Security measures (Microsoft Powerpoint)

5,826 views

Published on

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
5,826
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
81
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Security measures (Microsoft Powerpoint)

  1. 1. o o Process where user verify that they are who they say they are. The user who attempts to perform function in a system is in fact the user who is authorized to do so.
  2. 2. METHOD OF
  3. 3. Device that translate personal characteristic into a digital code stored in the database
  4. 4.        Fingerprint Recognition Facial Recognition Hand Geometry Scanning Iris Scanning Retinal Scanning Voice Recognition Signature Verification System
  5. 5. o To prevent fake finger from being used o Measure blood flow or check correctly arrayed ridges
  6. 6. o Analyses the characteristic of an individual’s face images o Capture through a digital video camera o Touted as a fantastic system for recognizing potential treats
  7. 7. Measure and analysis of the shape of one’s hand o Individual features are not descriptive for identification o Possible to devise a method by combining various individual and measurement of finger and hands o
  8. 8. o o o Analyses the feature that exist in the coloured tissue surrounding the pupil The scan use a regular video camera and can be done from further away thank a retinal scan Will work perfectly and get the accurate measurement that can be use in identification purpose
  9. 9. o o o o Scanning the retina and analysing the layer of blood vessel at the back of the eye Using a low-intensity light source and a optical coupler Requires user to remove glasses , place their eye to the device and focus on a certain point The accuracy is very good and the cost is fair
  10. 10. o o o o Compares a person’s live speech with their stored voice pattern Requires user to speak into a microphone and the word or anything that he speaks can be his password or an access phrase Most voice recognition devices require the high and low frequencies of the sound to match , which is difficult for many recording instrument to recreate well Fair and the cost reasonable
  11. 11. o o o o o Recognizes the shape of user handwritten signature as measuring the pressure exerted and the motion use to write the signature Special pen and tab are used The authenticity is determined by , comparing an input signature to a stored reference set (template) consisting of three signature The similarity between input signature are reference set is computed using string matching and compared to a threshold Fair and the price is excellent
  12. 12. Picture 2 : Visualization of iris scan and extracted “IrisCode” Picture (C) IriScan , Inc.
  13. 13. Picture 3 : Digitized fingerprint image with the minutiae points extracted. Image (C) 1998 Idex AS
  14. 14. Picture 4 : Hand with biometric measurements visualized Image (C) Michigan State University
  15. 15. o From this assignment I can conclude that authentication is one of the security measure . One of the method of authentication is Biometric Devices . The biometric method is the method that are commonly use . There are seven example of Biometric . From this assignment , I also find out that the Fingerprint Recognition is the best method because the fingerprint is very unique , different person will have the different fingerprint . It also the best method because the accuracy in this method is good and the cost involved is cheaper than the other method .
  16. 16. o Reference ICT form 4 book o Internet http://www.iriscan.com/basic.htm

×