Biometric Inaccuracies
Project Team 9: Tanner Ellenberger and Grant Miller
Biometric Inaccuracies Project Team 9: Tanner Ellenberger and Grant - - PowerPoint PPT Presentation
Biometric Inaccuracies Project Team 9: Tanner Ellenberger and Grant Miller Overview History Types of biometrics, how they work Overall effectiveness Risks/Downsides (problem) Known alternatives Our solution
Project Team 9: Tanner Ellenberger and Grant Miller
for transactions
various body dimensions
fingerprints of inmates
90s, early 2000’s
1. Proper recording/scanning device records initial appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares new input to original stored input 5. If new input matches original stored input, access granted
Azimpourkivi, et al. “A Secure Mobile Authentication Alternative to Biometrics.” [1402.1128] Long Short-Term Memory Based Recurrent Neural Network Architectures for Large Vocabulary Speech Recognition, 7 Dec. 2017, arxiv.org/abs/1712.02483. Yang, Kai, et al. “Consent Biometrics.” Neurocomputing, vol. 100, 2013, pp. 153–162., doi:10.1016/j.neucom.2011.12.044. Indrayani E (2014) The Effectiveness and the Efficiency of the Use of Biometric Systems in Supporting National Database Based on Single ID Card Number (The Implementation of Electronik ID Card in Bandung). J Inform Tech Softw Eng 4:129. doi:10.4172/2165-7866.1000129 Shahnewaz, Shaon. “The Top Seven Advantages of a Biometric Identification Management System”. M2SYS. Apr 4, 2016. Web. Jun 24, 2018. Mayhew, S. (2018, March 21). History of Biometrics. Retrieved from https://www.biometricupdate.com/201802/history-of-biometrics-2 Penny, Wayne. “Biometrics: A Double Edged Sword - Security and Privacy”. SANS Institute. 2002. Web. Jun 24, 2018.