Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
BIOMETRIC VOTING SYSTEM
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
BARTEX Your Logo Here BARTEX CORPORATION’S BORDER REGISTRATION and SECURITY SYSTEM BARTEX CORPORATION’S BORDER REGISTRATION and SECURITY SYSTEM.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Biometric based authentication and identity management
PALM VEIN TECHNOLOGY.
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Marjie Rodrigues
Security-Authentication
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Karthiknathan Srinivasan Sanchit Aggarwal
INTEGRATED JUSTICE SYSTEM 1 INTEGRATED JUSTICE SYSTEM FINGERPRINT PROCESSES.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
LOCAL AGENCY MUST STILL RUN A FILE CHECK (QHW) TO DETERMINE WARRANTS/HOLDS II. If name is not on CCH, prints are compared to all fingerprints in AFIS for.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
PASSPORT SYSTEM – STANDARD AND E-PASSPORT The Passport includes standard international Security Features such as: Hologram Ultra Violet Print (can be seen.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Biometrics Authentication Technology
Customer Identification system based on Smart Card for PDA shops.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
BIOMETRICS.
©Spectra Technovision (India) Pvt. Ltd.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
COSEC Visitor Management
Latent Print Examiner.
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Classroom Attendance System
Database Management  .
Seminar Presentation on Biometrics
Biometric technology.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
Ch 14 Fingerprints part 2.
Ones Technology Products & Solutions
Presentation transcript:

Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System

Common Usage of Biometric Systems Border Control Border Control Criminal Investigation Criminal Investigation Access control Access control Attendance control Attendance control Customer relationship management (CRM) Customer relationship management (CRM) PC biometrical logon PC biometrical logon Identity verification Identity verification Banking Banking Secure Web Transactions Secure Web Transactions

Fingerprint identification Human fingerprints are unique to each person and can be regarded as a sort of signature, certifying the person's identity. Because no two fingerprints are exactly alike, the process of identifying a fingerprint involves comparing the ridges and impressions on one fingerprint to those of another. Human fingerprints are unique to each person and can be regarded as a sort of signature, certifying the person's identity. Because no two fingerprints are exactly alike, the process of identifying a fingerprint involves comparing the ridges and impressions on one fingerprint to those of another. This first involves capturing the likeness of the fingerprint, either through use of a fingerprint scanner (which takes a digital picture of a live fingerprint), scanning a pre-existing paper-based fingerprint image or by pulling what is known as a "latent fingerprint" from a crime scene or other place of investigation, from which a digital image is created. This first involves capturing the likeness of the fingerprint, either through use of a fingerprint scanner (which takes a digital picture of a live fingerprint), scanning a pre-existing paper-based fingerprint image or by pulling what is known as a "latent fingerprint" from a crime scene or other place of investigation, from which a digital image is created. Once the fingerprint image is captured, the process of identification involves the use of complex algorithms (mathematical equations) to compare the specific features of that fingerprint to the specific features of one or more fingerprint images that have been previously stored in a database. Once the fingerprint image is captured, the process of identification involves the use of complex algorithms (mathematical equations) to compare the specific features of that fingerprint to the specific features of one or more fingerprint images that have been previously stored in a database.

Facial Identification Like fingerprint biometrics, facial recognition technology is widely used various systems, including physical access control and computer user accounts security. Like fingerprint biometrics, facial recognition technology is widely used various systems, including physical access control and computer user accounts security. Usually these systems extract certain features from face images and then perform face matching using these features. A face does not have as many uniquely measurable features as fingerprints and eye irises, so facial recognition reliability is slightly lower than these other biometrical recognition methods. However, it is still suitable for many applications, especially when taking into account its convenience for user. Facial recognition can also be used together with fingerprint recognition or another biometrical method for developing more security-critical applications. Usually these systems extract certain features from face images and then perform face matching using these features. A face does not have as many uniquely measurable features as fingerprints and eye irises, so facial recognition reliability is slightly lower than these other biometrical recognition methods. However, it is still suitable for many applications, especially when taking into account its convenience for user. Facial recognition can also be used together with fingerprint recognition or another biometrical method for developing more security-critical applications. Using face identification as an additional biometric method can dramatically decrease this effect. This multi-biometrical approach also helps in situations where a certain biometric feature is not optimal for certain groups of users. For example, people who do heavy labor with their hands may have rough fingerprints, which can increase the false rejection rate if fingerprint identification was used alone. Using face identification as an additional biometric method can dramatically decrease this effect. This multi-biometrical approach also helps in situations where a certain biometric feature is not optimal for certain groups of users. For example, people who do heavy labor with their hands may have rough fingerprints, which can increase the false rejection rate if fingerprint identification was used alone.

Proposed System using Advance Biometrics Our systems consists of three modules 1. Transactions record with finger Identification ( FIR Registration ) 2. Staff Attendance using finger Identification 3. Criminal AFIS using multi biometrics ( Finger and facial Identification)

FIR Registration 1. Complete Computerize FIR system with Optional Urdu Interface. 2. Each FIR record the finger print of Lodger and Staff. 3. Every update on particular FIR will be updated regularly. 4. Detail Audit and Performance reporting on each case.

Personnel System Compile staff personal file Compile staff personal file Educational and other details Educational and other details Secure Staff Attendance with finger identification Secure Staff Attendance with finger identification No Buddy Punching No Buddy Punching Staff Movement record Staff Movement record Duty Roaster and shift details Duty Roaster and shift details

Criminal AFIS Tracking of Different Criminals with Jails Tracking of Different Criminals with Jails Finger and Facial Print database using Finger and Facial Print database using forensic quality scanners. forensic quality scanners. Criminal Identification from Finger and Facial biometrics Complete track database of each person.

Hardware and Software Required Windows OS based latest server and desktop machines Windows OS based latest server and desktop machines Rational Database ( Ms SQL Server or Oracle ) Rational Database ( Ms SQL Server or Oracle ) NIST and MITEX approved Finger Scanner NIST and MITEX approved Finger Scanner Digital Camera Digital Camera Normal Laser Printer Normal Laser Printer Customize AFIS and Personnel System Customize AFIS and Personnel System

Some Common Finger Scanner and digital Cameras Some Common Finger Scanner and digital Cameras

Task Achieved with the system A complete FIR management System A complete FIR management System A complete Personnel system with attendance features A complete Personnel system with attendance features Access of Criminal record with Finger and facial matching and verification technology Access of Criminal record with Finger and facial matching and verification technology Access of every data within few key stokes Access of every data within few key stokes Customize reports for performance and audit monitoring. Customize reports for performance and audit monitoring.

Future Enhancements AFIS for police and civilian applications (ANSI/NIST) AFIS for police and civilian applications (ANSI/NIST) Rolled and Flat Finger and full Palm scanning. Rolled and Flat Finger and full Palm scanning. Crime scene scanning Crime scene scanning Iris Scanning Iris Scanning Police database with tenprints (TP) and latent prints (LP) Police database with tenprints (TP) and latent prints (LP) Includes TP-TP, TP-LP, LP-TP, LP-LP searching Includes TP-TP, TP-LP, LP-TP, LP-LP searching Integration of digital photos and signatures Integration of digital photos and signatures Mobile Handheld units for field operation with database matching with Central over GSM Mobile Handheld units for field operation with database matching with Central over GSM Exchange of database within different region or countries. Exchange of database within different region or countries.

Thank You for your Time and Patience Thank You for your Time and Patience