140 likes | 331 Views
BIOMETRICS. By Mona Lisa Walters Wiki.gc.maricopa.edu CIS 105 Poster Session No. 4. Biometrics. Scientific method of verifying a people’s identity using their physical attributes Five main types are: Face recognition Fingerprint scanning Hand geometry Eye Biometrics Voice Verification.
E N D
BIOMETRICS By Mona Lisa Walters Wiki.gc.maricopa.edu CIS 105 Poster Session No. 4
Biometrics • Scientific method of verifying a people’s identity using their physical attributes • Five main types are: • Face recognition • Fingerprint scanning • Hand geometry • Eye Biometrics • Voice Verification
Face Scanning • Measure the different features & bone structure • Need a good camera & proper software
Fingerprint Scanning • Tiny ridges of persons’ fingers are stored in a tiny digital file & computer scans in seconds • Invariable – difficult to forge Disney World uses finger scanning
Hand Scanning • Measures the length, width, thickness and surface area of hand • May be altered due to injury, disease, aging
Eye Biometrics • Most promising form of identification • Iris scanning measures the patterns of lines and colors of the eye • Retina measures the membrane at the back of the eye
Voice Verification • Measures the pitch, cadence, and tone • Pre-recorded and compare to their live voice • More variables • Limited to “backup” status
Biometric ID System • Main operations – enrollment & test
Enrollment/Registration • Sensor – the interface between people and the system • Pre-processing – removal of artifacts to enhance the input • Feature extractor – finding the true biometric pattern • Template generator – the extracted features are used to create a template • Then, the templates are stored, on a card or both
Test Process • Matching phase – the obtained data is compared to the template • Application device – the output of the specified use or purpose
Functions • Detect terrorist and criminals • Immigration purposes • Keep track of employees logging onto the computer systems • Improve efficiency and streamline payroll operations • Better than the traditional ID • Prevent identity theft
Concerns • Disregards people’s privacy • There is no way to collect the biometrics of terrorists • Abuse usage of information • Danger to owners of secured items
Course of Actions • Regulatory laws that will protect people’s privacy • Manufacturers self-imposed guidelines “bio-privacy” rules • People are made to be aware of the data to be collected and its purpose • Data minimization • Data must only be used for the purpose • Users can review and correct any incorrect data
References • Abernathy, W & Tien, Lee. “Biometrics: Who’s Watching You?” Electronic Frontier Foundation Sept 2003. http://www.eff.org/wp/biometrics-whos-watching-you • “Biometrics.” Issues & Controversies On File 11 Sept. 2006. Issues & Controversies. Facts On File News. 8 Apr 2008 http://www.2facts.com • “Biometric Technology” http://news.bbc.co.uk/2/shared/spl/hi/guides/456900/456993/html/nn4page1.stm • “Biometrics.” Wikipedia, The Free Encyclopedia. 03 Apr 2008, UTCWikimedia Foundation, Inc. 3 Apr 2008 http://en.wikipedia.org/w/index