16
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn

Biometrics

  • Upload
    inoke

  • View
    110

  • Download
    1

Embed Size (px)

DESCRIPTION

Chuck Cook Matthew Etten Jeremy Vaughn. Biometrics. Overview. What is Biometrics? Why use Biometrics? Types of Biometrics Uses and Applications of Biometrics. Definitions. As a process: - PowerPoint PPT Presentation

Citation preview

Page 1: Biometrics

Biometrics

Chuck Cook

Matthew Etten

Jeremy Vaughn

Page 2: Biometrics

Overview

• What is Biometrics?• Why use Biometrics?• Types of Biometrics• Uses and Applications of Biometrics

Page 3: Biometrics

Definitions As a process:Automated methods of identifying a person based on

measurable biological and behavioral characteristics.

As a characteristic:A meaurable biological and behavioral characteristic

that can be used for automated identification.

Page 4: Biometrics

Why Biometrics Universal – we all share

the same physiology Unique – especially

when used together Permanent – most do

not change over time Collectable – easy to

gather and store data

Performance – accuracy and speed increase with technological advances

Public Acceptance Difficult to forge Do not need to

remember passwords

Page 5: Biometrics

Fingerprints Advantages:Multiple fingers, easy use,proven technology, large databaseexists, ridges last a lifetime

Disadvantages:Age and/or occupation mayimpede recognition

Page 6: Biometrics

Facial Recognition Advantages:No contact required,cameras are common,easy for people to verify Disadvantages:Face can be obstructed, sensitiveto changes in expresson, age and lighting

Page 7: Biometrics

Iris Recognition

Advantages:No contact required, eye isless prone to injury, andiris is stable over lifetime

Disadvantages:Difficult to capture for some

Page 8: Biometrics

Hand Geometry Advantages:Easy to capture, believed tobe stable over lifetime Disadvantages:Requires some training, not sufficiently distinctive over alarge population

Page 9: Biometrics

Other Techniques Signature/Handwriting Voice/Speech Retinal Scans Facial Thermography Vascular Patterns Keystroke Patterns

Page 10: Biometrics

Biometric System 5 Basic Components Sensors – collect data Processing Algorithms – develop a template Data Storage – Hard drives or smart cards Matching Algorithms – compare template with new

data Decision Process – Automated or Human-assisted

Page 11: Biometrics

Usage VerificationA one to one comparison of a captured biometric with

a stored template to verify that the individual is who he claims to be. Can be done in conjunction with a smart card, username or ID number.

IdentificationA one to many comparison of the captured biometric

against a biometric database in attempt to identify an unknown individual.

Page 12: Biometrics

Applications Building or secure

location access Access to computer

systems Passports/Travel Employee recognition Elections

Law enforcement Consumer/Retail National security Secure banking Health services

Page 13: Biometrics

Health Care Applications

• Privacy• HIPAA and other such acts guarantee privacy• United States require that physicians and healthcare

professionals who use electronic records track every time a patients record is accessed.

• Biometrics can help secure these records, as well as keep track of who did, or tried to, access healthcare records

Page 14: Biometrics

Law Enforcement Applications

• Greatly reduce paperwork• Sensitive information can be identified using

national or regional databases• Move from ink and paper fingerprinting to digital

systems to save time and money• Facial recognition can be obtained using “mug

shots”

Page 15: Biometrics

Consumer Applications

• Controlled access to personal computers, mobile devices, private data, medical records, etc.

• Product can customize itself to you, based on your identity

• Identify age or criminal record for selling of restricted items (Alcohol and firearms)

Page 16: Biometrics

Financial Applications

• ATM machines could use Iris or facial recognition as opposed to a 4 digit PIN

• Easier to steal cash or credit card numbers than physical features