• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Biometrics
 

Biometrics

on

  • 728 views

A power point presentation that i put together for my project proposal in my arts and sciences capstone class.

A power point presentation that i put together for my project proposal in my arts and sciences capstone class.

Statistics

Views

Total Views
728
Views on SlideShare
666
Embed Views
62

Actions

Likes
2
Downloads
59
Comments
0

2 Embeds 62

http://jeffvantassel.yolasite.com 43
http://sitebuilder.yola.com 19

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Biometrics Biometrics Presentation Transcript

    • BiometricsJ E F F VA N TA S S E L CAP 480M R S . M C C A RT HY
    • Problems with biometrics There are a few problems with using biometrics. “There are also devices that can capture iris images of a person walking within a few feet of a video camera (often behind a one-way mirror) so that it can be duplicated and used for illegitimate purposes. The real problem with biometrics is that once an individuals biometrics has been compromised, they are compromised for life and can never be trusted again. “(Strassmann, 2002). “However, my most severe objection to biometrics as an authentication method is their reliance on a central database that contains the identifying graphic templates. If such database is compromised, then the biometrics of ALL users in the database are compromised for life.” (Strassmann, 2002).
    • Solution The solution is to use another type of security along with using biometric devices. “Knowledge tokens, such as passwords, secret PINs (Personal Identification Numbers), or knowledge of personal data (knowing ones mothers maiden name, e.g.), or” Abernathy & Tien. (2003). “Physical tokens such as ID cards, passports, chip cards, or plain old keys.” Abernathy& Tien. (2003).
    • What are Biometrics? Firstly what are biometrics? According to the Electronic Frontier Foundation or EFF biometrics are “Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics. Many body parts, personal characteristics and imaging methods have been suggested and used for biometric systems: fingers, hands, feet, faces, eyes, ears, teeth, veins, voices, signatures, typing styles, gaits and odors.” (Abernathy & Tien, 2003).
    • What are biometrics? Continued. In other words biometrics is measuring the metrics of our biological make up. They can measure many different aspects that make up our bodies. Picture taken from http://gsmtweet.com/biometric-security-fixes-and-flaws/
    • Types of biometric devices. The different types of biometric devices are as fallows: voice; - handwriting; - fingerprint(s); - face; - retina of the eye; - iris of the eye. And many more…
    • Pictures of biometric devices.
    • Facial Recognition Facial recognition is another biometric device that is heavily used in many different industries. It can be used to “geometrically map the face and also have a view base of the face. There are 3 algorithms that have been well studied that are used in facial recognition software; Principal Components Analysis (PCA), Linear Discriminant Analysis (LDA), and Elastic Bunch Graph Matching (EBGM).” ("Face recognition," 2006).
    • Facial Recognition Devices("Gambling on research," 2008). ("Biometrics: Identifying friend," 2010).("Thesis subject: Biometric," 2006). ("Thesis subject: Biometric," 2006).
    • Pros of biometric use “With both Biometric systems, you eliminate all problems associated with „buddy punching‟, but also lost/forgotten/replacement ID cards” ("Using biometric time," ). They can also be easy to use if set up right. They can help make your network more secure.
    • Picture References http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm for fingerprint types http://gsmtweet.com/biometric-security-fixes-and-flaws/ for fingerprint scanner http://www.hrindustries.co.uk/biometric-solutions.htm for handprint scanner http://www.biometric-security-devices.com/biometric-scanners.html for iris scanner Gambling on research. (2008, September 18). Retrieved from http://workingstiffs.blogspot.com/2008/09/gambling-on-research.html for woma‟s face recognition Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved from http://www.nist.gov/public_affairs/factsheet/biometrics2009.cfm for man with many cameras Thesis subject: Biometric evaluation platform. (2006). Retrieved from http://www.ecole.ensicaen.fr/~elabed/recherche_en.html for mug shots.
    • References Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Whos watching you?. Retrieved from https://www.eff.org/wp/biometrics-whos-watching-you Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf Face recognition. (2006, August 7). Retrieved from http://www.biometrics.gov/Documents/facerec.pdf Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from http://www.strassmann.com/pubs/searchsecurity/2002- Using biometric time and attendance solutions. (n.d.). Retrieved from http://www.hrindustries.co.uk/biometric-solutions.htm