210 likes | 344 Views
The Mighty Ducks. Guzman Rodriguez, Wesley Marziano, Vitaliy Kovalchuk, Evan Hill. How do biometric technologies improve security and what are the possible flaws?. What is Biometrics?. M ethods for recognizing people based on one or more unique traits. Why use biometric authenication ?.
E N D
The Mighty Ducks Guzman Rodriguez, Wesley Marziano, Vitaliy Kovalchuk, Evan Hill
How do biometric technologies improve security and what are the possible flaws?
What is Biometrics? Methods for recognizing people based on one or more unique traits.
Why use biometric authenication? Replaces passwords Becoming more available Generally more secure
Types of Biometric Technologies • Physical • Fingerprint scan • Facial recognition • Iris scan • Behavioral • Voice recognition • Signature recognition
What goes into deciding what traits should be used for biometrics Does everyone have the trait? Is it unique from person to person? Does the trait stay the same as the person ages? Is it easy to duplicate? How easy is it to measure?
Fingerprint scanner Scans person’s finger and identifies the pattern of the ridges Compares the pattern to the ones stored in the database
Pros/cons of fingerprint readers • Pros: • Portable (USB powered devices) • Relatively easy to use • Cons • Finger prints get worn out • Methods to bypass it exist
Face Recognition Scans your face Compares the facial traits to the scans in a database
Pros/Cons of Face Scanners • Pros • Good security • Hard to duplicate • Cons • Expensive • Have to scan all of user’s faces • Might be inconvenient • Faces change with age
Iris Scanner Scans the person’s eye Uses pattern-recognition techniques based on high-resolution images of the irides of an individual's eyes
Pros/Cons of Iris Scanner • Pros • Secure • Fast identitfication • Cons • Expensive • A certain level of light must be present
Voice Recognition Person speaks into a microphone The sound is compared to the ones stored in a database
Pros/Cons of Voice Recognition • Pros • Not hard to use • No physical interaction • Cons • Loss of voice • Record and play back someone’s voice
Signature Recognition User inputs a signature Systems runs a check with the signatures found in a database
Pros/Cons of Signature Recognition • Pros • Easily used • Relatively easy to implement • Cons • Can be forged • Difference in signatures from same person
Current Biometric Uses • Examples: • Fingerprint and face recognition on laptops • Face recognition in airports • Fingerprints on travel documents • Safes with iris scans • Law enforcement
Future Uses for Biometrics Building access through facial recognition Citywide camera networks with facial recognition National databases for ID Voice authentication over phone
Summary Physiological and behavioral biometrics Biometric authentication is a promising field
The End Thank you for your attention
Bibliography "Biometrics Overview." Biometrics.gov. Web. 20 Nov. 2009. <http://biometrics.gov/Documents/BioOverview.pdf>. "Case studies reveal the pros and cons of biometrics." TechRepublic Articles. Web. 20 Nov. 2009. <http://articles.techrepublic.com.com/5100-10878_11-5030410.html>. Jain, A. K.; Ross, Arun; Prabhakar, Salil (January 2004), "An introduction to biometric recognition", IEEE Transactions on Circuits and Systems for Video Technology14th (1): 4– 20 "National Institute of Standards and Technology NIST; Who are you? Mobile ID devices find out using NIST guidelines. " Information Technology Business 8 Sep. 2009: Sciences Module, ProQuest. Web. 15 Oct. 2009. "Pros and Cons." NTRG: Networks & Telecommunications Research Group. Web. 21 Nov. 2009. <http://ntrg.cs.tcd.ie/undergrad/4ba2.02/biometrics/prosncons.html>.