Development of Fingerprint and Iris Authentication Systems in Thailand Dr. Sarun Sumriddetchkajorn Electro-Optics Section, NECTEC Dr. Vutipong Areekul.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRIC VOTING SYSTEM
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
(Biometrics Consortium)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
George Turner Effectiveness of Biometric Security CS591 Semester Project
Investigation of Two Licensed Biometric Products Using Neurotechnology’s VeriLook and VeriFinger software.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Project overview Face Recognition Security System Based on “Image Passport” Algorithm (FRSS)
Entity Authentication
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
“Fingerprint Recognition based on Silicon Chips”.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biometric Technologies
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
WELCOME.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Biometric Authentication in Infrastructure Security John Armington, Purdy Ho, Paul Koznek, and Richard Martinez INFRASEC Bristol, UK, 1 st – 3 rd Oct.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Jim Parson Secure Systems Administration. History Babylonian business transactions included fingerprints 500 B.C. Chinese - tracked young children 14th.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
ATTENDANCE MANAGEMENT SYSTEM. PRODUCT DESCRIPTION Attendance Management System: is a user-friendly, flexible and full featured employee attendance management.
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
Diane DiLorenzo Cosc 101 section 7
Authentication.
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Libraries have begun to see the value of biometrics M. G
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Classroom Attendance System
Seminar Presentation on Biometrics
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
A SEMINAR REPORT ON BIOMETRICS
COEN 351 Authentication.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Development of Fingerprint and Iris Authentication Systems in Thailand Dr. Sarun Sumriddetchkajorn Electro-Optics Section, NECTEC Dr. Vutipong Areekul Dept. of ECE, Kasetsart Univ. (KU) November 11, 2003 A Seminar on Information Security Technologies Thailand Science Park, Pathumthani

Outline Personal Identification Methods What is Biometrics? Fingerprint Authentication Systems by Thai Researchers Iris Authentication Systems by Thai Researchers Conclusion

Personal Identification Methods Use What You Already Know ID Card, Mother Name, Son’s Name, Place of Birth, License Number, Tel Number, ,... Use What You Have Key, Card, Ticket,... The Answer is Yes or No.

Personal Identification Methods (Cont.) Answer is NOT Yes or No But the Confidence to Say Yes or No. Use What You AreBiometrics High Security

Biometrics Started More Than 1,000 Years Ago (e.g., Eye Color) It is the Automated Method of Recognizing A Personal Physical Characteristics -Fingerprint -Palm print -Retina -Iris -DNA -Face -... Behavioral Characteristics -Signature -Voice -Key stroke -Gait -...

Key Advantages of Using Biometrics Hard to Duplicate Always with You Can’t Transfer to Anybody

Can be Designed and Implemented by Thais General Biometric System Biometrics Sensor Create Template Enrollment Template Storage Verification/ Identification Applications : Comes with you Biometric System

Why Starts with Fingerprint? Low Cost Compared to Other Biometric Devices Used by Police > 10 Years Easy to Implement Can be Made Compact Low Maintenance

NECTEC Optical Fingerprint Scanner (NOFS) Why Optics? Why Optics? - Low Maintenance - Long Life - Inherent Electrostatic Discharge Protection - NECTEC Lab has Capability to Implement (i.e., currently filed two patents) Initiated and Started in Mid 2001

NOFS Specifications NOFS Specifications Image Resolution: 500 DPI Max. Image Size: 640x480 pixels (Typ. 320x240 pixels) Image Capture Area: 25x25 mm 2 (Can be Adjusted) Interface to Host: USB or Ethernet Supported OS: Windows Dimensions: 60x110x73 mm 3

Single Unit Operation Single Unit Operation N-Unit Operation N-Unit Operation USB Port LAN

NOFS Applications NOFS Applications - E-Citizen (i.e., combine with Smart Cards) - Time Attendance Systems - Automated Fingerprint Identification Systems - Voting Systems - E-Banking - Access Monitoring Systems - Personal Registration Systems (e.g., Aliens, Students)

Example of Voting and Time Attendance System Using NOFS

Prototype-to-MarketProblems/Obstacles Component Suppliers were Locally Hard to Find. Most Companies are not Interested in or do not Support Thai Research Products. i.e., Imported Products are Easier and Gain More Profit. Most Programmers Work on Database Programming Not on Biometric Algorithms.

Prototype-to-Market Current Status Thailand has Its Own Optical Fingerprint Scanners. NOFS can be worked with Commercially Available Fingerprint SDKs. Negotiating with Two Local Companies to License the Prototype. KU’s Team is Developing Algorithms and Hardwares using Other Technologies.

HOPE Thai Companies/Government Offices Start and Have Policy to Use Products Designed and Implemented by Thais Knows How to Implement Not How to Buy or Use Knowledge-based Society Leads to Research in Thailand will get Stronger and More Products designed by Thais will be in the Market.