100 likes | 318 Views
Kap security. Lock it up!. Katie, Ashley, and Paola. Security Plan. Iris Recognition, Fingerprint, and Voice Recognition When people enter the bank we will have them get an iris scan plus a fingerprint scan
E N D
Kap security Lock it up! Katie, Ashley, and Paola
Security Plan • Iris Recognition, Fingerprint, and Voice Recognition • When people enter the bank we will have them get an iris scan plus a fingerprint scan • When people pull up to a drive-thru ATM, we will have them scan their finger. If the customer wants to take out more than $400, they will have to come into the building for security purposes. • Over the phone we will have the customer do a voice recognition before being able to access their account
The Science: Iris Recognition • The scanner takes a picture of the eye and analyzes specific ridges and color patterns for unique points of the eye. These points are then translated into a code and the image is deleted and the code is stored. For the next visit the individuals eye will be compared to the codes in the system. • It can be used while wearing contact lenses or eye glasses • Involves no physical contact with the scanner • Works with individuals from different ethnic groups
The Science: Fingerprints • Captures an image of ridges and furrows of the fingerprint and pinpoints the unique pattern which is then turned into a code, and the code is stored in the system • Every individual has a different fingerprint pattern
The Science: Voice Recognition • The system analyzes sound, pattern and rhythm of speech with a numerical score, and is then matched with similar scores • Doesn’t work as well if customer is sick or there is a lot of background noise • Depending on how sophisticated voice verification system is
Accuracy • Iris scan- Most accurate • Fingerprints- 95% - 98% accurate • Voice recognition- not as accurate due to background noises and physical condition
Success Story • Fingerprint scans have been used at schools • Iris scanners have been used to secure border checkpoints and nuclear power plants • Voice recognition has been used for banks
Can It Be Beat? • Iris scans- colored contacts, high resolution photo of someone’s eye • Fingerprints- fake fingerprints using gelatin, cutting off someone’s finger • Voice recognition- it would depend on how accurate and sophisticated the voice- verification system is
Issues of Privacy • People think that the image that is taken of their fingerprint, eye, or face is stored and can be used for other purposes such as surveillance and forensic data bases • But what they don’t know is that the code is what is stored not the image that is taken.
Citations • Images: • https://mail-attachment.googleusercontent.com/attachment/u/0/?ui=2&ik=5ad2661af8&view=att&th=13a0d33fd782c2f4&attid=0.1&disp=inline&realattid=f_h7nde2pr0&safe=1&zw&saduie=AG9B_P_sSLd56gpemyQ0VIwgrAJ3&sadet=1348841631576&sads=3VpVzEB8b27ozo5IqYomQ2dd3zk • http://www.google.com/imgres?num=10&hl=en&biw=1366&bih=636&tbm=isch&tbnid=Gpyjh4KSGSsjoM:&imgrefurl=http://conceptknot.com/conceptflow/%3Fp%3D5&docid=knY1OG0j8HQ7GM&imgurl=http://www.conceptknot.com/images/posts/eye7.jpg&w=403&h=400&ei=u7BlUOzhGoj_qwH2m4DQDQ&zoom=1&iact=hc&vpx=1075&vpy=272&dur=38&hovh=224&hovw=225&tx=135&ty=114&sig=109210131703254426016&page=3&tbnh=139&tbnw=147&start=43&ndsp=24&ved=1t:429,r:23,s:43,i:367 • http://www.google.com/imgres?num=10&hl=en&biw=1366&bih=636&tbm=isch&tbnid=eBC-GrOSS8E_WM:&imgrefurl=http://www.isleofwightsheriffsoffice.com/records.html&docid=tjlkby9VVvKq8M&imgurl=http://www.isleofwightsheriffsoffice.com/images/finger.jpg&w=250&h=384&ei=A7FlUMnME4v3qQGczoCICQ&zoom=1&iact=rc&dur=328&sig=109210131703254426016&page=2&tbnh=133&tbnw=92&start=27&ndsp=33&ved=1t:429,r:0,s:27,i:229&tx=50&ty=71 • http://www.google.com/imgres?hl=en&biw=1366&bih=636&tbm=isch&tbnid=2jtrj8j0BcB9gM:&imgrefurl=http://www.findbiometrics.com/voice-recognition/&docid=-dcp19Idae9q8M&imgurl=http://www.findbiometrics.com/biometric-images/voice-recognition.jpg&w=200&h=195&ei=orFlULXiMYj_qwH2m4DQDQ&zoom=1&iact=hc&vpx=667&vpy=210&dur=351&hovh=140&hovw=144&tx=62&ty=86&sig=109210131703254426016&page=1&tbnh=129&tbnw=132&start=0&ndsp=21&ved=1t:429,r:3,s:0,i:145 • Websites: • Tynan, Dan. "Biometrics: from Reel to Real." PCWorld. N.p., 18 May 2005. Web. 28 Sept. 2012. <http://www.pcworld.com/article/120889/article.html>. • Wilson, Tracy V. "How Biometrics Works." How Stuff Works. N.p., n.d. Web. 28 Sept. 2012. <http://science.howstuffworks.com/biometrics.html>. • Podio, Fernando L., and Jeffery S. Dunn. "Biometric Authentication Technology: from the Movies to Your Desktop." N.p., n.d. Web. 28 Sept. 2012. <http://www.cab.org.in/ICTPortal/Lists/Knowledge%20Bank/Attachments/44/Biometricsfromthemovies_23_12_2007.pdf>