Free Essay

Biometric Methods

In:

Submitted By Stavrouli
Words 1102
Pages 5
ΠΑΝΕΠΙΣΤΗΜΙΟ ΑΙΓΑΙΟΥ ΤΜΗΜΑ ΜΗΧΑΝΙΚΩΝ & ΕΠΙΚΟΙΝΩΝΙΑΚΩΝ ΣΥΣΤΗΜΑΤΩΝ ΚΑΤΕΥΘΥΝΣΗ: ΨΗΦΙΑΚΗ ΚΑΙΝΟΤΟΜΙΑ & ΕΠΙΧΕΙΡΗΜΑΤΙΚΟΤΗΤΑ ΜΑΘΗΜΑ: ΑΣΦΑΛΕΙΑ ΠΛΗΡΟΦΟΡΙΑΚΩΝ ΣΥΣΤΗΜΑΤΩΝ & ΤΕΧΝΟΛΟΓΙΕΣ ΕΝΙΣΧΥΣΗΣ ΤΗΣ ΙΔΙΩΤΙΚΟΤΗΤΑΣ ΘΕΜΑ: ΒΙΟΜΕΤΡΙΚΕΣ ΜΕΘΟΔΟΙ ΑΥΘΕΝΤΙΚΟΠΟΙΗΣΗΣ

ΟΝΟΜΑ:ΡΟΥΒΑ ΣΤΑΥΡΟΥΛΑ Α.Μ: 323Μ/2014093

ΑΘΗΝΑ 2014

Βιομετρικές Μέθοδοι- ένας σύντομος ορισμός Οι βιομετρικές μέθοδοι αναγνώρισης μπορούν να οριστούν ως οι αυτοματοποιημένες μέθοδοι που έχουν σαν στόχο την αναγνώριση ή αυθεντικοποίηση της ταυτότητας ενός ανθρώπου με βάση τους τα φυσιολογικά χαρακτηριστικά ή τις συνήθεις συμπεριφορές του. Ένας πιο λεπτομερής ορισμός τον οποίο μπορούμε να χρησιμοποιήσουμε είναι πως «οι βιομετρικές μέθοδοι αναγνώρισης αποτελούν κάθε αυτόματα μετρήσιμο, χρονικά σταθερό και ευδιάκριτο φυσιολογικό χαρακτηριστικό ή προσωπικό στοιχείο, που μπορεί να χρησιμοποιηθεί για την αναγνώριση ή την επιβεβαίωση της ταυτότητας ενός προσώπου»1. Εν συνεχεία, θα κάνουμε μια περαιτέρω προσπάθεια να να αποσαφηνίσουμε τους παραπάνω ορισμούς με στόχο την καλύτερη κατανόηση τους. Αναγνώριση και αυθεντικοποίηση Σε αυτό το σημείο είναι σημαντικό να αναφέρουμε πως οι έννοιες αναγνώριση και αυθεντικοποίηση αποτελούν δύο ξεχωριστές διαδικασίες στην ασφάλεια ενός πληροφοριακού συστήματος όπως θα δούμε και από τους ορισμούς παρακάτω.  «Αναγνώριση ονομάζεται η διαδικασία αναζήτησης της ταυτότητας ενός χρήστη μέσα στο πλήθος των καταγεγραμμένων χρηστών. Κατά τη διαδικασία της αναγνώρισης το σύστημα προσπαθεί να εντοπίσει ένα συγκεκριμένο χρήστη συγκρίνοντας τα στοιχεία του με τα αποθηκευμένα στοιχεία όλων των χρηστών. Λέγεται και ‘ένα προς πολλά’ αναζήτηση (1:N) και ουσιαστικά επιχειρεί να απαντήσει στο ερώτημα «Ποιος είναι ο Χ; »2.  «Αυθεντικοποίηση ονομάζεται η διαδικασία επιβεβαίωσης της ταυτότητας ενός χρήστη. Το σύστημα ουσιαστικά επιχειρεί να απαντήσει στην ερώτηση «Είναι ο Χ; » συγκρίνοντας τα χαρακτηριστικά του συγκεκριμένου χρήστη μόνο με τα αποθηκευμένα στοιχεία του προσώπου την ταυτότητα του οποίου διεκδικεί. Λέγεται και ‘ένα προς ένα’ αναζήτηση (1:1) και είναι προφανώς πιο γρήγορη μέθοδος από την αναγνώριση3.» Ωστόσο μπορούμε να αναγνωρίσουμε ότι τόσο η αναγνώριση όσο και η αυθεντικοποίηση μπορούν να προσδιοριστούν με μια ή και περισσότερες από τις παρακάτω τεχνικές: 1. Τεχνικές σύμφωνα με κάτι που γνωρίζει ο χρήστης (π.χ. συνθηματικά, κωδικοί κλπ.) 2. Τεχνικές σύμφωνα με κάτι που έχει στην κατοχή του χρήστης (π.χ. μαγνητικές κάρτες κλπ.) 3. Τεχνικές που έχουν στηριχθεί στα βιομετρικά χαρακτηριστικά του χρήστη, οι οποίες έχουν και το πλεονέκτημα ότι δεν μπορούν να κλαπούν ή να χαθούν καθώς αποτελούν μοναδικά
1 2 3 Σιάτρας, Σ., (2004), Σύστημα Αυθεντικοποίησης Μέσω Αναγνώρισης Τρόπου Πληκτρολόγησης, ΑΠΘ. Σιάτρας, Σ., (2004), Σύστημα Αυθεντικοποίησης Μέσω Αναγνώρισης Τρόπου Πληκτρολόγησης, ΑΠΘ. Σιάτρας, Σ., (2004), Σύστημα Αυθεντικοποίησης Μέσω Αναγνώρισης Τρόπου Πληκτρολόγησης, ΑΠΘ.

χαρακτηριστικά. Βιομετρικά Χαρακτηριστικά Οι παράμετροι που πρέπει να ικανοποιεί ένα ανθρώπινο χαρακτηριστικό είτε είναι ανατομικό είτε είναι συμπεριφοράς για να μπορέσει να χρησιμοποιηθεί ως βιομετρικό χαρακτηριστικό είναι οι εξής: 1. Καθολικότητα: πρέπει να το διαθέτει κάθε άτομο. 2. Μοναδικότητα: να είναι διαφορετικό για οποιοδήποτε άτομο. 3. Μονιμότητα: να μην είναι μεταβλητό με το πέρασμα του χρόνου. 4. Μετρησιμότητα: να μπορεί να μετρηθεί με κάποια μέθοδο. Τα βιομετρικά χαρακτηριστικά που χρησιμοποιούνται ως επί το πλείστον είναι: 1. Η ίριδα του ματιού 2. Το πρόσωπο 3. Τα δακτυλικά αποτυπώματα 4. Οι φλέβες του χεριού 5. Η φωνή 6. Η υπογραφή και ο γραφικός χαρακτήρας Στον παρακάτω πίνακα θα μελετήσουμε τις παραμέτρους των βιομετρικών χαρακτηριστικών:

Σύγκριση των βιομετρικών χαρακτηριστικών. Βαθμολογία: Χ (χαμηλό), Μ (μεσαίο), Υ (υψηλό).

Παρατηρώντας τον πίνακα, βλέπουμε ότι το δακτυλικό αποτύπωμα μπορεί να θεωρηθεί επαρκές σε όλες τις παραμέτρους, ενώ παράλληλα παρουσιάζει υψηλότερη βαθμολογία σε αντίθεση με τα υπόλοιπα χαρακτηριστικά , τα οποία παρουσιάζουν χαμηλή βαθμολογία σε κάποια κριτήρια. Αυτός άλλωστε είναι και ο λόγος που το συγκεκριμένο βιομετρικό χαρακτηριστικό

χρησιμοποιείται συχνότερα για το διαχωρισμό και την ταυτοποίηση ατόμων. Σε αυτό το σημείο πρέπει να σημειώσουμε ότι δεν υπάρχει τέλειο βιομετρικό. Η επιλογή του εξαρτάται τόσο από την εφαρμογή που θέλουμε να το εγκαταστήσουμε, το επίπεδο ασφάλειας του οργανισμού ή της επιχείρησης, το κόστος και τη φιλικότητα προς τον χρήστη. Ορισμένα είναι αποδοτικότερα για μια εφαρμογή από κάποια άλλα. Π.χ. Αν θέλουμε η εφαρμογή μας να αναγνωρίζει από απόσταση τότε προσφέρεται το βάδισμα ως βιομετρικό χαρακτηριστικό. Περίπτωση Μελέτης: Πιστωτική κάρτα με ενσωματωμένο αισθητήρα δακτυλικού αποτυπώματος Λαμβάνοντας υπόψη μας τα παραπάνω θα εξετάσουμε περαιτέρω την είδηση που κυκλοφόρησε προ ημερών η MasterCard, η οποία ανακοίνωσε πως θα κυκλοφορήσει τη πρώτη πιστωτική κάρτα με ενσωματωμένο αισθητήρα δακτυλικού αποτυπώματος. Σε αυτό το σημείο είναι σημαντικό να εμβαθύνουμε στην επιλογή των δακτυλικών αποτυπωμάτων ως βιομετρική μέθοδο αυθεντικοποίησης. Δακτυλικά αποτυπώματα Tα δακτυλικά αποτυπώματα αποτελούν ουσιαστικά τις γραμμώσεις των δακτύλων του χεριού τα οποία έχουν τη δυνατότητα να χρησιμοποιηθούν για το μοναδικό προσδιορισμό των ανθρώπων. Η διαδικασία με την οποία αναγνωρίζουμε το δακτυλικό αποτύπωμα ως βιομετρικό στοιχείο είναι ουσιαστικά μία αυτοματοποιημένη, ψηφιακή εκδοχή της παραδοσιακής μεθόδου καταγραφής του δακτυλικού αποτυπώματος με μελάνι, που χρησιμοποιείται από τον προπερασμένο αιώνα. Για να μπορέσουμε να καταγράψουμε το σχέδιο του δακτυλικού αποτυπώματος χρησιμοποιούμε ένα ειδικό αισθητήριο ενώ παράλληλα αποτελεί εύκολη διαδικασία για τον χρήστη. Όπως μπορεί να γίνει φανερό, η ψηφιακή καταγραφή των δακτυλικών αποτυπωμάτων έχει σχεδόν απαλείψει τη χρήση της καταγραφής των αποτυπωμάτων με τον παραδοσιακό τρόπο. Τρόπος λειτουργίας Η λειτουργία της θα είναι σχετικά απλοϊκή. Κατά την πληρωμή, ο κάτοχος της κάρτας το μόνο που έχει να κάνει είναι απλώς να τοποθετήσει τον αντίχειρά του στον βιομετρικό αισθητήρα. Αν το δακτυλικό αποτύπωμα δεν έχει αποθηκευτεί στην κάρτα τότε η πληρωμή δεν είναι δυνατόν να ολοκληρωθεί. Όσον αφορά στην παροχή ενέργειας και τη φόρτιση της, και για να είναι συνέχεια διαθέσιμη στη τσέπη του ιδιοκτήτη, η κάρτα θα φορτίζεται κάθε φορά που χρησιμοποιείται σε

τερματικό πληρωμής αντλώντας ενέργεια από εκεί4. Πλεονεκτήματα μεθόδου δακτυλικών αποτυπωμάτων 1. Παρέχει πολύ υψηλή ακρίβεια και αξιοπιστία. 2. Είναι η πιο οικονομική βιομετρική τεχνική ελέγχου ταυτότητας χρήστη. 3. Είναι μία από τις πιο ανεπτυγμένες βιομετρικές μεθόδους μιας και χρησιμοποιείται εδώ και δεκαετίες. 4. Είναι εύκολη στη χρήση. 5. Απαιτεί μικρό χώρο αποθήκευσης που χρειάζεται η βιομετρική φόρμα, μειώνοντας το μέγεθος της μνήμης της βάσης δεδομένων. 6. Είναι τυποποιημένη. Μειονεκτήματα μεθόδου δακτυλικών αποτυπωμάτων 1. Δεν είναι ακόμα κοινωνικά αποδεκτό σε πολλές περιπτώσεις και αυτό γιατί ένας μεγάλος αριθμός ανθρώπων τη θεωρεί παρεμβατική, διότι εξακολουθεί να είναι σχετική με την ποινική ταυτοποίηση. 2. Ευκολία στην πλαστογράφηση ανάλογα με το σύστημα ελέγχου πρόσβασης που χρησιμοποιείται.. Τα δακτυλικά αποτυπώματα είναι κάτι που ο καθένας αφήνει πίσω του, και μπορούν να αντιγραφούν από τους παραχαράκτες, χρησιμοποιώντας απλά οικιακά αντικείμενα, όπως κολλητική ταινία. 3. Ευαισθησία στις περιβαλλοντικές συνθήκες. Τα λερωμένα χέρια, χειρουργικά γάντια, και οι ατμοσφαιρικοί ρύποι αποτελούν παραδείγματα των προκλήσεων που αντιμετωπίζονται στο χώρο εργασίας.

4 http://insidenews.gr/, (2014), Η MasterCard θα κυκλοφορήσει πιστωτική κάρτα με ενσωματωμένο αισθητήρα. δακτυλικού αποτυπώματος.

Βιβλιογραφία 1. Σιάτρας, Σ., (2004), Σύστημα Αυθεντικοποίησης Μέσω Αναγνώρισης Τρόπου

Πληκτρολόγησης, ΑΠΘ. 2. Olzak, T., (2012), Application of Biometrics: http://resources.infosecinstitute.com/chapter12-applications-of-biometrics/. 3. http://www.biometricsinstitute.org/. 4. Technovelgy, Biometric Security Overview: http://www.technovelgy.com/ct/TechnologyArticle.asp?ArtNum=10.

Similar Documents

Premium Essay

Student Attendance System Using Fingerprint

...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...

Words: 3961 - Pages: 16

Free Essay

Biometric Uid Authentication Using Visual Cryptography

...[1] A.K. Jain and A. Ross, “Biometrics: a tool for information security”, IEEE Transaction on Information Forensics and Security, vol. 1, no. 2, Jun. 2006. [2] C. Blundo, A. De Santis, and D.R. Stinson. On the contrast in visual cryptography schemes. J. Cryptogr., 12:261-289, 1999. [3] J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu. Visual secret sharing for multiple secrets. Pattern Recognition, 41:3572-3581, 2008. [4] A. Ross and A. A. Othman, “Visual Cryptography for Biometric privacy”, IEEE Transaction on Information Forensics and Security, vol. 6, no. 1, Mar.2011. [5] M. Naor and B A. Shamir. Visual cryptography. in: A. De San tis (Ed.), Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, 950: 1-12, 1995. [6] C.C. Wu and L.H. Chen. A study on visual cryptography, Master Thesis. PhD thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998. [7] M. Naor and A. Shamir “Visual cryptography:Improving the contrast via the cover base” IACR Eprint archive, 1996. [8] C. Blundo and A. De Santis and D.R. Stinson, “On the contrast in visual cryptography schemes”, Jurnal pf cryptography, vol. 12, pp. 261-289, 1996. [9] G. Ateniese and C. Blundo and A. De Santis and D.R. Stinson,“Extended Schemes for Visual Cryptography”, Theoretical Computer Science, 1996. [10] Z. Zhouand and G. R. Arce and G. Di Crescenzo, “Halftone visual cryptography” IEEE Trans. Image Process, vol. 15, no. 8, pp. 2441-2453...

Words: 715 - Pages: 3

Free Essay

New Biometrics Process for Conditional Permanent Residents

...U.S. Department of Homeland Security February 28, 2007 UPDATE New Biometrics Process for Conditional Permanent Residents U.S. Citizenship and Immigration Services (USCIS) announces the implementation of a new nationwide biometrics process for conditional permanent residents who file Form I-751, Petition to Remove Conditions on Residence. The new process is effective immediately. Under the old process, following the approval of Form I-751, an approval notice was issued instructing the applicant to appear at a USCIS District Office for processing of his or her Form I-551, Permanent Resident Card (“Green Card”). The approved applicant would manually submit passport-style photographs, index fingerprints, and a signature on Form I-89, I-551 or I-586 Card Data Collection Form, for creation of his or her permanent resident card. The new process, as authorized in 71 Federal Register 15469 (March 28, 2006), requires all conditional permanent residents to appear at a USCIS Application Support Center (ASC) after filing Form I-751 in order to have their biometrics electronically captured. An ASC appointment notice will automatically be sent by mail to the applicant with the specific date, time and location for biometric processing. Biometric processing includes the electronic capture of an applicant’s photograph, signature, index fingerprint and ten-print fingerprints. The photograph, signature and index fingerprint are used to generate the lawful permanent resident card, if the Form...

Words: 769 - Pages: 4

Free Essay

Biometrics

...Biometrics within Financial Institutions Abstract This paper presents a problem with the use of technology within the Credit Unions and Banking industries. Technological innovations have allowed the industry to be more open to consumers and challenges that the current economy has posed. Modern technology is also change the landscape of how, when and where business is conducted with financial institutions and consumers, businesses, and other organizations. Technology driven issues such as privacy, security and trust, have been pushed to the forefront, which makes the line between mobile banking and banking online increasing difficult to distinguish. Credit Unions like other banking institutions rely on gathering, processing, analyzing and providing information to meet the demands of the consumer. Given the importance of information systems within banking its not surprising to find, risks within the systems are developing in nature. History Truliant Federal Credit Union was started in Winston-Salem, North Carolina around 1952. They serve over 180,000 member owners and more than 900 business and organizations with $1.6 billion in assets. Truliant as it will be referred to in this paper has 21 financial locations in North Carolina, South Carolina, and Virginia. One philosophy that stands out or is a representation of what this particular Credit Union stands for is “ people helping people”. Like other not for profit organizations, they provide individuals and small business with...

Words: 1787 - Pages: 8

Free Essay

Criminal Identification Procedures in the 21st Century

...officials in identifying a criminal suspect. The technological advances that continue to assist the criminal justice system in these identifications are Deoxyribonucleic Acid (DNA) analysis, biometric identification, Intra-agency databases for DNA, fingerprinting and palm printing, and camera and wiretap surveillance. Each aspect serves a specific purpose in making certain that the right person is properly identified for the crimes that they commit. Each technological aspect makes certain that the criminal justice system can prove without a doubt that the person under arrest is the person responsible for committing the crime. Criminal Identification Procedures Deoxyribonucleic Acid (DNA) analysis is an examination method that allows any organism to be identified, by its genetic sequences. DNA analysis is highly accurate, important, and used all across the world for important reasons. The main purpose for DNA analysis is identifying individuals who are suspects in criminal cases, identifying victims or their remains when other means of identity is not possible. The advantages of DNA analysis are reliable, accurate results, and helps solving old and new cases. The disadvantage of DNA analysis is it reveals information on physical state, this information is sensitive and must be guarded. Biometric Identification is a system based around the main physical characteristics of the human body such as finger print identification, hand geometry, palm vein authentication, retina scan, iris...

Words: 1407 - Pages: 6

Free Essay

Physiological and Behavioral Biometric Methods

...UVOD Biometrija je znanost o automatiziranim postupcima za jedinstveno prepoznavanje ljudi na temelju jednog ili više urođenih tjelesnih obilježja, ili obilježja čovjekovog ponašanja. Biometrija je danas u IT svijetu našla veliku primjenu zbog potrebe za sigurnošću. Iako se korisničko ime i lozinka još koriste za osobne potrebe na mjestima gdje je potrebna veća sigurnost koristi se neka od urođenih tjelesnih obilježja čovjeka, poput otiska prsta, geometrija šake i lica i izgled mrežnjače oka. Primjena ovih obiljažja čovjeka su popolarna zbog činjenice da ne postoje dva čovjeka s istim otiskom prsta, izgledom rožnice oko ili iste geometije lica. Danas se prepoznavanje osoba obavlja na dva načina: • Prepoznavanje pomoću identifikacijskih dokumenata • Prepoznavanje temeljeno na sigurnosnom ključu Prepoznavanje pomoću identifikacijskih dokumenata: Identifikacijski dokument predstavlja identitet osobe koja ga nosi. Ako je identifikacijski dokument u obliku male standardizirane kartice, tada se on naziva identifikacijska kartica. U mnogim slučajevima različiti dokumenti kao putovnica, vozačka dozvola, kartica zdravstvenog osiguranja mogu poslužiti kao identifikacijski dokumenti. Nedostatak ove metode je postojanje mogućnosti lažnog predstavljanja neke druge osobe ukoliko se domogne tuđeg identifikacijskog dokumenta. To može imati štetne posljedice za vlasnika identifikacijskog dokumenta. Prepoznavanje temeljeno na sigurnosnom ključu: Sigurnosni ključ je...

Words: 3181 - Pages: 13

Free Essay

Technology & Communication

...terminal system installed in their vehicles. This database can help law enforcement officers with workload management in the communication center and they can also help better time management of officers and help greater efficiency. Mobile data terminals can also help with communication between officers and dispatch by letting the officers have access to dispatch receipts, status updates, access to other unit statuses and they can also view any traffic stop updates. Overall, mobile data terminals have helped increase communication between officers and dispatch in the criminal justice system (Versaterm, 2011). Another type of specialized database that is used in the criminal justice system is known as iris scans. “Iris scans is a method of biometric...

Words: 1044 - Pages: 5

Premium Essay

Biometric Security in the Workplace

...Abstract Biometrics has garnered considerable interest from both the Government and private industry. This interest has lead to a number of biometric technologies each with their own share of strengths and weaknesses. The process used in the verification and identification of people using fingerprint, retina-based, iris-based, hand geometry, and facial recognition biometrics are examined in this paper. The advantages and disadvantages of each of these methods are also explored. The future of biometrics is also considered given the current developments in the field.   Organizations are constantly looking for a more secure authentication method for their users to gain access to e-commerce and other security applications. Biometrics continues to gain more and more attention. What is biometrics the right decision for your corporation? If you choose to use biometrics, which is the biometric solution for your corporation, there is no such thing as any one best type of biometrics. Different applications necessitate the use of different biometrics. In order to select the right biometric for your solution as a user you will need to investigate a myriad of vendor products while keeping an eye on future development and technology. Never before have there been more various and more varied options. Vendors have a wide variety of products to select from. Some are new to the market but even these can be considerably better and greatly improve your company security stance. The focus...

Words: 3807 - Pages: 16

Premium Essay

Biometrics Moving Forward

...BoBiometrics to Secure Networks John W. Sisson American Public University Contents Abstract 3 Biometrics to Secure Networks 4 Biometrics Defined 4 Biometric Process 5 Fingerprinting 6 Face Recognition 7 Iris Recognition 8 Hand Recognition 9 Voice Recognition 9 Dynamic Signature 10 Keystroke Dynamics 10 Gait Recognition 10 Facial Thermograph 11 Emergence 11 Obstacles to Biometric Success 12 Conclusion 13 References 15 Abstract Biometrics was once thought to be more of a science fiction means of authentication, not something that could be used in real life applications. The cost was much higher than most companies dreamed of spending. Username and passwords were an effective and efficient means of security. Computer security was not looked at as a must, but more of a way to keep honest people honest. However, as computing power increased, and corporate espionage has led to massive losses for companies, computer security needs increased. Passwords just were not the best means of securing a network anymore. At the same time, improvements in technology made the use of biometrics more efficient. We will now examine the different types of biometric and how they will make the network more secure. Biometrics to Secure Networks For years, passwords have been the method used to secure networks. A user would input his or her userid and password to gain access. Many times, the userid was also the first portion of the users E-mail address. This means...

Words: 3757 - Pages: 16

Premium Essay

Biometrics

...the first biometric security systems appeared in the market, an increasing demand for novel techniques that will cover all different scenarios, has been observed. Every new method appears to outmatch some of its competitors but, at the same time, presents disadvantages compared to others. However, there is still no method that consists a single panacea to all different scenarios and demands for security. This is the reason for which researchers are on a continuous effort for more efficient and generic biometric modalities that can be used in various applications. In this chapter, emerging biometric modalities that appeared in the last years in order to improve the performance of biometric recognition systems, are presented. The presented methods are divided in two major categories, intrusive and non-intrusive ones, according to the level of user nuisance that each system sets off. 1 Introduction Biometric recognition is a well-known research area that aims to provide more efficient solutions to everyday growing human need for security. Biometrics refers to methods that can be used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral characteristics. In information technology, in particular, biometrics are used as a tool for efficient and reliable identity management and access control. Biometrics are also used in surveillance applications in order to identify individuals. The last decade, a large number of novel biometric modalities...

Words: 12845 - Pages: 52

Premium Essay

Gait Analysis

...Abstract ABSTRACT One of the main goals of computer vision research is to develop methods for recognition of objects and events. A subclass of these problems is the recognition of humans and their activities. Recognition of humans from arbitrary viewpoints is an important requirement for different applications such as intelligent environments, surveillance and access control. Human gait is an attractive modality for recognizing people at a distance. Human gait is a spatio-temporal phenomenon that characterizes the motion characteristics of an individual. There is an increased interest in gait as a biometric, mainly due to its nonintrusive as well as non-concealable nature. It is possible to detect and measure gait even in low resolution video. Our goal is to establish a simple baseline method for human identification based on body shape and gait. Our project describes a representation of the dynamics of human walking action for the purpose of person identification and classification by gait appearance. The outer contour of the binarized silhouette of a walking person is chosen as the basic image feature. This project is also based on face recognition software to obtain recognition in a short period of time interval after the image is searched.. Since there has been significant improvement in the sector of retrieval systems and recognition based on biometric systems the project gains a lot of weightage in terms of research carried out. 1 Introduction 1. INTRODUCTION ...

Words: 8133 - Pages: 33

Premium Essay

Design and Implementation of a Bio-Metric (Fingerprint) Clocking System

...CHAPTER ONE INTRODUCTION 1.0 BACKGROUND TO THE STUDY Staff attenda nce management of an institution or organization can be very laborious using the conventional method of paper sheets and old file system method. Every corporate organization poses some standards concerning how attendance is to be confirmed for staff in offices. This is to enable the management of the organization identify those staff that are punctual and competent, that is why keeping the accurate record of attendance is very important. Also in institutions, tracking and monitoring staff time of attendance could pose a tedious task, time consuming and as well prone to errors. As an alternative to the traditional manual clocking process by staff in offices, biometrics characteristics can be used for authenticating staff. This research will focus on developing a Fingerprint based Biometric Clocking System.  The fingerprint Biometrics is adopted in this research work due to the fact that it is one of the most successful applications of biometric technology. In the manual signing processes, where a sheet of paper is placed at the entrance of the office for staff to write their names and signature as a form of confirming their presence for a particular day in the office, falsification in staff attendance mostly occur. A situation whereby a staff can sign on behalf of his or her colleague as being present in the office when that is not true. This can be so difficult to prevent from happening especially for large...

Words: 1919 - Pages: 8

Premium Essay

Biometric Identification Technology

...| Biometric Identification Technology | | By Group C: | HUMN432 | 6/10/2012 | | Table of Contents Introduction History of Biometric Identification Biometric Identification Advancement Timeline * Types of Biometric Identification Technologies and How They Work Benefits of Biometric Identification Technology How and Where Biometry is Used In the USA Controversial Issues and Legalities of Biometric Identification Conclusion Bibliography Introduction Biometric Identification Technology is the world-wide used computer science that identifies humans based on physiological and behavioral traits for access control and security. The computer processing idea has been around for hundreds of years but the equipment has only been available for the past several decades evolving to become better with each step. The need for a formal system to record and identify first-time and repeated offenders in the 1800s led the known Bertillon to develop anthropometrics to identify individuals. This advancement was later linked with computer systems to create a true biometric system identifier. The several types of biometric identifiers, later discussed, have evolved from a mere idea to an implemented security system used in airports, government programs, and even small businesses. The technology is used globally from the US to the UK, India, Germany, and many more. Its long history has created responsiveness and allowed countries to embrace the welfares of such a...

Words: 7486 - Pages: 30

Free Essay

Biometrics

...the near future. It has been called ''biometrics". The pioneers of this new domain intend to construct devices which would allow identification of a person on the basis of his or her ''biological'' characteristics which is voice, movements, features of face and other parts of the body, retina or iris pattern. Nature has made human beings with different characteristics which may vary from one person to another. This property is made use of by Biometric technology to distinctly identify each person. This paper gives an overview of key biometric technologies and basic technique involved. The various opportunities for biometrics are mentioned, followed by the the benefits of the biometric and identification, the actual issue or current potential problems and abuses, and appropriate guidelines of identification and biometrics technology. Introduction Biometric technology involves effective methods of individual identification/authentication through its recognition of unique physiological characteristics. Although still a developing technology which contains deficiencies, it is generally considered to be a highly accurate and widely applicable security measure. However, growing public awareness of this technology has been accompanied by increasing concerns about ethical issues associated with its use. Biometric Systems Biometrics are automated methods of recognizing a person based on a physiological or behavior characteristics. Biometrics technologies are becoming the foundation...

Words: 268 - Pages: 2

Free Essay

Biometrics

...IB Extended Essay Subject: Computer Science / I.T.G.S Research Question – To what extent can biometrics be trusted as a safe method of payment in personal devices? Research Question – To what extent can biometrics be trusted as a safe method of payment in personal devices? Name: Rusheel Iyer School: GEMS Wellington Academy - Silicon Oasis Year 12 Word Count - ____ Name: Rusheel Iyer School: GEMS Wellington Academy - Silicon Oasis Year 12 Word Count - ____ Contents Title Page………………………………………………………………………………………………………..1 Abstract………………………………………………………………………………………………………….3 Introduction……………………………………………………………………………………………………4 Biometrics………………………………………………………………………………………………………4 Fingerprints…………………………………………………………………………………………4 What is a Fingerprint?..........................................................................................4 Why is it used?.........................................................................................................4 What is Fingerprint Recognition?...................................................................4 Facial Recognition………………………………………………………………………………..5 Why is it used?........................................................................................................5 What is Facial Recognition?..............................................................................5 How does it work?...................................................................................

Words: 1744 - Pages: 7