Biochips Using Biochips as an Alternative to Current Biometric Identification Techniques December 16, 2006 Team 2 Members John Casarella Dave Fronckowiak.

Slides:



Advertisements
Similar presentations
Lecture 5: Requirements Engineering
Advertisements

ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
BIOMETRIC VOTING SYSTEM
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Research methods – Deductive / quantitative
National Smartcard Project Work Package 8 – Card Governance Report.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Introduction to Fingerprint Biometrics By Tamar Bar.
Requirements Specification
Face Biometric Applications Team Members: Faune Hughes, Daniel Lichter, Richard Oswald, and Michael Whitfield Clients: Fred Penna and Robert Zack.
Dynamic Face Recognition Committee Machine Presented by Sunny Tang.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Customized instruction-sets for embedded processors Fisher, J.A. Design Automation Conference, Proceedings. 36th, 1999, Page(s): speaker:
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
The Future of Social Networking in 2050 By Alex, Kim, Nicole, Jessie, and David.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
CORE 1: PROJECT MANAGEMENT Understanding the Problem.
Marjie Rodrigues
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
DEPARTMENT OF NANOTECHNOLOGY
Presented by Allyson Medina, RN
Biometrics: Ear Recognition
National Smartcard Project Work Package 8 – Security Issues Report.
Anonymity, Security, Privacy and Civil Liberties
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
 ABSTRACT  COMPANY PROFILE  PROJECT PROFILE  INTRODUCTION  PROJECT MANAGEMENT  MODEL USED  SCHEDULING  RISK MANAGEMENT  SYSTEM REQUIREMENT SPECIFICATION.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
A SURVEY OF APPLICATIONS AND REQUIREMENTS OF UNIQUE IDENTIFICATION SYSTEMS AND RFID TECHNIQUES R 蘇昱彰 1.
”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Attack Tool Repository and Player for ISEAGE May06-11 Abstract Today’s world is changing shape as it increases its dependency on computer technology. As.
Biometrics Authentication Technology
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Project MED INF 403 DL Winter 2008 Group 3. Group Members Michael Crosswhite Maureen Farrell Julia Hernandez R Steven McDonald Jennifer Ogg David Robbins.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
CASE (Computer-Aided Software Engineering) Tools Software that is used to support software process activities. Provides software process support by:- –
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Requirements Engineering Requirements Management Lecture-25.
CS628 - Object Oriented Analysis And Design. The Four Pillars of Successful Software Development -Avoid Classic Mistakes -Apply Development Fundamentals.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
1 Authentication Technologies Authentication Mechanisms –Something you know –Something you have –Something you are Features –Authenticator & Base secret.
Controlsoft have 25 years experience in the development, manufacture and distribution of Access Control Solutions. With over 10,000 systems in daily use.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Tests of Significance -how to put them in writing.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Some Great Open Source Intrusion Detection Systems (IDSs)
Hand Geometry Recognition
FACE RECOGNITION TECHNOLOGY
Biometrics.
Application of SysML to LLRF system design M.Grecki
OCR GCSE ICT Data capture methods.
Seminar Presentation on Biometrics
Biometrics.
Welcome To Money pad November 23, 2018 Sample footer.
Software Requirements Specification Document
Strong Password Authentication Protocols
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
What is a System? A system is a collection of interrelated components that work together to perform a specific task.
Presentation transcript:

Biochips Using Biochips as an Alternative to Current Biometric Identification Techniques December 16, 2006 Team 2 Members John Casarella Dave Fronckowiak Larry Immohr Sandy Westcott

Outline Introduction What are biochips? Statement of the problem Relevance of the work Research questions Relevance of the Work Research Questions Relevance of the Research in the context of other work Methodology Discussion of Expectations Conclusion

Introduction What are biochips?  Biochips are a family of products that form a technology platform  Biochips include: Implanted RFID devices the size of a grain of rice for identification also known as implant chips. Microarray devices also known as protein chips. Brain chip devices which can record neural signals. Porous silicon which can be used to produce devices which can replace damaged tissue.

Introduction (cont.) Statement of the problem  Many forms of biometrics can produce false rejects due to normal variations such as aging or physical ailments.  Therefore, a simple, effective, and alternate biometric identification method is needed.

Relevance of the Work Relevance of the work Many forms of biometrics can produce false rejects due to normal variations Having a cold Aging Weight gain or loss The use of DNA in a simple test may be an alternate identification technique Combine the protein chip and the implant chip with the addition of a password or PIN to create a three layer security scheme. Something you know (PIN) Something you are (DNA) Something you have (Implant chip )

Research Questions 1)Can the combination of protein and implant chips be used for identification purposes? 2)How do biochips compare to biometrics with respect to ease of use, timeliness of results, and reliability over time? 3)What are the database implications of using such a technology? 4)What are the ethical implications of using a person’s DNA sample to verify their identity? 5)What are the social and privacy implications? 6)Is this capability technically possible today? 7)Would the cost of implementation be prohibitive?

Relevance of the Research in the Context of other Work Advantages of this type of system: 1)Easy sample prep and standard protocol 2)Portable biochip reader 3)Automated software for identifying and reporting 4)Tailoring of biochips to meet individual needs 5)Resolution of thousands of diagnostic tests Disadvantages of this type of system: 1)Time to complete identification process 2)Ethical issues when storing personal traits 3)Database management and search

Methodology Review the current biochip applications Develop a prototype design of the biochip identification system based upon the Argonne National Laboratories protein chip reader. Survey experts on the use of protein chips for individual identification for security purposes.

Discussion and Expectations Specialized protein chips may be used to test DNA samples as a form of identification. This technology may be used alone or in conjunction with implanted chips to produce a highly effective security solution. Through this research, it is believed that the use of protein chips will be a feasible alternative to current biometric identification techniques.

Conclusions Biochips are one of the latest emerging technologies. The use of biochips may pose an alternative to biometric identification. As mentioned in the “Guide to Biometrics”, DNA identification is the ultimate biometric.