The Mighty Ducks. Guzman Rodriguez, Wesley Marziano, Vitaliy Kovalchuk, Evan Hill. How do biometric technologies improve security and what are the possible flaws?. What is Biometrics?. M ethods for recognizing people based on one or more unique traits. Why use biometric authenication ?.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Guzman Rodriguez, Wesley Marziano, Vitaliy Kovalchuk, Evan Hill
Methods for recognizing people based on one or more unique traits.
Becoming more available
Generally more secure
Does everyone have the trait?
Is it unique from person to person?
Does the trait stay the same as the person ages?
Is it easy to duplicate?
How easy is it to measure?
Scans person’s finger and identifies the pattern of the ridges
Compares the pattern to the ones stored in the database
Scans your face
Compares the facial traits to the scans in a database
Scans the person’s eye
Uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes
Person speaks into a microphone
The sound is compared to the ones stored in a database
User inputs a signature
Systems runs a check with the signatures found in a database
Building access through facial recognition
Citywide camera networks with facial recognition
National databases for ID
Voice authentication over phone
Physiological and behavioral biometrics
Biometric authentication is a promising field
Thank you for your attention
"Biometrics Overview." Biometrics.gov. Web. 20 Nov. 2009. <http://biometrics.gov/Documents/BioOverview.pdf>.
"Case studies reveal the pros and cons of biometrics." TechRepublic Articles. Web. 20 Nov. 2009. <http://articles.techrepublic.com.com/5100-10878_11-5030410.html>.
Jain, A. K.; Ross, Arun; Prabhakar, Salil (January 2004), "An introduction to biometric recognition", IEEE Transactions on Circuits and Systems for Video Technology14th (1): 4– 20
"National Institute of Standards and Technology NIST; Who are you? Mobile ID devices find out using NIST guidelines. " Information Technology Business 8 Sep. 2009: Sciences Module, ProQuest. Web. 15 Oct. 2009.
"Pros and Cons." NTRG: Networks & Telecommunications Research Group. Web. 21 Nov. 2009. <http://ntrg.cs.tcd.ie/undergrad/4ba2.02/biometrics/prosncons.html>.