Published on

A power point presentation that i put together for my project proposal in my arts and sciences capstone class.

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. BiometricsJ E F F VA N TA S S E L CAP 480M R S . M C C A RT HY
  2. 2. Problems with biometrics There are a few problems with using biometrics. “There are also devices that can capture iris images of a person walking within a few feet of a video camera (often behind a one-way mirror) so that it can be duplicated and used for illegitimate purposes. The real problem with biometrics is that once an individuals biometrics has been compromised, they are compromised for life and can never be trusted again. “(Strassmann, 2002). “However, my most severe objection to biometrics as an authentication method is their reliance on a central database that contains the identifying graphic templates. If such database is compromised, then the biometrics of ALL users in the database are compromised for life.” (Strassmann, 2002).
  3. 3. Solution The solution is to use another type of security along with using biometric devices. “Knowledge tokens, such as passwords, secret PINs (Personal Identification Numbers), or knowledge of personal data (knowing ones mothers maiden name, e.g.), or” Abernathy & Tien. (2003). “Physical tokens such as ID cards, passports, chip cards, or plain old keys.” Abernathy& Tien. (2003).
  4. 4. What are Biometrics? Firstly what are biometrics? According to the Electronic Frontier Foundation or EFF biometrics are “Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics. Many body parts, personal characteristics and imaging methods have been suggested and used for biometric systems: fingers, hands, feet, faces, eyes, ears, teeth, veins, voices, signatures, typing styles, gaits and odors.” (Abernathy & Tien, 2003).
  5. 5. What are biometrics? Continued. In other words biometrics is measuring the metrics of our biological make up. They can measure many different aspects that make up our bodies. Picture taken from
  6. 6. Types of biometric devices. The different types of biometric devices are as fallows: voice; - handwriting; - fingerprint(s); - face; - retina of the eye; - iris of the eye. And many more…
  7. 7. Pictures of biometric devices.
  8. 8. Facial Recognition Facial recognition is another biometric device that is heavily used in many different industries. It can be used to “geometrically map the face and also have a view base of the face. There are 3 algorithms that have been well studied that are used in facial recognition software; Principal Components Analysis (PCA), Linear Discriminant Analysis (LDA), and Elastic Bunch Graph Matching (EBGM).” ("Face recognition," 2006).
  9. 9. Facial Recognition Devices("Gambling on research," 2008). ("Biometrics: Identifying friend," 2010).("Thesis subject: Biometric," 2006). ("Thesis subject: Biometric," 2006).
  10. 10. Pros of biometric use “With both Biometric systems, you eliminate all problems associated with „buddy punching‟, but also lost/forgotten/replacement ID cards” ("Using biometric time," ). They can also be easy to use if set up right. They can help make your network more secure.
  11. 11. Picture References for fingerprint types for fingerprint scanner for handprint scanner for iris scanner Gambling on research. (2008, September 18). Retrieved from for woma‟s face recognition Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved from for man with many cameras Thesis subject: Biometric evaluation platform. (2006). Retrieved from for mug shots.
  12. 12. References Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Whos watching you?. Retrieved from Biometrics – problem or solution ?. (n.d.). Retrieved from Face recognition. (2006, August 7). Retrieved from Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from Using biometric time and attendance solutions. (n.d.). Retrieved from