1 / 21

The Mighty Ducks

The Mighty Ducks. Guzman Rodriguez, Wesley Marziano, Vitaliy Kovalchuk, Evan Hill. How do biometric technologies improve security and what are the possible flaws?. What is Biometrics?. M ethods for recognizing people based on one or more unique traits. Why use biometric authenication ?.

glynn
Download Presentation

The Mighty Ducks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Mighty Ducks Guzman Rodriguez, Wesley Marziano, Vitaliy Kovalchuk, Evan Hill

  2. How do biometric technologies improve security and what are the possible flaws?

  3. What is Biometrics? Methods for recognizing people based on one or more unique traits.

  4. Why use biometric authenication? Replaces passwords Becoming more available Generally more secure

  5. Types of Biometric Technologies • Physical • Fingerprint scan • Facial recognition • Iris scan • Behavioral • Voice recognition • Signature recognition

  6. What goes into deciding what traits should be used for biometrics Does everyone have the trait? Is it unique from person to person? Does the trait stay the same as the person ages? Is it easy to duplicate? How easy is it to measure?

  7. Fingerprint scanner Scans person’s finger and identifies the pattern of the ridges Compares the pattern to the ones stored in the database

  8. Pros/cons of fingerprint readers • Pros: • Portable (USB powered devices) • Relatively easy to use • Cons • Finger prints get worn out • Methods to bypass it exist

  9. Face Recognition Scans your face Compares the facial traits to the scans in a database

  10. Pros/Cons of Face Scanners • Pros • Good security • Hard to duplicate • Cons • Expensive • Have to scan all of user’s faces • Might be inconvenient • Faces change with age

  11. Iris Scanner Scans the person’s eye Uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes

  12. Pros/Cons of Iris Scanner • Pros • Secure • Fast identitfication • Cons • Expensive • A certain level of light must be present

  13. Voice Recognition Person speaks into a microphone The sound is compared to the ones stored in a database

  14. Pros/Cons of Voice Recognition • Pros • Not hard to use • No physical interaction • Cons • Loss of voice • Record and play back someone’s voice

  15. Signature Recognition User inputs a signature Systems runs a check with the signatures found in a database

  16. Pros/Cons of Signature Recognition • Pros • Easily used • Relatively easy to implement • Cons • Can be forged • Difference in signatures from same person

  17. Current Biometric Uses • Examples: • Fingerprint and face recognition on laptops • Face recognition in airports • Fingerprints on travel documents • Safes with iris scans • Law enforcement

  18. Future Uses for Biometrics Building access through facial recognition Citywide camera networks with facial recognition National databases for ID Voice authentication over phone

  19. Summary Physiological and behavioral biometrics Biometric authentication is a promising field

  20. The End Thank you for your attention

  21. Bibliography "Biometrics Overview." Biometrics.gov. Web. 20 Nov. 2009. <http://biometrics.gov/Documents/BioOverview.pdf>. "Case studies reveal the pros and cons of biometrics." TechRepublic Articles. Web. 20 Nov. 2009. <http://articles.techrepublic.com.com/5100-10878_11-5030410.html>. Jain, A. K.; Ross, Arun; Prabhakar, Salil (January 2004), "An introduction to biometric recognition", IEEE Transactions on Circuits and Systems for Video Technology14th (1): 4– 20 "National Institute of Standards and Technology NIST; Who are you? Mobile ID devices find out using NIST guidelines. " Information Technology Business  8 Sep. 2009: Sciences Module, ProQuest. Web.  15 Oct. 2009. "Pros and Cons." NTRG: Networks & Telecommunications Research Group. Web. 21 Nov. 2009. <http://ntrg.cs.tcd.ie/undergrad/4ba2.02/biometrics/prosncons.html>.

More Related