Free Essay

Biometrics Report

In:

Submitted By SgtBellPepper
Words 3039
Pages 13
Communication and Information Technologies

Tutor Marked Assignment

Dynamic Holiday Limited Biometric Authentication Report

Introduction

This report aims to give a brief overview of the alternatives to the current authentication system being used at Dynamic Holidays Limited. Specifically it will detail the technologies behind both fingerprint and iris scanning, doing a comparison of each in turn, and then ultimately leading to a recommendation as to which would suit the company better.

Biometric Overview

Biometrics, or the singular biometric, is the measurement of living things and in most contexts details the measurement of human beings for security and authentication purposes. This stems from the Greek bios (life) and metron (measure). In a security environment, biometrics are utilised to ensure that the correct people have access to the products and services to which they are entitled. The field of biometrics covers a wide scope of technologies, including but not limited to facial, iris, fingerprint and DNA recognition.

Within the field of biometrics, there are generally two sources of identification classifications: physiological and behavioural. Physiological characteristics are those that we are born with and do not usually change (iris and fingerprints), especially once we have reached adulthood. This excludes the nature of physical injury or various other medical or traumatic interventions. Behavioural characteristics are ingrained within us as we grow and develop (gait and signature) and usually only changed when we make a concerted effort to do so.

The clear advantage to biometric identification is that everyone carries their ID with him or her wherever they go. Short of physical injury, you cannot lose your “token” and it cannot be stolen from you, in the traditional sense. However, with the advancement in technologies there are some downsides within a security context. Certain measures can be taken to copy or clone a person’s “token” and it is up to the IT community to come up with ways to tackle this problem, by finding new ways to ensure an individual’s ID is more secure and less open to cloning or copying.

Broadly speaking, biometrics expands into the following:

1) Gait – which is the manner in which someone walks or runs
2) Fingerprint – which is the physical shape and size of the ridges on a person’s fingers and thumbs
3) Iris Pattern – which is the specific pattern of the iris and its colouration and spacing within the eyeball
4) Signature – which is the handwritten marking used by people that details their last name and initials
5) Login Details – which is either the self-assigned or otherwise assigned username and password used to access a system
6) Scent – which is the use of a system to detect a person’s odour
7) Facial – which is the measurement of a person’s identifying features like the size and shape of the individual extremities (eyes, ears, nose and mouth) along with the distance and angles between each of those extremities
8) Voice – which is the tone, pitch and frequency of a person’s speech pattern.
Furthermore, biometrics can be characterised according to seven principles as detailed in figure 1. (Maltioni et al, 2003)

Figure 1. Seven Characteristics of Biometrics

Fingerprint

As a biometric identifier, fingerprinting is one of the oldest in existence. Both private companies and public entities, like law enforcement, for the identification and verification of individuals, have used it extensively.

Fingerprint security systems work on the basis that every person has a unique and identifiable set of fingerprints on each finger and thumb (even twins). The ridges and valleys that are present have formed with the combined influence of DNA and environmental factors.

Current systems utilise either an optical scanner (where the finger is placed on a pad that scans the fingerprint like a copier) or a capacitive scanner (where the fingerprint is drawn across a “sweep” type scanner).

With the optical scanner, an image is created with the use of light photons, which can illuminate the ridges, and valleys of the fingerprint. Depending on the varying degree of the reflected light, an inverted image is utilised by the system to create a comparative image, which it will then contrast with an image on its database.

As for the capacitive scanner, it also creates a comparative image, albeit in a slightly different manner. These scanners utilise an electrical current based around an integrator, an electrical circuit and an inverting operational amplifier. The manner in which it works in basic terms, is that depending on whether each of the cells detects a valley or ridge, is detected by the varying voltage outputs when carried across those same ridges and valleys. When the combined results are analysed by the scanner an image is created.

Because the capacitive scanner requires a physical fingerprint to allow for the transfer of voltage rather than simply detecting light and dark, it becomes apparent that it is preferable as the chances of “tricking” the system become much harder.

In terms of the actual analysis of the fingerprint data, most systems only account for the “minutiae” which are specific features. This is because analysis of the entire fingerprint would be far too resource intensive and so take far too long. This would make it both costly and impractical.

Iris

Iris scanning as a system utilises the idea of a person’s unique iris pattern. The iris is a person’s coloured ring of muscle that surrounds the pupil, and is genetically determined. In the same way that we all have unique fingerprints, we also have unique irises, including the twins amongst us.

With this system, a specialised camera is used under both normal and infrared lighting conditions. These two captured images are then analysed by a computer to discard any superfluous data (like eyelashes) and then using an algorithm compiles a template, a 512-digit number called an IrisCode, which it links to your personal data and then stores in a database.

Once your iris image is captured and stored in the database, along with your details, all you have to do is simply have your iris scanned whenever you want access and the system will compare it to the image on the database. If it is a match, the system will allow access.

Comparison (Fingerprint v Iris)

For this section, I will detail both the advantages and disadvantages of both systems. I will then detail a comparison based on convenience, reliability and acceptability.

Iris recognition (Advantages):
• Highly accurate
• Fast verification time
• No issues with stolen identity as biological degradation makes it unlikely
• Hygienic and low maintenance

Iris recognition (Disadvantages):
• Can be considered intrusive
• Highly data intensive
• The technology behind these systems is costly

Fingerprint (Advantages):
• Highly accurate
• The technology behind these systems is economical
• Is highly standardised and widely used/developed
• User friendly
• Not data or resource intensive at the database level

Fingerprint (Disadvantages):
• Some people are uncomfortable with the association with criminality
• Simple issues can result in false results (eg dirty fingers/scrapes/burns)
• Not necessarily appropriate for children as the shape/size of their fingerprints changes with growth (although this is mainly a long term issue)
• Image capture at the source level can be data intensive if a decent image quality is to be guaranteed

Convenience

Both systems are extremely convenient and can be installed, and used relatively easily by both staff and customers.

Iris scanners because they are contactless require no cleaning, and are very low maintenance. This makes them more convenient in a high volume customer area, for both staff and customers.

The iris scanner is also not weather reliant. In other words, if it is cold, and people are wearing gloves there is no need to remove anything.

Reliability

The iris scanner is far more accurate and reliable as it scans for far more detail than the fingerprint scanner. In addition, it is less reliant on the person keeping the system updated, as there are no changes with age.

The iris scanner is also less susceptible to issues like dirt, or the varying health conditions suffered by many people like dry skin.

This means the system is more secure for the company and less prone to identity theft for the customers.

Acceptability

Generally speaking, people seem more accepting of the idea of an iris scan than they are fingerprints. This is because, rightly or wrongly, people have a preconceived notion of the idea that fingerprinting is seen as something linked with law enforcement and criminality.

Both company and customer needs are met with the iris scanner as it is generally more accepted.

Recommendation (Fingerprint v Iris)

Based on the information provided in the previous section regarding both the advantages and disadvantages along with the comparison of convenience, reliability and acceptability I believe that the company should invest in iris scanner technology.
I have come to this conclusion because I believe on balance that the rewards overall outweigh the costs.
This is due to the following points:

• The iris scanner is far more accurate than the fingerprint scanner both for enrolment and verification
• The iris scanner has a lower maintenance overhead long term because it is contactless
• People will be more accepting of the iris scanning system
• The iris scanning system does not need constant updating due to age etc.
• The iris scanning system is far less data and resource intensive meaning savings can be had long term
• The iris scanner can be used in all weather

Conclusion

This report has aimed to educate the management team regarding the alternative use of either iris or fingerprint technology to replace the existing wristband system.

In detailing the technology, and how each of the systems can best enhance the experience of both the company and the customers, I believe an informed decision can be made as to whether to change the systems and which of the two alternatives is best.

Additionally the advanced addendum below gives those with technical knowledge an insight into the advances currently being made in the relevant fields of biometrics.

Technical Information (Advanced Addendum)

This addendum is included for those recipients who require a more detailed and intricate knowledge of the systems involved.

Overall Information

Biometric security systems are based on a five-point architecture: storage, sensors, feature extractor, matcher, and decision maker. See figure 2. (Wong and Walker, 2012)

Figure 2. Biometric System Architecture

The sensors (either input or contactless) are used for the capture of the data. The feature extractor utilises the raw data from the sensors to convert it into a template and is a form of non-reversible compression. This aids in the resources necessary to process the information and assists with the security of the access data being used. The storage (either locally or networked based) houses the database with which the templates can be accessed and compared for verification purposes. It should be noted that the links and the storage media must be setup with secure measures in place to ensure the integrity of the data. The matcher then does a comparison between the sample and the stored information and a resultant template detailing the similarities is produced. Finally, the decision maker will, based on the similarities found by the matcher, decide on the suitability of the original sample given as to whether to grant or deny access to the specified individual.

Fingerprint Information

Fingerprint scanners utilise either optical (CCDs and CMOS-based) or solid-state (capacitive) sensors for the capture of data. During the scanning process, and the detection of the singularities, the image is converted into a “ridge orientation image” and is represented by the positioning of the lines and their associated angles between these lines and the horizontal axis (known as theta θ). See figure 3. (Wong and Walker, 2012)

Figure 3. Ridge Orientation Image

Iris Information

Based on the landmarks of the iris and the associated algorithms, identification and verification can take place using iris scanners. Patterns of the iris, along with other characteristics, can be described and mapped by use of the 256 bytes of data (polar co-ordinates) and control bytes (used to exclude extraneous information – eyelashes etc.). This IrisCode comparison amounts to the Hamming Distance (HD) and dependant on the results, either comparative with the statistical data or not, will result in a match or non-match. See figure 4. (FBI pg.116) For the IrisCode example with the relevant iris comparison.

Figure 4. Localised Irides with IrisCodes and Pictorial Representation of IrisCode

Error Information

Within the scope of biometric systems, there is an element of error and risk assessment. All of the data sources carry with them an ability to either given false positives or negatives. This depends on the threshold set by the administrator of the system. These are technically known as false match or false non-match respectively. The assessment of any system is based on the FMR (False Match Rate) and it’s FNMR (False Non-match Rate) probability. This statistical data threshold is set and measured over a period of time and gauges the EER (equal error rate) where the FMR and the FNMR correspond at a particular threshold setting. Figure 5. (Wong and Walker, 2012) details the variation according to the given threshold.

Figure 5. EER/FMR/FNMR Graph

Bibliography

Biometrics Center of Excellence, (2016). Iris Recognition. [online] Available at: https://www.fbi.gov/about-us/cjis/fingerprints_biometrics/biometric-center-of-excellence/files/iris-recognition.pdf [Accessed 2 Mar. 2016].

HowStuffWorks, (2002). How Fingerprint Scanners Work. [online] Available at: http://computer.howstuffworks.com/fingerprint-scanner.htm/printable [Accessed 2 Mar. 2016].

Explainthatstuff.com, (2016). How do iris scans work? Who invented them? - Explain that Stuff. [online] Available at: http://www.explainthatstuff.com/how-iris-scans-work.html [Accessed 2 Mar. 2016].

Oneiricocelotutm.blogspot.co.uk, (2016). Iris Recognition vs Fingerprint. [online] Available at: http://oneiricocelotutm.blogspot.co.uk/2011/12/iris-recognition-vs-fingerprint.html [Accessed 2 Mar. 2016].

Wong, P. and Walker, M. (2012). T215 Communication and Information Technologies Block 4 Protecting and Prying. 2nd ed. Amersham: Halstan & Co. Ltd., Part 6 Biometrics.

Walker, M. (2012). T215 Communication and Information Technologies Block 4 Protecting and Prying. 2nd ed. Amersham: Halstan & Co. Ltd., Part 8 Writing longer reports.

[TOTAL WORD COUNT: 2240]

Question 2

Executive Summary

Dynamic Holiday Limited requires an authentication system to replace the current wristband RFID system.

Viable options that have been proposed include fingerprint and iris recognition systems. The existing system is no longer fit for purpose and the customers have a long-standing complaint that has spurred the company into considering the available alternatives.

An overview has been given regarding the field of biometrics, and then more specifically the systems surrounding fingerprint and iris scanners has been explained, including the pros and cons of both. Using the requested criteria of convenience, reliability and acceptability a comparison has also been done to give a better understanding of the two systems and their compatibility with the needs of both the company and the customers.

This leads the report to give a justified recommendation based on the evidence provided as to which system the company should employ in the future. This is taken from a combination of the pros and cons and the matching of the convenience, reliability and acceptability criteria given by the company.

Lastly, there is a final technical section, which has been created for the advanced members of the management tea, to make them aware of the current and future developments in the field of biometrics and how each of the systems works. Overall, it includes the information pertinent to the field of biometrics as a whole, how the fingerprint and iris systems capture data, and then details the error algorithm information.

The conclusion then details the findings of the report in a more succinct manner and the manner in which the final decision was made when making the recommendations to the management team.

[TOTAL WORD COUNT: 272]

Question 3

Overall Information

This section was included because it gives a technical breakdown of the system processes into their individual parts. It also details the various methods of transfer and storage of the data and the manner in which the system utilises that data to make a comparison for the purposes of authentication and verification.

Fingerprint Information

This section was included to give a more in-depth look at the algorithm data, and the manner in which the mathematics of the assigning of the data, collected by the fingerprint scanner works.

Iris Information

This section was included because it gives a more detailed description of the IrisCode system that is used by the iris scanners. It also gives further information about the algorithms in play, and the manner in which the coding system utilised the distance measuring factors like HD.

Error Information

This section was included to provide an overview of the details surrounding statistical analysis. It also provides details about how those statistics are used to build a framework for the recognition systems, and the manner in which thresholds can affect the accuracy and usability of the systems.

[TOTAL WORD COUNT: 187]

Question 4

Checklist for ‘Dynamic Holiday Limited Biometric Authentication Report’

Grading for ‘Dynamic Holiday Limited Biometric Authentication Report’

References

Chavez, C. (2014). Samsung Galaxy S5's fingerprint scanning home button detailed in new report. [online] Phandroid.s3.amazonaws.com. Available at: http://phandroid.s3.amazonaws.com/wp-content/uploads/2014/02/fingerprint_scan.jpg [Accessed 3 Mar. 2016].

Thumbs.dreamstime.com, (2016). Iris Eye Scan. [online] Available at: http://thumbs.dreamstime.com/z/iris-eye-scan-1018945.jpg [Accessed 3 Mar. 2016].

Wong, P. and Walker, M. (2012). T215 Communication and Information Technologies Block 4 Protecting and Prying. 2nd ed. Amersham: Halstan & Co. Ltd., Part 6 Biometrics p. 163

Wong, P. and Walker, M. (2012). T215 Communication and Information Technologies Block 4 Protecting and Prying. 2nd ed. Amersham: Halstan & Co. Ltd., Part 6 Biometrics p. 166

Wong, P. and Walker, M. (2012). T215 Communication and Information Technologies Block 4 Protecting and Prying. 2nd ed. Amersham: Halstan & Co. Ltd., Part 6 Biometrics p. 177

Biometrics Center of Excellence, (2016). Iris Recognition. [online] Available at: https://www.fbi.gov/about-us/cjis/fingerprints_biometrics/biometric-center-of-excellence/files/iris-recognition.pdf, p. 116 [Accessed 2 Mar. 2016].

Wong, P. and Walker, M. (2012). T215 Communication and Information Technologies Block 4 Protecting and Prying. 2nd ed. Amersham: Halstan & Co. Ltd., Part 6 Biometrics p. 189

Similar Documents

Premium Essay

Student Attendance System Using Fingerprint

...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...

Words: 3961 - Pages: 16

Premium Essay

Dbms Function

...take to correct the database. Using the sample log in Figure 7-1 1, list and describe the updates that the DBMS will roll back if transaction 2 is interrupted at 8:10. In transaction 2, the DBMS started it at 8:01, added an Orders table record at 8:02, and added an Order Line table record at8:05 and added an Order Line table record at 8:09. To roll back the transaction, the DBMS deletes the three added records. 2. Occasionally, users at Premiere Products obtain incorrect results when they run queries that include built-in (aggregate, summary, or statistical) functions. The DBA told management that unrepeatable reads caused the problems. Use books, articles, and/or the Internet to research the unrepeatable read problem. Write a short report that explains the unrepeatable-read problem to management and use an example with y our explanation. (Unrepeatable reads are also called inconsistent retrievals, dirty reads, and inconsistent reads.) Unrepeatable-Read Problems occur many times when a different result is seen from the same query while still in progress. This usually happens when dealing with the UPDATE command by other transactions. An unrepeatable read (also called an inconsistent retrieval, dirty read, or inconsistent read) occurs when a user’s retrieval transaction reads a set of data that other users’ transactions have partially updated. For example, suppose Pat’s transaction involves calculating the total balance for all customers, and the customer balances are $900...

Words: 965 - Pages: 4

Premium Essay

Design and Implementation of a Bio-Metric (Fingerprint) Clocking System

...institutions, tracking and monitoring staff time of attendance could pose a tedious task, time consuming and as well prone to errors. As an alternative to the traditional manual clocking process by staff in offices, biometrics characteristics can be used for authenticating staff. This research will focus on developing a Fingerprint based Biometric Clocking System.  The fingerprint Biometrics is adopted in this research work due to the fact that it is one of the most successful applications of biometric technology. In the manual signing processes, where a sheet of paper is placed at the entrance of the office for staff to write their names and signature as a form of confirming their presence for a particular day in the office, falsification in staff attendance mostly occur. A situation whereby a staff can sign on behalf of his or her colleague as being present in the office when that is not true. This can be so difficult to prevent from happening especially for large offices where row count can take longer time. The trending concern in this modern age is regarding national security, identifying theft as well as on-line terrorism. Researcher refers to Biometric as a solution for detecting user’s identity and security challenges emanating in this modern day. Biometric identification is any automatically measurable, robust and distinctive physical...

Words: 1919 - Pages: 8

Premium Essay

Journal

...(IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 3, March 2012 An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique Josphineleela.R Dr.M.Ramakrishnan Research scholar Department of Computer Science and Engineering Sathyabamauniversity Chennai,India ilanleela@yahoo.com Professor/HOD-IT Velammal Engineering College Chennai,India ramkrishod@gmail.com Abstract— Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric systems store the minutiae template of a user in the database. It has been traditionally assumed that the minutiae template of a user does not reveal any information about the original fingerprint. This belief has now been shown to be false; several algorithms have been proposed that can reconstruct fingerprint images from minutiae templates. In this paper, a novel fingerprint reconstruction algorithm is proposed to reconstruct the phase image, which is then converted into the grayscale image. The proposed reconstruction algorithm ...

Words: 3558 - Pages: 15

Premium Essay

Biometrics

...the first biometric security systems appeared in the market, an increasing demand for novel techniques that will cover all different scenarios, has been observed. Every new method appears to outmatch some of its competitors but, at the same time, presents disadvantages compared to others. However, there is still no method that consists a single panacea to all different scenarios and demands for security. This is the reason for which researchers are on a continuous effort for more efficient and generic biometric modalities that can be used in various applications. In this chapter, emerging biometric modalities that appeared in the last years in order to improve the performance of biometric recognition systems, are presented. The presented methods are divided in two major categories, intrusive and non-intrusive ones, according to the level of user nuisance that each system sets off. 1 Introduction Biometric recognition is a well-known research area that aims to provide more efficient solutions to everyday growing human need for security. Biometrics refers to methods that can be used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral characteristics. In information technology, in particular, biometrics are used as a tool for efficient and reliable identity management and access control. Biometrics are also used in surveillance applications in order to identify individuals. The last decade, a large number of novel biometric modalities...

Words: 12845 - Pages: 52

Premium Essay

Biometric

...springer.com/chapter/10.1007/978-3-642-01793-3_20 Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic parameters and real biometric data. Results of bias correction in the verification systems differ considerable between synthetic data and real data: while the bias is responsible for a large part of classification errors in the synthetic facial data, compensation of the bias in real facial data leads only to marginal improvements. https://www.eff.org/wp/biometrics-whos-watching-you September 14, 2003 September 2003 Introduction Among the many reactions to the September 11 tragedy has been a renewed attention to biometrics. The federal government has led the way with its new concern about border control. Other proposals include the use of biometrics with ID cards and in airports, e.g. video surveillance enhanced by facial-recognition technology. The purpose of this document is to sketch out EFF's concerns about biometrics. In today's public arena, biometric technologies are being marketed as a "silver bullet" for terrorism; however, very little independent, objective scientific testing of biometrics has been done. Deploying biometric systems without sufficient attention to their dangers makes them likely to be used in a way dangerous...

Words: 7685 - Pages: 31

Free Essay

Nt2580 Final Project

...Richman Investments | Richman Internet Infrastructure Security Management Upgrade | ITT Technical Institute NT2580 Course Project | | Jason R Spitler | 5/30/2014 | Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. | Final Project I. Richman Internet Infrastructure Security Management Upgrade A. Purpose Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. II. Basic Authentication Procedures and Standards, (Who users are.) A. Trinity-Three-factor Authentication Method replaces Basic Authentication It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops...

Words: 1901 - Pages: 8

Premium Essay

Biometric Identification Technology

...| Biometric Identification Technology | | By Group C: | HUMN432 | 6/10/2012 | | Table of Contents Introduction History of Biometric Identification Biometric Identification Advancement Timeline * Types of Biometric Identification Technologies and How They Work Benefits of Biometric Identification Technology How and Where Biometry is Used In the USA Controversial Issues and Legalities of Biometric Identification Conclusion Bibliography Introduction Biometric Identification Technology is the world-wide used computer science that identifies humans based on physiological and behavioral traits for access control and security. The computer processing idea has been around for hundreds of years but the equipment has only been available for the past several decades evolving to become better with each step. The need for a formal system to record and identify first-time and repeated offenders in the 1800s led the known Bertillon to develop anthropometrics to identify individuals. This advancement was later linked with computer systems to create a true biometric system identifier. The several types of biometric identifiers, later discussed, have evolved from a mere idea to an implemented security system used in airports, government programs, and even small businesses. The technology is used globally from the US to the UK, India, Germany, and many more. Its long history has created responsiveness and allowed countries to embrace the welfares of such a...

Words: 7486 - Pages: 30

Premium Essay

Thesis

...Foreign Literature According to Thomas Primer on his article “Automated computerize Process”, in Readers Digest Magazine, May 2005, Page 45, for many businesses automating the collecting of employee attendance data when employees begin their shifts is still a manual process. Even business that has automated or computerized processes such as scheduling, time cards sheets to collect time and attendance data. NOVA time a group system developer, on last May 2007, the system that will give management the power to not only utilize the tools we have available to us today, but will continue to grow and evolve, giving it the capability to incorporate and utilize the tools the new millennium promises to bring us. NOVA time has brought a system designed for growth while maintaining the maximum in flexibility. Where the sophistication lies within the programmed mechanism of the system, allowing for a quick and simple implementation and employee training cycle, after all the true test of a system is not only in the production and wealth of reporting, but in the simplicity and ease of its operation in conjunction with a simple and accommodating implementation program. Better humans (2003) stated that a wireless fingerprint scanner could soon be helping law enforcement agencies; government and the military instantly identity the scanner, called sweet fingerprint, today. It is being demonstrated at the government convention one merging technologies, which addresses issues of homeland...

Words: 1251 - Pages: 6

Premium Essay

Gait Analysis

...arbitrary viewpoints is an important requirement for different applications such as intelligent environments, surveillance and access control. Human gait is an attractive modality for recognizing people at a distance. Human gait is a spatio-temporal phenomenon that characterizes the motion characteristics of an individual. There is an increased interest in gait as a biometric, mainly due to its nonintrusive as well as non-concealable nature. It is possible to detect and measure gait even in low resolution video. Our goal is to establish a simple baseline method for human identification based on body shape and gait. Our project describes a representation of the dynamics of human walking action for the purpose of person identification and classification by gait appearance. The outer contour of the binarized silhouette of a walking person is chosen as the basic image feature. This project is also based on face recognition software to obtain recognition in a short period of time interval after the image is searched.. Since there has been significant improvement in the sector of retrieval systems and recognition based on biometric systems the project gains a lot of weightage in terms of research carried out. 1 Introduction 1. INTRODUCTION 1.1 IMAGE PROCESSING: Image Processing is a technique to enhance raw images received from cameras or sensors placed on satellites, space probes, aircrafts, surveillance systems or pictures taken in normal day-to-day life for various applications...

Words: 8133 - Pages: 33

Free Essay

Biometrics

...Optimization of biometric Fingerprint Recognition parameters using Genetic Algorithms Report submitted for CPSC - 6126 Fall 2014 Term Paper By Krishna Sindhuri Nagavolu 13th December, 2014 Optimization  of  biometric  fingerprint  recognition  parameters  using   Genetic  Algorithms   Abstract This research paper discusses about parameter optimization for biometric fingerprint recognition with the use of genetic algorithms. An accurate access control system is very important in domains like identification checks at airports, government organizations, FBI’s, scientific working groups like NASA, US defense department and driver’s license office. The main reason these organizations prefer Biometrics is because it measures physiological characteristics like fingerprints, iris patterns, facial recognition, retina recognition, ear recognition and DNA analysis. Based on the features of the biometric sensors used, the system can detect whether a person is an authorized user or not. Though there are many other methods for identification, biometric sensors are considered to be very reliable and accurate. The main objective of this paper is to build a fingerprint recognizer that is fully automatic and can minimize the errors caused while matching the fingerprints. Keywords: Biometrics, genetic algorithms, Parameter optimization, fingerprints                           2|Page Optimization ...

Words: 2966 - Pages: 12

Premium Essay

Electronic Daily Time Record

...Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D.1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria. 2 Department of Electrical and Electronics, University of Benin, Edo State, Nigeria. E-mail: engrshoewu@lasunigeria.org* ABSTRACT In this paper, the development of an attendance management system using biometrics is proposed. Managing student attendance during lecture periods has become a difficult challenge. The ability to compute the attendance percentage becomes a major task as manual computation produces errors, and also wastes a lot of time. For the stated reason, an efficient attendance management system using biometrics is designed. This system takes attendance electronically with the help of a finger print device and the records of the attendance are stored in a database. Attendance is marked after student identification. For student identification, a biometric (fingerprint) identification based system is used. This process however, eliminates the need for stationary materials and personnel for the keeping of records. Eighty candidates were used to test the system and success rate of 94% was recorded. The manual attendance system average execution time for eighty students was 17.83 seconds while it was 3.79 seconds for the automatic attendance management system using biometrics. The results showed improved performance over manual attendance management system....

Words: 3034 - Pages: 13

Premium Essay

Passport of the Future

...MSc thesis Information security Passport of the Future: Biometrics against Identity Theft? Marijana Kosmerlj NISlab Høgskolen i Gjøvik marijana@erdal.biz 30 June 2004 Sammendrag Formålet med biometriske pass er å forhindre ulovlig adgang av reisende inn i et land og å begrense bruken av forfalskede reisedokumenter ved en mer nøyaktig autentisering av reisende. Etter den 11. september 2001 har interessen for bruk av slike biometriske pass økt kraftig. Biometriske pass vil bestå av et høykapasitets smartkort som vil inneholde et bilde av passinnehaveren i tillegg til annen type identitetsinformasjon. I passkontrollen vil ett foto bli tatt av passeieren og sammenlignet med fotoet lagret i passet. Et systemdefinert parameter vil avgjøre om disse to fotoene er like nok til å fastslå om personen i de to fotoene er en og samme person. Mange utfordringer er knyttet til biometriske systemer slik som feilrater, “spoofing”angrep, ikke-universalitet og interoperabilitetsproblemer. Forskningen har vist hvor lett det er å lure biomtriske systemer ved bruk av for eksempel statiske foto. Denne rapporten går ett skritt videre og tar en nærmere titt på fiender og deres ressurser i et grensekontrollmiljø. Den tradisjonelle måten å beregne feilakseptraten til biometriske systemer på, vil ikke gjenspeile den virkelige feilakseptraten i dette miljøet. For eksempel, vil andelen av fiendene som har minst tyve ”look-alikes” i målpopulasjonen sett fra et biometrisk system’s perspektiv være...

Words: 15324 - Pages: 62

Free Essay

Aviation Security

...Security: Does it Work Bruno Gerardo Introduction to Canadian Aviation (MOS 1022F) Dr. Suzanne Kearns 23 November, 2011 Abstract On September 11, 2001, the world watched in terror as America was under attack. As a result of these events, the aviation industry was restructured to improve reliability and security of commercial air travel. Although the new security changes have improved the overall safety of air travel, concerns have been raised that the changes introduced are invasive to privacy, and are an infringement of individual rights. Biometric and advanced imaging technology have been criticized for this reason, however, they have been effective at preventing further terrorist attacks. The purpose of this paper is to analyze the security measures that have been introduced as a result of September 11th 2001, and evaluate the effectiveness of the changes and how they impact both safety and privacy. Keywords: Biometrics, Advanced imaging technology, September 11 Invasive Security: Does it Work On September 11, 2001, the world watched in terror as America was under attack. Early that morning, four commercial airliners departed from Newark and Boston with arrivals at San Francisco and Los Angeles were taken over by nineteen hijackers (National Commission, 2004). Two of these aircrafts collided with the Twin Towers in New York City resulting in the destruction of both buildings. An additional aircraft flew into the Pentagon in Washington D.C, and the final aircraft...

Words: 3337 - Pages: 14

Premium Essay

Alhaji

...Investigation into Biometric Technologies and the Development of a Fingerprint Recognition Application Student Name: Robert Heaney ST No: 10550804. Supervisor: Jonathan G. Wallace . . . . . . . . . . Note: Incomplete, this document is currently in draft Abstract This preliminary document covers the presentation phase of a final year BSc (Hons) computing science project aiming to investigate biometric technologies and develop a fingerprint recognition application to allow logging of student attendance at lectures. The introduction offers some background to the project and establishes the aims and objectives of the project overall. Following on from the introduction, the literature review presents a critique of research material that provides the basis for the project. This material includes a number of texts, journals and research papers as well as additional information sourced from the Web. As drawn from the literature, the subject areas covered include; history and background to modern biometrics; technological, social, organisational and environmental influences; key technologies in the market today; design issues, including security, performance and testing. In chapter 3, attention turns to requirements analysis for the development of a fingerprint recognition system. The process follows a requirements engineering approach to development by formally establishing user requirements and allowing continuous requirements assessment...

Words: 5371 - Pages: 22