Presentation is loading. Please wait.

Presentation is loading. Please wait.

+ Hand Biometrics Measurement and biometric technologies for identification and security applications.

Similar presentations


Presentation on theme: "+ Hand Biometrics Measurement and biometric technologies for identification and security applications."— Presentation transcript:

1 + Hand Biometrics Measurement and biometric technologies for identification and security applications

2 + Hand Biometrics Learn about biometrics technology Learn about engineering product planning and design Learn about meeting the needs of society Learn about teamwork and working in groups 2 Objectives 2

3 + Hand Biometrics Measurement of a physical characteristic Examples include: Fingerprints DNA Retinal pattern Hand dimensions 3 What is a biometric? 3

4 + Hand Biometrics Universality – each person should have the characteristic. Uniqueness – how well a biometric separates individuals from others. Permanence – how well a biometric resists aging, variance over time. Collectability – ease of acquisition, measurement. Performance – accuracy, speed, and robustness of technology used. Acceptability – degree of approval of a technology. Circumvention – ease of use of a substitute. 4 Properties of a biometric 4

5 + Hand Biometrics Biometrics are used to match an unknown sample to a database of known samples Criminal investigations Biometrics are used to authenticate identities Fingerprint computer login 5 Why use a biometric? 5

6 + Hand Biometrics Create a database of 4 known samples from measurements of your hands Develop a rule or algorithm by which you can: …accept an unknown sample and match it to an entry in your database; or …reject the unknown sample as not appearing in the database at all 6 Your Turn 6

7 + Hand Biometrics Work in groups of 4 Each person gets their hand measured 2 times You measure your own right hand Another teammate measures your right hand 1 “Testing” sample, 1 “Database” sample DO NOT SWAP FORMS! 7 Procedure – Part 1 Testing Sample A___ B___ C___ D___ Database Sample A___ B___ C___ D___ 7

8 + Hand Biometrics Measuring a hand 8 Measurement A: Distance from index fingertip to bottom knuckle 8

9 + Hand Biometrics Measuring a hand 9 Measurement B: Width of ring finger, measured across the top knuckle 9

10 + Hand Biometrics Measuring a hand 10 Measurement C: Width of palm across 4 bottom knuckles 10

11 + Hand Biometrics Measuring a hand 11 Measurement D: Width of palm from middle knuckle of thumb across hand 11

12 A B C D Measurement A: Distance from index fingertip to bottom knuckle Measurement B: Width of ring finger, measured across the top knuckle Measurement C: Width of palm across 4 bottom knuckles Measurement D: Width of palm from middle knuckle of thumb across hand 12

13 + Hand Biometrics Set aside all 4 white “Testing” forms Looking at just the 4 pink Database samples, develop a mathematical and/or logical rule that can be used to match an unknown sample to an entry in the “Database” 13 Procedure – Part 2 Database Sample A___ B___ C___ D___ Database Sample A___ B___ C___ D___ Database Sample A___ B___ C___ D___ Database Sample A___ B___ C___ D___ 13

14 + Hand Biometrics Let S n =A n +B n +C n +D n 14 Example Rule S 3 = 20.5cm S 4 = 24.9cm S 2 = 25.3cm S 1 = 22.1cm Testing Sample A___ B___ C___ D___ S = 24.7cm Compute S n for each entry in “Database” Compute S for unknown test sample Choose Database sample with least error < 0.5 cm, Else state “No Match” Error = 0.2cm MATCH Database Sample A___ B___ C___ D___ Database Sample A___ B___ C___ D___ Database Sample A___ B___ C___ D___ Database Sample A___ B___ C___ D___ 14

15 + Hand Biometrics Combine “Testing” samples for entire table (8 samples) Mix and shuffle “Testing” samples Each group picks 2 random Testing samples For each sample, use your RULE to determine if there is a match in your “Database” and, if yes, which entry matches 15 Procedure – Part 3 15

16 + Hand Biometrics Fill in worksheet 16 Procedure – Part 3 16


Download ppt "+ Hand Biometrics Measurement and biometric technologies for identification and security applications."

Similar presentations


Ads by Google