biometric inaccuracies
play

Biometric Inaccuracies Project Team 9: Tanner Ellenberger and Grant - PowerPoint PPT Presentation

Biometric Inaccuracies Project Team 9: Tanner Ellenberger and Grant Miller Overview History Types of biometrics, how they work Overall effectiveness Risks/Downsides (problem) Known alternatives Our solution


  1. Biometric Inaccuracies Project Team 9: Tanner Ellenberger and Grant Miller

  2. Overview History ● Types of biometrics, how they work ● Overall effectiveness ● Risks/Downsides (problem) ● Known alternatives ● Our solution ●

  3. History Biometrics used since 500 B.C by Babylonian merchants ● for transactions Bertillon System was used in mid 1800s to measure ● various body dimensions Henry System implemented in late 1800s to include ● fingerprints of inmates Biometrics we see today were not implemented until late ● 90s, early 2000’s

  4. How Biometrics Work 1. Proper recording/scanning device records initial appropriate biometric input 2. System turns biometric input into storable data 3. User seeking access presents biometric input to device 4. Device compares new input to original stored input 5. If new input matches original stored input, access granted

  5. Popular Types of Biometrics ● Fingerprint ● Retina ● Iris ● Facial ● Voice ● Signature

  6. Effectiveness ● Convenient, easy to use ● Very unique ● Always with you ● Easy to implement

  7. Risks/Downsides Cannot change your DNA if compromised ● Lack of privacy ● Users can be forced to use their biometric with physical force ● Can be manipulated ●

  8. Alternatives ● Password/Passphrase ● Personal Device Check ● Two-Factor ● Two-Step ● Randomly Generated Codes

  9. Solution AI.Lock ● User takes picture of unique object or scene (reference image) ● Must take picture of same object/scene for authorization (candidate image) ● Only stores a hash of the image ●

  10. Conclusion ● Biometric History ● How biometrics work ● Types of biometrics ● Effectiveness of biometrics ● Risks of Biometrics ● Biometric Alternatives ● Our Solution

  11. Works Cited Azimpourkivi, et al. “A Secure Mobile Authentication Alternative to Biometrics.” [1402.1128] Long Short-Term Memory Based Recurrent Neural Network Architectures for Large Vocabulary Speech Recognition , 7 Dec. 2017, arxiv.org/abs/1712.02483. Yang, Kai, et al. “Consent Biometrics.” Neurocomputing , vol. 100, 2013, pp. 153–162., doi:10.1016/j.neucom.2011.12.044. Indrayani E (2014) The Effectiveness and the Efficiency of the Use of Biometric Systems in Supporting National Database Based on Single ID Card Number (The Implementation of Electronik ID Card in Bandung). J Inform Tech Softw Eng 4:129. doi:10.4172/2165-7866.1000129 Shahnewaz, Shaon. “The Top Seven Advantages of a Biometric Identification Management System”. M2SYS . Apr 4, 2016. Web. Jun 24, 2018. Mayhew, S. (2018, March 21). History of Biometrics. Retrieved from https://www.biometricupdate.com/201802/history-of-biometrics-2 Penny, Wayne. “Biometrics: A Double Edged Sword - Security and Privacy”. SANS Institute. 2002. Web. Jun 24, 2018.

  12. Questions ?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend