Biometrics disadvantages
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Biometrics disadvantages

on

  • 3,309 views

The topic of our presentation is focusing on how the use of biometric systems can reveal sensitive personal information and how this can be a disadvantage.

The topic of our presentation is focusing on how the use of biometric systems can reveal sensitive personal information and how this can be a disadvantage.

Statistics

Views

Total Views
3,309
Views on SlideShare
3,308
Embed Views
1

Actions

Likes
1
Downloads
40
Comments
0

1 Embed 1

http://www.docshut.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Biometrics disadvantages Presentation Transcript

  • 1. The contents1- Background information: What is Biometrics?2- The positive side of biometrics3- Fraud, hacking, and their techniques4- Biometrics and privacy issues5- Conclusion
  • 2. What is Biometrics? Bios + Metric = “life measurement” Behavioral systems Physical systems Signature Verification DNA Voice Recognition Face Recognition Finger-printing Hand Geometry Iris and Retina Scan(Revett, 2007)
  • 3. What is Biometrics? 1- Identification mode: one-to-many comparison 2- Authentication mode: one-to-one comparison(Jain, Flynn, and Ross, 2008)
  • 4. Biometrics in action
  • 5. The positive side of Biometrics - Prevent unauthorized access - No need to remember passwords - Reduce the criminal act of fraud - Our human characteristics cannot be lost(Hariri and Shokouhi, 2012)(Jamil and Khan, 2011)
  • 6. How to cheat a biometric system(Matsumoto, 2002)(Takahashi and Hitachi, 2009)
  • 7. Fraud - Costs the British economy around 1.9 billion pounds per year - 1.8 million people in the UK fall victim to identity theft each year - 380,000 victims have been suffered of a more serious fraud(National Fraud Authority, 2011)
  • 8. Biometrics and privacy issues -Security versus health records -Popularity of biometrics in the future -A simultaneous health check?(Hariri and Shokouhi, 2011)(Pheterson, 2011)(Wolf-hope, 2011)
  • 9. Conclusion-Risk of using biometric systems-Misusage of personal information-An impact on the security of storedinformation
  • 10. References pt.1Hariri, M., and Shokouhi, S. (2011). Possibility of spoof attack againstrobustness of multibiometric authentication systems. Optical Engineering[e-journal], 50(2), 112-119. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 8 March2012]Hariri, M. and Shokouhi, S. (2012). Robustness of Multi BiometricAuthentication Systems against Spoofing. Computer and Information Science[e-journal], 5(1), 77-86. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 8 March2012]Jain,A., Flynn, P., and Ross, A. (2008). Handbook of biometrics.Newyork: Springer. Available through:http://www.springerlink.com/content/978-0-387-71040-2 [Retrieved 6March]
  • 11. References pt.2Jamil, D. and Khan, M. (2011). Keystroke pattern recognition preventingonline fraud. International Journal of Engineering Science and Technology[e-journal], 3(3), 1953-1958. Available through: The University of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 9 March2012]Matsumoto, T. (2002). A case study on user identification [PDF file] Availablethrough: http://web.mit.edu/6.857/OldStuff/Fall03/ref/gummy-slides.pdf[Retrieved 13 March 2012]National Fraud Authority. (2011). Annual fraud indicator [PDF file] Availablethrough: http://www.homeoffice.gov.uk/publications/agencies-public-bodies/nfa/annual-fraud-indicator/annual-fraud-indicator-2011?view=BinaryRetrieved 9 March 2012]Pheterson, J. (2011). Trends in Biometric Data Collection and Use. EmployeeRelations Law Journal [e-journal], 37(1), 64-67. Available through: TheUniversity of Liverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 5 March 2012]
  • 12. References pt.3Revett, K. (2007). A Bioinformatics Based Approach to BehaviouralBiometrics. Frontiers of Bioscience and Information Technologies [e-journal],15(3), 665-670. Available through: The University of Liverpool e-library,<www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 3 March 2012]Takahashi, K. and Hitachi, S. (2009). Generating Provably Secure CancelableFingerprint Templates based on Correlation-Invariant Random Filtering.International Conference on Theory, Applications, and Systems [e-journal],12(2), 12-16. Available through: The University of Liverpool e-library,<www.liv.ac.uk/library/e-library/e-books.html> [Retrieved 13 March 2012]Wolf-hope, P. (2011). Mobile Biometric Devices: What the Future Holds.Police chief [e-journal], 78(9), 38-47. Available through: The University ofLiverpool e-library, <www.liv.ac.uk/library/e-library/e-books.html> [Retrieved4 March 2012]