Your SlideShare is downloading. ×
  • Like
Biometrics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply
Published

A power point presentation that i put together for my project proposal in my arts and sciences capstone class.

A power point presentation that i put together for my project proposal in my arts and sciences capstone class.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
711
On SlideShare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
62
Comments
0
Likes
2

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. BiometricsJ E F F VA N TA S S E L CAP 480M R S . M C C A RT HY
  • 2. Problems with biometrics There are a few problems with using biometrics. “There are also devices that can capture iris images of a person walking within a few feet of a video camera (often behind a one-way mirror) so that it can be duplicated and used for illegitimate purposes. The real problem with biometrics is that once an individuals biometrics has been compromised, they are compromised for life and can never be trusted again. “(Strassmann, 2002). “However, my most severe objection to biometrics as an authentication method is their reliance on a central database that contains the identifying graphic templates. If such database is compromised, then the biometrics of ALL users in the database are compromised for life.” (Strassmann, 2002).
  • 3. Solution The solution is to use another type of security along with using biometric devices. “Knowledge tokens, such as passwords, secret PINs (Personal Identification Numbers), or knowledge of personal data (knowing ones mothers maiden name, e.g.), or” Abernathy & Tien. (2003). “Physical tokens such as ID cards, passports, chip cards, or plain old keys.” Abernathy& Tien. (2003).
  • 4. What are Biometrics? Firstly what are biometrics? According to the Electronic Frontier Foundation or EFF biometrics are “Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics. Many body parts, personal characteristics and imaging methods have been suggested and used for biometric systems: fingers, hands, feet, faces, eyes, ears, teeth, veins, voices, signatures, typing styles, gaits and odors.” (Abernathy & Tien, 2003).
  • 5. What are biometrics? Continued. In other words biometrics is measuring the metrics of our biological make up. They can measure many different aspects that make up our bodies. Picture taken from http://gsmtweet.com/biometric-security-fixes-and-flaws/
  • 6. Types of biometric devices. The different types of biometric devices are as fallows: voice; - handwriting; - fingerprint(s); - face; - retina of the eye; - iris of the eye. And many more…
  • 7. Pictures of biometric devices.
  • 8. Facial Recognition Facial recognition is another biometric device that is heavily used in many different industries. It can be used to “geometrically map the face and also have a view base of the face. There are 3 algorithms that have been well studied that are used in facial recognition software; Principal Components Analysis (PCA), Linear Discriminant Analysis (LDA), and Elastic Bunch Graph Matching (EBGM).” ("Face recognition," 2006).
  • 9. Facial Recognition Devices("Gambling on research," 2008). ("Biometrics: Identifying friend," 2010).("Thesis subject: Biometric," 2006). ("Thesis subject: Biometric," 2006).
  • 10. Pros of biometric use “With both Biometric systems, you eliminate all problems associated with „buddy punching‟, but also lost/forgotten/replacement ID cards” ("Using biometric time," ). They can also be easy to use if set up right. They can help make your network more secure.
  • 11. Picture References http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm for fingerprint types http://gsmtweet.com/biometric-security-fixes-and-flaws/ for fingerprint scanner http://www.hrindustries.co.uk/biometric-solutions.htm for handprint scanner http://www.biometric-security-devices.com/biometric-scanners.html for iris scanner Gambling on research. (2008, September 18). Retrieved from http://workingstiffs.blogspot.com/2008/09/gambling-on-research.html for woma‟s face recognition Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved from http://www.nist.gov/public_affairs/factsheet/biometrics2009.cfm for man with many cameras Thesis subject: Biometric evaluation platform. (2006). Retrieved from http://www.ecole.ensicaen.fr/~elabed/recherche_en.html for mug shots.
  • 12. References Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Whos watching you?. Retrieved from https://www.eff.org/wp/biometrics-whos-watching-you Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf Face recognition. (2006, August 7). Retrieved from http://www.biometrics.gov/Documents/facerec.pdf Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from http://www.strassmann.com/pubs/searchsecurity/2002- Using biometric time and attendance solutions. (n.d.). Retrieved from http://www.hrindustries.co.uk/biometric-solutions.htm