35
Presented by: Chitransh Saxena Siddarth Kishan Jitendra Nath Gupta

Ubiquitous security- is it just biometrics?

Embed Size (px)

Citation preview

Page 1: Ubiquitous security- is it just biometrics?

:Presented by Chitransh Saxena Siddarth Kishan Jitendra Nath Gupta

Page 2: Ubiquitous security- is it just biometrics?

Topic we will cover…..

What is Ubiquitious?Security

Ubiquitious Security using Bio-metrics

Alternatives to biometrics

Page 3: Ubiquitous security- is it just biometrics?

What is Ubiquitious Security?

Page 4: Ubiquitous security- is it just biometrics?

Definition:-A Security system which identifies users and

the surroundings to offer suitable services desired by “Individuals” safely and securely that “dynamically” change security levels according to the situation

Page 5: Ubiquitous security- is it just biometrics?

Need Of Ubiquitous Security ??

Page 6: Ubiquitous security- is it just biometrics?

Security is Needed for...

Privacy Reasons: People want to hide certain (culturally specific or personal) things.

Economic Reasons: People (and enterprises) want to protect their property.

Page 7: Ubiquitous security- is it just biometrics?
Page 8: Ubiquitous security- is it just biometrics?
Page 9: Ubiquitous security- is it just biometrics?
Page 10: Ubiquitous security- is it just biometrics?

Ubiquitious Security using Bio-metrics devices…

What is Bio-metric

s ..

Why we have need Bio-metrics ..

AND

Page 11: Ubiquitous security- is it just biometrics?

Types of Biometrics ….

Face recognitionIris scanningRetina scanningHand geometryFingerprintingVoice recognitionSignature

verification

Page 12: Ubiquitous security- is it just biometrics?

Face recognition ??

A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source

Page 13: Ubiquitous security- is it just biometrics?

Iris scanning…It uses mathematical pattern-recognition techniques ofan individual's eyes, whose complex random patterns are unique and can be seen from some distance.

Page 14: Ubiquitous security- is it just biometrics?

Recognized After 17 Years….

Page 15: Ubiquitous security- is it just biometrics?

Retina scanning….

A biometric identifier known as a retina scan is used to map the unique patterns of a person's retina.

Page 16: Ubiquitous security- is it just biometrics?

Finger printing

Individual’s fingerprintsare defined by a complexcombination of patterns..............................LinesArches LoopsWhorls

Page 17: Ubiquitous security- is it just biometrics?

Hand geometry…A hand scanner is a fairly simple device that measures hand geometry to obtain a template of the user’s hand

The user puts his or her hand in a small device

Page 18: Ubiquitous security- is it just biometrics?

Voice recognition…

The field of computer science that deals with designing computer systems that can recognize spoken words.

Page 19: Ubiquitous security- is it just biometrics?

Signature verification… systems use pens with motion-sensing and

pressure-sensing devices inside

A special pen is used that contains a bi-axial accelerometer to measure changes in force in the x and y direction

Page 20: Ubiquitous security- is it just biometrics?

Future of Biometrics….DNA DNA differs from standard biometrics in several ways:

–DNA requires a tangible physical sample as opposed

to an impression, image, or recording.

–DNA matching is not done in real-time, and currently

not all stages of comparison are automated.

–DNA matching does not employ templates or feature

extraction, but rather represents the comparison of

actual samples.

Page 21: Ubiquitous security- is it just biometrics?

Brain wave scanning

Mapping of Brain Activity

Page 22: Ubiquitous security- is it just biometrics?

Applications of Biometrics: Identification

• Search and apprehension of criminals and suspects

• Counterterrorism• Identification of visitors• Shopping mall security• Identification of shoppers

Page 23: Ubiquitous security- is it just biometrics?

Applications of Biometrics: AuthenticationPhysical access controlTime and attendanceBenefit payment systemsBorder control systems PC/Network access controlInternet verification for e-commerce and home workers ATM applications National identity cards

Page 24: Ubiquitous security- is it just biometrics?

Some more Application..On Biometrics…..

Biometric Passport

Entry Authentication System

No need to carry ATM-card

Page 25: Ubiquitous security- is it just biometrics?

Biometrics Comparison…

CostAccuracy

Intrusiveness

Fingerprinting

Hand geometry

Voice recognition

Iris scanning

Retina scanning

Face recognition

Page 26: Ubiquitous security- is it just biometrics?

So…Does Ubiquitious Security depend on Biometrics..??

Page 27: Ubiquitous security- is it just biometrics?

Alternate security systems for Ubiquitous computing systems.

.Embedded RFID chipsBarcodeI .ntelligent Id cards .Traditional passwordsNon-text-based passwordsEncryption

Page 28: Ubiquitous security- is it just biometrics?

Embedded RFID chips.An integrated circuit device

or RFID transponder is encased in silicate glass and is implanted in the body of a human being.

Are small in size, and are passive tags.

Stores a 16 digit number.

Page 29: Ubiquitous security- is it just biometrics?

BarcodeA barcode is an

optical machine-readable representation of data, which shows data about the object to which it attaches.

Read by a scanner.Can be used in a ubiquitous

security system.

Page 30: Ubiquitous security- is it just biometrics?

Intelligent Id cards.smart cards

personal identification

Can contains magnetic strip, RFID chip, bar codes or Sim card.

Stores information

Page 31: Ubiquitous security- is it just biometrics?

Traditional passwords.One of the most oldest and the

safest way to protect the data

The longer the password, the stronger it gets

Page 32: Ubiquitous security- is it just biometrics?

Non-text-based passwordsgraphical passwords or mouse-movement based

passwords.

Images, graphics or colors instead of letters, digits or special characters are used. One system requires users to select a series of faces as a password, utilizing the human brain's ability to recall faces easily.

Page 33: Ubiquitous security- is it just biometrics?

Encryption  the process of

transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge.

Requires a ‘key’ to decrypt the data.

Page 34: Ubiquitous security- is it just biometrics?

Conclusion

Questions?

Page 35: Ubiquitous security- is it just biometrics?

Thank you