BIOMETRICS Security Systems 5338025 Hyungseok C. 5418102 Wooram - - PowerPoint PPT Presentation

biometrics
SMART_READER_LITE
LIVE PREVIEW

BIOMETRICS Security Systems 5338025 Hyungseok C. 5418102 Wooram - - PowerPoint PPT Presentation

BIS4857 Internet Security BIOMETRICS Security Systems 5338025 Hyungseok C. 5418102 Wooram L. 5655248 Jutamas T. CONTENTS What is Biometric Security System? Evolution of Biometric Security Systems Types of Biometric Security


slide-1
SLIDE 1

BIS4857 Internet Security

BIOMETRICS

Security Systems

5338025 Hyungseok C. 5418102 Wooram L. 5655248 Jutamas T.

slide-2
SLIDE 2

CONTENTS

▹ What is Biometric Security System? ▹ Evolution of Biometric Security Systems ▹ Types of Biometric Security Systems ▹ Biometric Security System Advantages ▹ Biometric Security System Issues & Concerns ▹ Future of Biometric Security Systems

slide-3
SLIDE 3

What is Biometric Security System?

slide-4
SLIDE 4

What is Biometric System?

Biometric ▹ come from the Greek words ▸ “bio” (life), ▸ and “metric” (to measure) ▹ Is unique physical and logical characteristics or traits of human body Biometric System ▸ Will collect all those biometric data and store in order to use for verifying personal identity.

slide-5
SLIDE 5

Seven Biometric System Criteria

Uniqueness ▹ The priority one requirement for biometric data ▹ Indicate how differently and uniquely the biometric system will be able to recognize each user ▹ DNA Universality ▹ Unique characteristics of each person in the world, which can’t replicated ▹ Retinal and Iris

slide-6
SLIDE 6

Seven Biometric System Criteria

Permanence ▹ Every single characteristic or trait which is recorded in the database ▹ and needs to be constant for a certain period. ▹ Age of the user Collectability ▹ To verify their identification, allow to collection of each characteristics and trait in the system

slide-7
SLIDE 7

Seven Biometric System Criteria

Performance ▹ Outlines how well the security system works ▹ Accuracy and robustness Acceptability ▹ Choose fields in which biometric technologies are acceptable Circumvention ▹ decide how easily each characteristic and trait provided by the user can lead to failure during the verification process. ▹ DNA is most difficult to failure

slide-8
SLIDE 8

Evolution of Biometric Security Systems

slide-9
SLIDE 9

Evolution of Biometric Security System

▹ One of the oldest and most basic characteristic of recognition is face. ▹ Since beginning of civilization, human had uses faces to identify known and unknown individuals.

slide-10
SLIDE 10

Evolution of Biometric Security System

▹ During 1858, the first systematic capture of hand images for identification ▸ Recorded handprint of employees to distinguish employee's claim of payday ▹ During 1960, the first semi-automatic face recognition system ▸ System required the features as eyes, ears, nose and mouth on photograph

slide-11
SLIDE 11

Evolution of Biometric Security System

▹ During 1986, Iris can be used for identification, ▸ which develop an algorithm to automate identification of the human iris. ▹ During 1991, the face detection was pioneered, ▸ by using eigenfaces techniques, the residual error could be used to detect faces in images.

slide-12
SLIDE 12

TYPES of

Biometric Security Systems

slide-13
SLIDE 13

TYPES of Biometric Security Systems

Fingerprint Recognition Face Recognition Iris Recognition Hand Geometry Voice Recognition Signature Verification

slide-14
SLIDE 14

FINGERPRINT RECOGNITION

Recognizes patterns on the fingerprint e.g. arches, whorls, and loops ▹ Most widely-used method ▹ Ergonomic, easy to use ▹ Can make mistakes when the finger skin is dry or dirty Uses: door locks, mobile phones

slide-15
SLIDE 15

FACE RECOGNITION

Recognizes features of the face e.g. eyes, nose, cheekbones, jaw edges ▹ Can scan static images ▹ Change in facial features ▹ Privacy abuse Uses: airport security, criminal identification

slide-16
SLIDE 16

IRIS RECOGNITION

Recognizes patterns in the iris e.g. rings, furrows, and freckles ▹ Accurate and very fast ▹ Intrusive ▹ Expensive Uses: airport security, border security, facility access control

slide-17
SLIDE 17

HAND GEOMETRY

Recognizes by width of fingers, width and thickness of palm ▹ Non-intrusive ▹ Relatively small storage ▹ Requires special hardware Uses: industrial environments, welfare agencies, immigration facilities

slide-18
SLIDE 18

VOICE RECOGNITION

Recognizes by voice e.g. pitch, speech patterns, speed ▹ Non-intrusive, popular ▹ Voice variation ▹ Background noise Uses: access control, banking, government offices

slide-19
SLIDE 19

SIGNATURE VERIFICATION

Recognizes by signature e.g. letter size, angles, strokes ▹ Easy to gather ▹ Non-intrusive ▹ Inconsistent signing Uses: financial transactions, e.g. purchasing with credit card

slide-20
SLIDE 20

ADVANTAGES of

Biometric Security Systems

slide-21
SLIDE 21

▹ Accurate Identification ▹ Difficult to forge or steal ▹ Convenient ▹ Reduce costs ADVANTAGES of Biometric Security Systems

slide-22
SLIDE 22

Biometric Security Systems Issues and Concerns

slide-23
SLIDE 23

Biometrics Issues and Concerns

▹ Privacy issues ▹ Ethical issues ▹ Technical issues

slide-24
SLIDE 24

Privacy Issues

▹ Biometric data contains information acquired from individuals ▹ The place where biometric data is recorded

slide-25
SLIDE 25

Ethical Issues

▹ User acceptance ▹ Concern the usefulness of some biometric devices

slide-26
SLIDE 26

Technical Issues

▹ Concern the eye recognition ▹ Concern the voice recognition ▹ Software support

slide-27
SLIDE 27

Future of Biometric Security Systems

slide-28
SLIDE 28

Future of Biometric

▹ An Increase in Iris Scanning Within Security-Needy Industries ▹ Biometric Deployments in E-Commerce Will Skyrocket ▹ Wearables and IOT ▹ The Emergence of Smartphone Behavioral Biometrics

slide-29
SLIDE 29

THANK YOU!