the mighty ducks n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
The Mighty Ducks PowerPoint Presentation
Download Presentation
The Mighty Ducks

Loading in 2 Seconds...

play fullscreen
1 / 21

The Mighty Ducks - PowerPoint PPT Presentation


  • 98 Views
  • Uploaded on

The Mighty Ducks. Guzman Rodriguez, Wesley Marziano, Vitaliy Kovalchuk, Evan Hill. How do biometric technologies improve security and what are the possible flaws?. What is Biometrics?. M ethods for recognizing people based on one or more unique traits. Why use biometric authenication ?.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'The Mighty Ducks' - glynn


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
the mighty ducks

The Mighty Ducks

Guzman Rodriguez, Wesley Marziano, Vitaliy Kovalchuk, Evan Hill

what is biometrics
What is Biometrics?

Methods for recognizing people based on one or more unique traits.

why use biometric authenication
Why use biometric authenication?

Replaces passwords

Becoming more available

Generally more secure

types of biometric technologies
Types of Biometric Technologies
  • Physical
    • Fingerprint scan
    • Facial recognition
    • Iris scan
  • Behavioral
    • Voice recognition
    • Signature recognition
what goes into deciding what traits should be used for biometrics
What goes into deciding what traits should be used for biometrics

Does everyone have the trait?

Is it unique from person to person?

Does the trait stay the same as the person ages?

Is it easy to duplicate?

How easy is it to measure?

fingerprint scanner
Fingerprint scanner

Scans person’s finger and identifies the pattern of the ridges

Compares the pattern to the ones stored in the database

pros cons of fingerprint readers
Pros/cons of fingerprint readers
  • Pros:
    • Portable (USB powered devices)
    • Relatively easy to use
  • Cons
    • Finger prints get worn out
    • Methods to bypass it exist
face recognition
Face Recognition

Scans your face

Compares the facial traits to the scans in a database

pros cons of face scanners
Pros/Cons of Face Scanners
  • Pros
    • Good security
    • Hard to duplicate
  • Cons
    • Expensive
    • Have to scan all of user’s faces
    • Might be inconvenient
    • Faces change with age
iris scanner
Iris Scanner

Scans the person’s eye

Uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes

pros cons of iris scanner
Pros/Cons of Iris Scanner
  • Pros
    • Secure
    • Fast identitfication
  • Cons
    • Expensive
    • A certain level of light must be present
voice recognition
Voice Recognition

Person speaks into a microphone

The sound is compared to the ones stored in a database

pros cons of voice recognition
Pros/Cons of Voice Recognition
  • Pros
    • Not hard to use
    • No physical interaction
  • Cons
    • Loss of voice
    • Record and play back someone’s voice
signature recognition
Signature Recognition

User inputs a signature

Systems runs a check with the signatures found in a database

pros cons of signature recognition
Pros/Cons of Signature Recognition
  • Pros
    • Easily used
    • Relatively easy to implement
  • Cons
    • Can be forged
    • Difference in signatures from same person
current biometric uses
Current Biometric Uses
  • Examples:
    • Fingerprint and face recognition on laptops
    • Face recognition in airports
    • Fingerprints on travel documents
    • Safes with iris scans
    • Law enforcement
future uses for biometrics
Future Uses for Biometrics

Building access through facial recognition

Citywide camera networks with facial recognition

National databases for ID

Voice authentication over phone

summary
Summary

Physiological and behavioral biometrics

Biometric authentication is a promising field

the end
The End

Thank you for your attention

bibliography
Bibliography

"Biometrics Overview." Biometrics.gov. Web. 20 Nov. 2009. <http://biometrics.gov/Documents/BioOverview.pdf>.

"Case studies reveal the pros and cons of biometrics." TechRepublic Articles. Web. 20 Nov. 2009. <http://articles.techrepublic.com.com/5100-10878_11-5030410.html>.

Jain, A. K.; Ross, Arun; Prabhakar, Salil (January 2004), "An introduction to biometric recognition", IEEE Transactions on Circuits and Systems for Video Technology14th (1): 4– 20

"National Institute of Standards and Technology NIST; Who are you? Mobile ID devices find out using NIST guidelines. " Information Technology Business  8 Sep. 2009: Sciences Module, ProQuest. Web.  15 Oct. 2009.

"Pros and Cons." NTRG: Networks & Telecommunications Research Group. Web. 21 Nov. 2009. <http://ntrg.cs.tcd.ie/undergrad/4ba2.02/biometrics/prosncons.html>.