Text TOPIC DATETCS Confidential AVOID CANDIDATE IMPERSONATION.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

BIOMETRIC VOTING SYSTEM
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
U of HCOSC 6397 – Lecture 1 #1 U of HCOSC 6397 Lecture 1: Introduction to Biometrics Prof. Ioannis Pavlidis.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Retinal Scan Sami Lyden. Presentation ● Biometrics – Method – Advantages – Disadvantages ● Retinal recognition – Scanners – Methods ● Comparison ● Developement?
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
Biometrics Authentication Technology
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Cryptography and Biometrics
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
Biometrics.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Presented by: k.ramya krishna
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Text TOPIC DATETCS Confidential AVOID CANDIDATE IMPERSONATION

INTRODUCTION Impersonation is meant to assume the character of another person. Candidate Impersonation is possible and many cases have been reported in many places. It gives bad name to the student as well the associated institute. With right usage of technology and human expertise, these shameful acts can be avoided. In the following slides, we will discuss about the various technologies available their pros and cons respectively. In the end we would propose the best possible technique for avoiding impersonation.

We will follow biometric scanning techniques for the purpose of avoiding candidate impersonation. Following are the techniques that are followed for biometric scanning 1)Facial recognition 2)Hand recognition 3)Fingerprint 4)Iris scanning 5)Signature verification 6)Voice recognition 7)Retinal scanning Proposed Methodology

Facial Recognition Facial recognition records the spatial geometry of distinguishing features of the face. Different vendors use different methods of facial recognition, however, all focus on measures of key features of the face. Advantages 1)Facial photographs do not disclose information that the person does not routinely disclose to the general public. 2) The public are already aware of its capture and use for identity verification 3) It is non-intrusive – the user does not have to touch or interact with a physical device for a substantial timeframe to be enrolled. 4) It can be captured from an endorsed photograph, not requiring the person to be physically present.

Disadvantages 1)Isn't always accurate 2)Hindered by glasses, masks, long hair etc. 3)Must ask users to have neutral face when pictures are being taken Practical scalability The facial recognition is a technology which is readily available and can be remotely accessed by any candidate means that the candidate can provide his photograph through any means and thereby we can perform the check at the time of examination.

Hand Recognition Hand geometry as the name suggests uses the shape of the hand to verify the person. Unlike iris, face or fingerprints, the human hand isn't unique. The existing systems use finger length, thickness, and curvature for the purposes of verification. Advantages 1)A very small template size, easy to maintain and store large database. 2) High reliability and accuracy. 3) Robust, user friendly and easy to integrate into existing and third party systems. 4) Relatively inexpensive offers excellent return on investment

Disadvantages 1) The hand geometry is not unique and cannot be used in identification system 2) Not ideal for growing children 3) Jewelry, limited dexterity, etc may pose a challenge in extracting the hand geometry information. Practical Scalability The hand recognition technology is currently in use in many areas like U.S. military uses it for the access control and majority of nuclear power plants uses it for the same purpose as well. But for the candidate impersonation this technique will not be a cost effective solution as the candidate will not be able to upload the hand scan remotely.

Fingerprint Recognition Fingerprint recognition identifies people by using the impressions made by the minute ridge formations or patterns found on the fingertips. Finger printing takes an image of a person's fingertips and records its characteristics - whorls, arches, and loops are recorded along with patterns of ridges, furrows, and minutiae. Information is processed as an image and further encoded as a computer algorithm. Advantages 1)Fairly small storage space is required for the biometric template, reducing the size of the database required. 2)It is one of the most developed biometrics, with more history, research, and design. 3)Each and every fingerprint including all the fingers are unique, even identical twins have different fingerprints.

4) Relatively inexpensive and offers high levels of accuracy. Disadvantages 1)For some people it is very intrusive, because is still related to criminal identification. 2)It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age 3)Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes approximately → Compression required (a factor of 10 approximately). Practical Scalability The finger print recognition technology is widely used in various sectors and is best suited to avoid the candidate impersonation as well as the thumb print of each and every candidate is unique and the candidate can provide the thumb print remotely also.

Iris Scanning Iris recognition is amongst the most robust and accurate biometric technologies available in the market today with existing large scale applications supporting databases in excess of millions of people. The Iris is a protected internal organ whose random texture is stable throughout life (from the 1st year onwards) and can be used as an identity document or a password offering a very high degree of identity assurance. The randomness of Iris patterns has very high dimensionality; recognition decisions are made with very high confidence levels supporting rapid and reliable exhaustive searches through national - sized databases in both 1:1 (verification) and 1:n (identification) mode with no human intervention. Advantages 1)Perform 1:n identification with no limitation on numbers. 2)The most robust biometric technology available in the market today, never had a False Acceptance. 3)Biometric templates once captured do not need to be enrolled again, iris stable through out a users

Disadvantages 1)Intrusive 2)A lot of memory for the data to be stored. 3)Very expensive Practical Scalability The Iris scanning technology is in practical use in areas of defence or national security but for the candidate impersonation this technology is not a cost effective solution as the iris scan cannot be provided by the candidate remotely.

Retinal Scanning A biometric identifier known as a retinal scan is used to map the unique patterns of a person's retina. The blood vessels within the retina absorb light more readily than the surrounding tissue and are easily identified with appropriate lighting. A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a person’s eye as they look through the scanner's eyepiece. This beam of light traces a standardized path on the retina. Because retinal blood vessels are more absorbent of this light than the rest of the eye, the amount of reflection varies during the scan. The pattern of variations is converted to computer code and stored in a database. Advantages a. Very high accuracy. b. There is no known way to replicate a retina. c.The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being.

Disadvantages 1)Very intrusive. 2)It has the stigma of consumer's thinking it is potentially harmful to the eye. 3)Very expensive. Practical Scalability Like iris scanning same goes with the retinal scanning. It being highly costly and will not be remotely available to the candidate is not a suitable solution for avoiding candidate impersonation.

Voice Recognition Voice recognition is "the technology by which sounds, words or phrases spoken by humans are converted into electrical signals, and these signals are transformed into coding patterns to which meaning has been assigned". While the concept could more generally be called "sound recognition", we focus here on the human voice because we most often and most naturally use our voices to communicate our ideas to others in our immediate surroundings. Advantages 1)Non intrusive. 2)Little time of verification (about five seconds). 3)Cheap technology. Disadvantages 1)A person’s voice can be easily recorded and used for unauthorized PC or network. 2)Low accuracy. 3)An illness such as a cold can change a person’s voice, making absolute identification difficult or impossible.

Practical Scalability The voice recognition has a very high scalability it is used in various sectors like healthcare, military, etc. but for avoiding candidate impersonation this technology is not a suitable solution because of its low accuracy and the technology can be easily spoofed.

Signature Verification Signature recognition is a behavioral biometric. It can be operated in two different ways: Static: In this mode, users write their signature on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the signature analyzing its shape. This group is also known as “off-line”. Dynamic: In this mode, users write their signature in a digitizing tablet, which acquires the signature in real time. Another possibility is the acquisition by means of stylus-operated PDAs. Dynamic recognition is also known as “on-line”. Dynamic information usually consists of the following information: 1)spatial coordinate x(t) 2) spatial coordinate y(t) 3) pressure p(t) 4) azimuth az(t) 5) inclination in(t)

Advantages 1)Non intrusive. 2)Little time of verification (about five seconds). 3)Cheap technology. Disadvantages 1)Signature verification is designed to verify subjects based on the traits of their unique signature. As a result, individuals who do not sign their names in a consistent manner may have difficulty enrolling and verifying in signature verification. 2)Signatures can be easily replicated 3)Error rate: 1 in 50.

Practical Scalability The signature recognition is practically used in various sectors, but this technique cannot be used for the avoiding candidate impersonation because of its high error rate and that the signatures can be easily replicated.

Comparison of Technologies Biometric Technology AccuracyCostDevices Required Social Acceptabilit y Iris Recognition High CameraMedium-Low Retinal ScanHigh CameraLow Facial Recognition Medium CameraHigh Voice Recognition Medium microphoneHigh Hand Geometry Medium-LowLowScannerHigh Finger PrintHighMediumScannerMedium Signature Recognition LowMediumOptic pen, Touch panel High

Conclusion Based on the Comparison and the discussion done above on various Biometric technologies. Facial recognition and finger print scan are the two most practical and cost effective solutions that can be used for avoiding candidate impersonation.

Thank You