Presentation is loading. Please wait.

Presentation is loading. Please wait.

Text TOPIC DATETCS Confidential AVOID CANDIDATE IMPERSONATION.

Similar presentations


Presentation on theme: "Text TOPIC DATETCS Confidential AVOID CANDIDATE IMPERSONATION."— Presentation transcript:

1 Text TOPIC DATETCS Confidential AVOID CANDIDATE IMPERSONATION

2 INTRODUCTION Impersonation is meant to assume the character of another person. Candidate Impersonation is possible and many cases have been reported in many places. It gives bad name to the student as well the associated institute. With right usage of technology and human expertise, these shameful acts can be avoided. In the following slides, we will discuss about the various technologies available their pros and cons respectively. In the end we would propose the best possible technique for avoiding impersonation.

3 We will follow biometric scanning techniques for the purpose of avoiding candidate impersonation. Following are the techniques that are followed for biometric scanning 1)Facial recognition 2)Hand recognition 3)Fingerprint 4)Iris scanning 5)Signature verification 6)Voice recognition 7)Retinal scanning Proposed Methodology

4 Facial Recognition Facial recognition records the spatial geometry of distinguishing features of the face. Different vendors use different methods of facial recognition, however, all focus on measures of key features of the face. Advantages 1)Facial photographs do not disclose information that the person does not routinely disclose to the general public. 2) The public are already aware of its capture and use for identity verification 3) It is non-intrusive – the user does not have to touch or interact with a physical device for a substantial timeframe to be enrolled. 4) It can be captured from an endorsed photograph, not requiring the person to be physically present.

5 Disadvantages 1)Isn't always accurate 2)Hindered by glasses, masks, long hair etc. 3)Must ask users to have neutral face when pictures are being taken Practical scalability The facial recognition is a technology which is readily available and can be remotely accessed by any candidate means that the candidate can provide his photograph through any means and thereby we can perform the check at the time of examination.

6 Hand Recognition Hand geometry as the name suggests uses the shape of the hand to verify the person. Unlike iris, face or fingerprints, the human hand isn't unique. The existing systems use finger length, thickness, and curvature for the purposes of verification. Advantages 1)A very small template size, easy to maintain and store large database. 2) High reliability and accuracy. 3) Robust, user friendly and easy to integrate into existing and third party systems. 4) Relatively inexpensive offers excellent return on investment

7 Disadvantages 1) The hand geometry is not unique and cannot be used in identification system 2) Not ideal for growing children 3) Jewelry, limited dexterity, etc may pose a challenge in extracting the hand geometry information. Practical Scalability The hand recognition technology is currently in use in many areas like U.S. military uses it for the access control and majority of nuclear power plants uses it for the same purpose as well. But for the candidate impersonation this technique will not be a cost effective solution as the candidate will not be able to upload the hand scan remotely.

8 Fingerprint Recognition Fingerprint recognition identifies people by using the impressions made by the minute ridge formations or patterns found on the fingertips. Finger printing takes an image of a person's fingertips and records its characteristics - whorls, arches, and loops are recorded along with patterns of ridges, furrows, and minutiae. Information is processed as an image and further encoded as a computer algorithm. Advantages 1)Fairly small storage space is required for the biometric template, reducing the size of the database required. 2)It is one of the most developed biometrics, with more history, research, and design. 3)Each and every fingerprint including all the fingers are unique, even identical twins have different fingerprints.

9 4) Relatively inexpensive and offers high levels of accuracy. Disadvantages 1)For some people it is very intrusive, because is still related to criminal identification. 2)It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age 3)Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes approximately → Compression required (a factor of 10 approximately). Practical Scalability The finger print recognition technology is widely used in various sectors and is best suited to avoid the candidate impersonation as well as the thumb print of each and every candidate is unique and the candidate can provide the thumb print remotely also.

10 Iris Scanning Iris recognition is amongst the most robust and accurate biometric technologies available in the market today with existing large scale applications supporting databases in excess of millions of people. The Iris is a protected internal organ whose random texture is stable throughout life (from the 1st year onwards) and can be used as an identity document or a password offering a very high degree of identity assurance. The randomness of Iris patterns has very high dimensionality; recognition decisions are made with very high confidence levels supporting rapid and reliable exhaustive searches through national - sized databases in both 1:1 (verification) and 1:n (identification) mode with no human intervention. Advantages 1)Perform 1:n identification with no limitation on numbers. 2)The most robust biometric technology available in the market today, never had a False Acceptance. 3)Biometric templates once captured do not need to be enrolled again, iris stable through out a users

11 Disadvantages 1)Intrusive 2)A lot of memory for the data to be stored. 3)Very expensive Practical Scalability The Iris scanning technology is in practical use in areas of defence or national security but for the candidate impersonation this technology is not a cost effective solution as the iris scan cannot be provided by the candidate remotely.

12 Retinal Scanning A biometric identifier known as a retinal scan is used to map the unique patterns of a person's retina. The blood vessels within the retina absorb light more readily than the surrounding tissue and are easily identified with appropriate lighting. A retinal scan is performed by casting an unperceived beam of low-energy infrared light into a person’s eye as they look through the scanner's eyepiece. This beam of light traces a standardized path on the retina. Because retinal blood vessels are more absorbent of this light than the rest of the eye, the amount of reflection varies during the scan. The pattern of variations is converted to computer code and stored in a database. Advantages a. Very high accuracy. b. There is no known way to replicate a retina. c.The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being.

13 Disadvantages 1)Very intrusive. 2)It has the stigma of consumer's thinking it is potentially harmful to the eye. 3)Very expensive. Practical Scalability Like iris scanning same goes with the retinal scanning. It being highly costly and will not be remotely available to the candidate is not a suitable solution for avoiding candidate impersonation.

14 Voice Recognition Voice recognition is "the technology by which sounds, words or phrases spoken by humans are converted into electrical signals, and these signals are transformed into coding patterns to which meaning has been assigned". While the concept could more generally be called "sound recognition", we focus here on the human voice because we most often and most naturally use our voices to communicate our ideas to others in our immediate surroundings. Advantages 1)Non intrusive. 2)Little time of verification (about five seconds). 3)Cheap technology. Disadvantages 1)A person’s voice can be easily recorded and used for unauthorized PC or network. 2)Low accuracy. 3)An illness such as a cold can change a person’s voice, making absolute identification difficult or impossible.

15 Practical Scalability The voice recognition has a very high scalability it is used in various sectors like healthcare, military, etc. but for avoiding candidate impersonation this technology is not a suitable solution because of its low accuracy and the technology can be easily spoofed.

16 Signature Verification Signature recognition is a behavioral biometric. It can be operated in two different ways: Static: In this mode, users write their signature on paper, digitize it through an optical scanner or a camera, and the biometric system recognizes the signature analyzing its shape. This group is also known as “off-line”. Dynamic: In this mode, users write their signature in a digitizing tablet, which acquires the signature in real time. Another possibility is the acquisition by means of stylus-operated PDAs. Dynamic recognition is also known as “on-line”. Dynamic information usually consists of the following information: 1)spatial coordinate x(t) 2) spatial coordinate y(t) 3) pressure p(t) 4) azimuth az(t) 5) inclination in(t)

17 Advantages 1)Non intrusive. 2)Little time of verification (about five seconds). 3)Cheap technology. Disadvantages 1)Signature verification is designed to verify subjects based on the traits of their unique signature. As a result, individuals who do not sign their names in a consistent manner may have difficulty enrolling and verifying in signature verification. 2)Signatures can be easily replicated 3)Error rate: 1 in 50.

18 Practical Scalability The signature recognition is practically used in various sectors, but this technique cannot be used for the avoiding candidate impersonation because of its high error rate and that the signatures can be easily replicated.

19 Comparison of Technologies Biometric Technology AccuracyCostDevices Required Social Acceptabilit y Iris Recognition High CameraMedium-Low Retinal ScanHigh CameraLow Facial Recognition Medium CameraHigh Voice Recognition Medium microphoneHigh Hand Geometry Medium-LowLowScannerHigh Finger PrintHighMediumScannerMedium Signature Recognition LowMediumOptic pen, Touch panel High

20 Conclusion Based on the Comparison and the discussion done above on various Biometric technologies. Facial recognition and finger print scan are the two most practical and cost effective solutions that can be used for avoiding candidate impersonation.

21 Thank You


Download ppt "Text TOPIC DATETCS Confidential AVOID CANDIDATE IMPERSONATION."

Similar presentations


Ads by Google