Your SlideShare is downloading. ×
0
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Biometrics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Biometrics

787

Published on

A power point presentation that i put together for my project proposal in my arts and sciences capstone class.

A power point presentation that i put together for my project proposal in my arts and sciences capstone class.

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
787
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
65
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. BiometricsJ E F F VA N TA S S E L CAP 480M R S . M C C A RT HY
  • 2. Problems with biometrics There are a few problems with using biometrics. “There are also devices that can capture iris images of a person walking within a few feet of a video camera (often behind a one-way mirror) so that it can be duplicated and used for illegitimate purposes. The real problem with biometrics is that once an individuals biometrics has been compromised, they are compromised for life and can never be trusted again. “(Strassmann, 2002). “However, my most severe objection to biometrics as an authentication method is their reliance on a central database that contains the identifying graphic templates. If such database is compromised, then the biometrics of ALL users in the database are compromised for life.” (Strassmann, 2002).
  • 3. Solution The solution is to use another type of security along with using biometric devices. “Knowledge tokens, such as passwords, secret PINs (Personal Identification Numbers), or knowledge of personal data (knowing ones mothers maiden name, e.g.), or” Abernathy & Tien. (2003). “Physical tokens such as ID cards, passports, chip cards, or plain old keys.” Abernathy& Tien. (2003).
  • 4. What are Biometrics? Firstly what are biometrics? According to the Electronic Frontier Foundation or EFF biometrics are “Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics. Many body parts, personal characteristics and imaging methods have been suggested and used for biometric systems: fingers, hands, feet, faces, eyes, ears, teeth, veins, voices, signatures, typing styles, gaits and odors.” (Abernathy & Tien, 2003).
  • 5. What are biometrics? Continued. In other words biometrics is measuring the metrics of our biological make up. They can measure many different aspects that make up our bodies. Picture taken from http://gsmtweet.com/biometric-security-fixes-and-flaws/
  • 6. Types of biometric devices. The different types of biometric devices are as fallows: voice; - handwriting; - fingerprint(s); - face; - retina of the eye; - iris of the eye. And many more…
  • 7. Pictures of biometric devices.
  • 8. Facial Recognition Facial recognition is another biometric device that is heavily used in many different industries. It can be used to “geometrically map the face and also have a view base of the face. There are 3 algorithms that have been well studied that are used in facial recognition software; Principal Components Analysis (PCA), Linear Discriminant Analysis (LDA), and Elastic Bunch Graph Matching (EBGM).” ("Face recognition," 2006).
  • 9. Facial Recognition Devices("Gambling on research," 2008). ("Biometrics: Identifying friend," 2010).("Thesis subject: Biometric," 2006). ("Thesis subject: Biometric," 2006).
  • 10. Pros of biometric use “With both Biometric systems, you eliminate all problems associated with „buddy punching‟, but also lost/forgotten/replacement ID cards” ("Using biometric time," ). They can also be easy to use if set up right. They can help make your network more secure.
  • 11. Picture References http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm for fingerprint types http://gsmtweet.com/biometric-security-fixes-and-flaws/ for fingerprint scanner http://www.hrindustries.co.uk/biometric-solutions.htm for handprint scanner http://www.biometric-security-devices.com/biometric-scanners.html for iris scanner Gambling on research. (2008, September 18). Retrieved from http://workingstiffs.blogspot.com/2008/09/gambling-on-research.html for woma‟s face recognition Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved from http://www.nist.gov/public_affairs/factsheet/biometrics2009.cfm for man with many cameras Thesis subject: Biometric evaluation platform. (2006). Retrieved from http://www.ecole.ensicaen.fr/~elabed/recherche_en.html for mug shots.
  • 12. References Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Whos watching you?. Retrieved from https://www.eff.org/wp/biometrics-whos-watching-you Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf Face recognition. (2006, August 7). Retrieved from http://www.biometrics.gov/Documents/facerec.pdf Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from http://www.strassmann.com/pubs/searchsecurity/2002- Using biometric time and attendance solutions. (n.d.). Retrieved from http://www.hrindustries.co.uk/biometric-solutions.htm

×