E N D
1. Computer Aided Identification The Future of Security
2. Introduction Why do you need New Computer Security?
Computers are integral part of society
E-Mail
E-Commerce
Online Banking / Bill Pay
Your Personal Information is at Risk!
3. Biometric Authentication Iris Scan
Camera Scans Eye
Both irises are scanned
Recognizes small details of each eye
Compares to Saved Images
Matches up details of each iris
Recognizes as a Success or Failure
4. Why Iris Technology Easy to deal with everyone
Very few people have one or less eyes
Irises are the same from one year old and remain constant
Not considered Intrusive
No contact with the skin is made
Can be operated without people to access the program
Can be combined with motion sensors
5. Uses of Iris Technology Today…
Used in transportation, hospitals, and government
Used in “Big Business” as a means of security
Future…
To be used with wireless technology to prevent fraud during any economical transactions
To be used as a key
6. Iris Technology Pros
More accurate than fingerprinting
Stable over many years
Very difficult to fake
Cons
Requires full cooperation of the subject
Once someone makes a fake your security is compromised
7. Biometric Authentication Finger Print Scan
Optical Scanner
Obtains image of finger print
Uses light to compare to pre-scanned images
Capacitance Scanner
Scans using electricity to determine the ridges and valleys of fingerprint
Compares to pre-scanned input from fingerprint
8. Optical Scan Uses CCD (Charge Coupled Device)
Same CCD used in Digital Cameras
Generates a signal from light
Signal is reversed and an inverted image appears
Light areas represent valleys and dark areas represent ridges
Error checks for darkness of scan and image definition
9. Capacitance Scan Uses semiconductors to check for the ridges and valleys in fingerprints
The capacitance is varied by the distance the finger is away from the semiconductor plates
Finger ridges will result in different voltages than finger valleys
The processor puts together a picture from the readout
Requires real fingerprint type to match voltage
10. Finger Print Scan Pros
Cannot Forget Finger Print
Much Harder to Fake
Cannot Misplace Finger Print
Cons
Optical Scanner cannot tell between a finger and a picture of a finger
Capacitance Scanner can be fooled with a mold of the desired finger
11. Facial Recognition Scan Uses Digital Photos
Compares live image to the facial database picture
An algorithm is used to determine lines on the face and different facial features
If the algorithm passes then the person is identified
12. Uses of Facial Recognition Casinos
Use facial recognition to catch known card counters and thieves
Police Departments
Use facial recognition on pictures of employees at different locations to catch criminals
Border Patrol
Use on passports and ID cards to ensure security
13. Issues and Concerns With Biometrics becoming available, individuals could:
Plant DNA at the scene of a crime
Fool a fingerprint detector with a piece of tape
Fool an iris detector with a picture of an eye
Break into the system and make a “fail” code a “pass” code
14. Uses and Initiatives Canada
Uses digital images in passports that are stored on a chip that is built into the passport and scanned at borders
United States
Government is using all the types listed in this presentation as well as others not available on the market
15. Conclusion Different Computer Aided Identifications
Iris Scan
Face Scan
Finger Print Scan
Issues and Concerns
Criminal Acts
Identity Theft
Uses
Present and Future
16. Bibliography Harris, Tom; “How Finger Print Scanners Work”; http://computer.howstuffworks.com/fingerprint-scanner.htm
LG Electronics; “Overview”; http://www.lgiris.com/iris/
Wikipedia; “Iris Scan”; http://en.wikipedia.org/wiki/Iris_scan
Wikipedia; “Biometrics”; http://en.wikipedia.org/wiki/Biometrics