Emerging Technology
Biometrics & I/P & O/P Computers
The Emerging Technology for computers inputs, Outputs and User
Verifications (Biometrics)
 Author: Ala’a ElBeheri, www.alaaelbeheri.weebly.com
 Algonquin College – Ottawa
 OCT-Information Technology and The Business Student
Computer Inputs and Outputs
Input: Getting Data from the User to the
Computer
Keyboard
Mouse
Trackball
Source Data Automation: Collecting Data Where It Starts
Magnetic-Ink Character Recognition
Scanner
Optical Character Recognition
Bar Codes
Handwritten Characters
Imaging
Data Collection Devices
Voice Input
Touch Screens
Latest DATA collection Devices
Output:
Types of Screens CRT
Terminals
Printers
Voice Output
Music Output
Latest on Computer Inputs
Computer Graphics
Business Graphics
Video Graphics
Biometrics and Verification
Biometrics is automated methods of recognizing a person based on a physiological or
behavioural characteristic. Among the features measured are face, fingerprints, hand
geometry, handwriting, iris, retinal, vein, and voice. Biometric data are separate and
distinct from personal information.
Latest on Computer Graphics
Biometrics and IT security
Authentication is a type of system that relies on the
unique biological characteristics of individuals to
verify identity for secure access to electronic systems.
Identification
The automatic identification of living individuals by us
ing the
physiological and behavioural characteristics; "negativ
e identification can only be accomplished
through biometric identification and
Verification is any means by which a person can be
uniquely identified by evaluating one or more
distinguishing biological traits. Unique identifiers
include fingerprints, hand geometry, earlobe geometry,
retina and iris patterns, voice waves, DNA, and
signatures
Physical Biometrics:
Finger Print Recognition techniques
A fingerprint I system needs to get an image of your finger, and it needs to determine whether the
pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned
images.
This is the identification of the individual by the unique pattern in the face.
Facial recognition (or face recognition) is a type of biometric software application that can
identify a specific individual in a digital image by analyzing and comparing patterns
Facial Recognition Facial
Latest on Biometrics
Iris Recognition
This is the identification of the individual by the unique pattern in the iris.
It is an automated recognition technique as a biometrically based technology for personal
identification and verification.
Retina Recognition
This is an automated method of biometric identification that uses mathematical pattern-
recognition techniques on video images of one or both of the irises of an individual's eyes,
whose complex random patterns are unique, stable, and can be seen from some distance.
Behavioral Biometrics:
This is the identification of a person from characteristics of voices voice recognition there is a
difference between speaker recognition (recognizing who is speaking) and speech
recognition (recognizing what is being said).
Signature/handwriting
Signature recognition authentication, or dynamic signature analysis, authenticates identity by
measuring and analyzing handwritten signatures
Keystroke/patterning
Keystroke dynamics monitors keyboard inputs at thousands of times per second to identify a
user by his or her habitual typing rhythm patterns.
Biometrics and Security
 With biometrics, “you know that the individual accessing secure areas or information is not
just an individual holding the proper credential, but is in fact the person who has been
granted access, and this improves security and provides an audit trail.
Biometrics and Security
Conclusion
 There are many emerging technologies in computer inputs and outputs that make the
Biometrics technology evolving so rapid in the market and its application and utilization is
endless!
 · Biometrics offers unparalleled ability to quickly and accurately capture real-
Continue:
Time, labour data and provide a non-repudiated audit trail.
Biometrics has undergone intense scrutiny and the results are in - when
Properly deployed, biometrics work well and are safe, secure, and accurate.
References
"Biometrics: Overview". Biometrics.cse.msu.edu. 6 September 2007.
Retrieved 2012-06-10.
Jain, A.; Hong, L. and Pankanti, S. (2000). "Biometric
Identification". Communications of the ACM, 43(2), p. 91–98. DOI
10.1145/328236.328110
Jain, Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain,
AK; Flynn; Ross, A. Handbook of Biometrics. Springer .ISBN 978-0-
387-71040-2.
Sahidullah, Md (2015). "Enhancement of Speaker Recognition
Performance Using Block Level, Relative and Temporal Information of
Subband Energies". PhD Thesis (Indian Institute of Technology
Kharagpur).

Alaa elbeheri research_presentation

  • 1.
  • 2.
    The Emerging Technologyfor computers inputs, Outputs and User Verifications (Biometrics)  Author: Ala’a ElBeheri, www.alaaelbeheri.weebly.com  Algonquin College – Ottawa  OCT-Information Technology and The Business Student
  • 3.
    Computer Inputs andOutputs Input: Getting Data from the User to the Computer Keyboard Mouse Trackball
  • 4.
    Source Data Automation:Collecting Data Where It Starts Magnetic-Ink Character Recognition Scanner Optical Character Recognition Bar Codes Handwritten Characters Imaging
  • 5.
    Data Collection Devices VoiceInput Touch Screens
  • 6.
  • 7.
    Output: Types of ScreensCRT Terminals Printers Voice Output Music Output
  • 8.
  • 9.
  • 10.
    Biometrics and Verification Biometricsis automated methods of recognizing a person based on a physiological or behavioural characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric data are separate and distinct from personal information.
  • 11.
  • 12.
    Biometrics and ITsecurity Authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. Identification The automatic identification of living individuals by us ing the physiological and behavioural characteristics; "negativ e identification can only be accomplished through biometric identification and Verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, DNA, and signatures
  • 13.
    Physical Biometrics: Finger PrintRecognition techniques A fingerprint I system needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images.
  • 14.
    This is theidentification of the individual by the unique pattern in the face. Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns Facial Recognition Facial
  • 15.
  • 16.
    Iris Recognition This isthe identification of the individual by the unique pattern in the iris. It is an automated recognition technique as a biometrically based technology for personal identification and verification.
  • 17.
    Retina Recognition This isan automated method of biometric identification that uses mathematical pattern- recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex random patterns are unique, stable, and can be seen from some distance.
  • 18.
    Behavioral Biometrics: This isthe identification of a person from characteristics of voices voice recognition there is a difference between speaker recognition (recognizing who is speaking) and speech recognition (recognizing what is being said).
  • 19.
    Signature/handwriting Signature recognition authentication,or dynamic signature analysis, authenticates identity by measuring and analyzing handwritten signatures
  • 20.
    Keystroke/patterning Keystroke dynamics monitorskeyboard inputs at thousands of times per second to identify a user by his or her habitual typing rhythm patterns.
  • 21.
    Biometrics and Security With biometrics, “you know that the individual accessing secure areas or information is not just an individual holding the proper credential, but is in fact the person who has been granted access, and this improves security and provides an audit trail.
  • 22.
  • 23.
    Conclusion  There aremany emerging technologies in computer inputs and outputs that make the Biometrics technology evolving so rapid in the market and its application and utilization is endless!  · Biometrics offers unparalleled ability to quickly and accurately capture real-
  • 24.
    Continue: Time, labour dataand provide a non-repudiated audit trail. Biometrics has undergone intense scrutiny and the results are in - when Properly deployed, biometrics work well and are safe, secure, and accurate.
  • 25.
    References "Biometrics: Overview". Biometrics.cse.msu.edu.6 September 2007. Retrieved 2012-06-10. Jain, A.; Hong, L. and Pankanti, S. (2000). "Biometric Identification". Communications of the ACM, 43(2), p. 91–98. DOI 10.1145/328236.328110 Jain, Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain, AK; Flynn; Ross, A. Handbook of Biometrics. Springer .ISBN 978-0- 387-71040-2. Sahidullah, Md (2015). "Enhancement of Speaker Recognition Performance Using Block Level, Relative and Temporal Information of Subband Energies". PhD Thesis (Indian Institute of Technology Kharagpur).