Upload
siddharth-kishan
View
1.087
Download
3
Embed Size (px)
Citation preview
:Presented by Chitransh Saxena Siddarth Kishan Jitendra Nath Gupta
Topic we will cover…..
What is Ubiquitious?Security
Ubiquitious Security using Bio-metrics
Alternatives to biometrics
What is Ubiquitious Security?
Definition:-A Security system which identifies users and
the surroundings to offer suitable services desired by “Individuals” safely and securely that “dynamically” change security levels according to the situation
Need Of Ubiquitous Security ??
Security is Needed for...
Privacy Reasons: People want to hide certain (culturally specific or personal) things.
Economic Reasons: People (and enterprises) want to protect their property.
Ubiquitious Security using Bio-metrics devices…
What is Bio-metric
s ..
Why we have need Bio-metrics ..
AND
Types of Biometrics ….
Face recognitionIris scanningRetina scanningHand geometryFingerprintingVoice recognitionSignature
verification
Face recognition ??
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source
Iris scanning…It uses mathematical pattern-recognition techniques ofan individual's eyes, whose complex random patterns are unique and can be seen from some distance.
Recognized After 17 Years….
Retina scanning….
A biometric identifier known as a retina scan is used to map the unique patterns of a person's retina.
Finger printing
Individual’s fingerprintsare defined by a complexcombination of patterns..............................LinesArches LoopsWhorls
Hand geometry…A hand scanner is a fairly simple device that measures hand geometry to obtain a template of the user’s hand
The user puts his or her hand in a small device
Voice recognition…
The field of computer science that deals with designing computer systems that can recognize spoken words.
Signature verification… systems use pens with motion-sensing and
pressure-sensing devices inside
A special pen is used that contains a bi-axial accelerometer to measure changes in force in the x and y direction
Future of Biometrics….DNA DNA differs from standard biometrics in several ways:
–DNA requires a tangible physical sample as opposed
to an impression, image, or recording.
–DNA matching is not done in real-time, and currently
not all stages of comparison are automated.
–DNA matching does not employ templates or feature
extraction, but rather represents the comparison of
actual samples.
Brain wave scanning
Mapping of Brain Activity
Applications of Biometrics: Identification
• Search and apprehension of criminals and suspects
• Counterterrorism• Identification of visitors• Shopping mall security• Identification of shoppers
Applications of Biometrics: AuthenticationPhysical access controlTime and attendanceBenefit payment systemsBorder control systems PC/Network access controlInternet verification for e-commerce and home workers ATM applications National identity cards
Some more Application..On Biometrics…..
Biometric Passport
Entry Authentication System
No need to carry ATM-card
Biometrics Comparison…
CostAccuracy
Intrusiveness
Fingerprinting
Hand geometry
Voice recognition
Iris scanning
Retina scanning
Face recognition
So…Does Ubiquitious Security depend on Biometrics..??
Alternate security systems for Ubiquitous computing systems.
.Embedded RFID chipsBarcodeI .ntelligent Id cards .Traditional passwordsNon-text-based passwordsEncryption
Embedded RFID chips.An integrated circuit device
or RFID transponder is encased in silicate glass and is implanted in the body of a human being.
Are small in size, and are passive tags.
Stores a 16 digit number.
BarcodeA barcode is an
optical machine-readable representation of data, which shows data about the object to which it attaches.
Read by a scanner.Can be used in a ubiquitous
security system.
Intelligent Id cards.smart cards
personal identification
Can contains magnetic strip, RFID chip, bar codes or Sim card.
Stores information
Traditional passwords.One of the most oldest and the
safest way to protect the data
The longer the password, the stronger it gets
Non-text-based passwordsgraphical passwords or mouse-movement based
passwords.
Images, graphics or colors instead of letters, digits or special characters are used. One system requires users to select a series of faces as a password, utilizing the human brain's ability to recall faces easily.
Encryption the process of
transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge.
Requires a ‘key’ to decrypt the data.
Conclusion
Questions?
Thank you