1 / 16

computer aided identification

Mia_John
Download Presentation

computer aided identification

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Computer Aided Identification The Future of Security

    2. Introduction Why do you need New Computer Security? Computers are integral part of society E-Mail E-Commerce Online Banking / Bill Pay Your Personal Information is at Risk!

    3. Biometric Authentication Iris Scan Camera Scans Eye Both irises are scanned Recognizes small details of each eye Compares to Saved Images Matches up details of each iris Recognizes as a Success or Failure

    4. Why Iris Technology Easy to deal with everyone Very few people have one or less eyes Irises are the same from one year old and remain constant Not considered Intrusive No contact with the skin is made Can be operated without people to access the program Can be combined with motion sensors

    5. Uses of Iris Technology Today… Used in transportation, hospitals, and government Used in “Big Business” as a means of security Future… To be used with wireless technology to prevent fraud during any economical transactions To be used as a key

    6. Iris Technology Pros More accurate than fingerprinting Stable over many years Very difficult to fake Cons Requires full cooperation of the subject Once someone makes a fake your security is compromised

    7. Biometric Authentication Finger Print Scan Optical Scanner Obtains image of finger print Uses light to compare to pre-scanned images Capacitance Scanner Scans using electricity to determine the ridges and valleys of fingerprint Compares to pre-scanned input from fingerprint

    8. Optical Scan Uses CCD (Charge Coupled Device) Same CCD used in Digital Cameras Generates a signal from light Signal is reversed and an inverted image appears Light areas represent valleys and dark areas represent ridges Error checks for darkness of scan and image definition

    9. Capacitance Scan Uses semiconductors to check for the ridges and valleys in fingerprints The capacitance is varied by the distance the finger is away from the semiconductor plates Finger ridges will result in different voltages than finger valleys The processor puts together a picture from the readout Requires real fingerprint type to match voltage

    10. Finger Print Scan Pros Cannot Forget Finger Print Much Harder to Fake Cannot Misplace Finger Print Cons Optical Scanner cannot tell between a finger and a picture of a finger Capacitance Scanner can be fooled with a mold of the desired finger

    11. Facial Recognition Scan Uses Digital Photos Compares live image to the facial database picture An algorithm is used to determine lines on the face and different facial features If the algorithm passes then the person is identified

    12. Uses of Facial Recognition Casinos Use facial recognition to catch known card counters and thieves Police Departments Use facial recognition on pictures of employees at different locations to catch criminals Border Patrol Use on passports and ID cards to ensure security

    13. Issues and Concerns With Biometrics becoming available, individuals could: Plant DNA at the scene of a crime Fool a fingerprint detector with a piece of tape Fool an iris detector with a picture of an eye Break into the system and make a “fail” code a “pass” code

    14. Uses and Initiatives Canada Uses digital images in passports that are stored on a chip that is built into the passport and scanned at borders United States Government is using all the types listed in this presentation as well as others not available on the market

    15. Conclusion Different Computer Aided Identifications Iris Scan Face Scan Finger Print Scan Issues and Concerns Criminal Acts Identity Theft Uses Present and Future

    16. Bibliography Harris, Tom; “How Finger Print Scanners Work”; http://computer.howstuffworks.com/fingerprint-scanner.htm LG Electronics; “Overview”; http://www.lgiris.com/iris/ Wikipedia; “Iris Scan”; http://en.wikipedia.org/wiki/Iris_scan Wikipedia; “Biometrics”; http://en.wikipedia.org/wiki/Biometrics

More Related