Presentation is loading. Please wait.

Presentation is loading. Please wait.

Jenna Lutton February 26th, 2007

Similar presentations


Presentation on theme: "Jenna Lutton February 26th, 2007"— Presentation transcript:

1 Jenna Lutton February 26th, 2007
Biometrics Jenna Lutton February 26th, 2007

2 Roadmap Introduction to Biometrics Facial Recognition Iris Scanning
Fingerprint Scanning Palm-Vein Biometrics Behaviometrics Summary Questions

3 Introduction Biometrics – Use of physical characteristics to identify a person Two goals: Verification – Am I who I claim I am? Identification – Who am I? Future of security Border patrol ID Cards ATM access

4 Facial Recognition Compare a person’s face from a still image (or video capture) against a face stored in a database Two approaches: Geometric matching Distance between facial features Template matching Facial image – 2D array of pixel intensity values Compare against multiple templates of whole face

5 Issues Illumination Time Delay Pose Variation Facial Expression
Multiple faces in image Wearing glasses, etc.

6 Fingerprint Scanning Very popular method of authentication
Every person has unique fingerprint Scanner gets an image of your fingerprint Compares pattern of specific fingerprint features (minutiae) against another pattern in a database

7 Only finds adequate number of common minutiae patterns

8 Problems Some can be fooled by images of fingerprints
Some can be fooled by molds Mythbusters: Developing ways to bypass these: Scanner checks if cells are alive Scanner checks if blood flowing through finger

9 Iris Scanning Use infrared to capture an image of the iris (visible ring that surrounds the pupil)

10 Iris Scanning (cont.) Each eye has a unique iris, has measurable features (striations, pits, furrows) Controls the amount of light that enters the eye After an image of the iris is taken, a pattern or code is generated based on its features

11 Advantages Have to be present at scanner Non-invasive
Not affected by contacts or glasses More points of comparison

12 Palm-Vein Biometrics Veins are also unique among people
Uses near-infrared to identify all of the veins in your hand and captures that image

13 Advantages Change little with age
Hard to spoof – not all veins visible Sanitary – don’t have to physically touch the scanner Used today as extra security layer at ATM machines

14 Behaviometrics Using behavioral characteristics of a person to verify or identify a person Example: Identify a person by the way they type Analyze keystroke timing Determined by finger length, motor skills, etc. Example: Handwriting analysis Speed/rhythm of writing Sequence in which you form letters

15 Summary Biometrics revolutionizing security
Not all methods are reliable or secure Trying to find more ways to uniquely identify a person

16 Questions?

17 Sources http://www.iridiantech.com/index2.php
Early, Mark. “ARE Biometrics the Key to Data Security?” EContent; Sep2006; Vol. 29 Issue 7; Pg Hall, Kenji. “Biometrics: Vein Scanners Show Progress.” Business Week Online; Pg 22


Download ppt "Jenna Lutton February 26th, 2007"

Similar presentations


Ads by Google