners. Used by international banks.

Issues and Concerns Since the hand scanners have to be large enough to fit the entire human hand, the equipment can be bulky There is a higher level of mistakes in hand recognition than other forms of biometrics

Identity Theft and Privacy Issues Hand Prints are private because no fingerprint or palm print information in stored in the database

Videos http://www.youtube.com/watch?v=imlghm4BwWc http://www.youtube.com/watch?v=r41iDK9YZTA http://www.youtube.com/watch?v=MeSqJHQVmhY http://www.youtube.com/watch?v=V2nmEmUZLeA

Biometrics in the Future Car locks Replace Passwords Replace Credit cards Replace keys Used in all businesses as security

Hand Biometrics in Crime Scene If a hand print is found, it can be used to as a check against any suspects. Since it can not be used as for identification, the only way it can really be used is in verifying that the suspect was at the crime scene.