Beruflich Dokumente
Kultur Dokumente
S
Presented By : Jyoti Turkar
Outline
Introduction
Biometrics techniques
FAR/FRR
Major Players
Summary
Retina scanning
Iris scanning
Fingerprint scanning
Hand scanning
Face recognition
Signature recognition
Keystroke recognition
BIOMETRICS TECHNIQUES
RETINAL
SCANNING
User Looks Into a
Viewer and Focuses
on a Point; Infrared
Light Scans Retina
Iris Scanning
User looks at a camera
(distance from camera
increasing rapidly to 2-3 feet)
FINGER SCANNING
User Places Finger on
Scanning Device
HAND SCANNING
User Places Hand on
Device
FACIAL RECOGNITION
OTHER TECHNIQUES
Voice Recognition & DSV
User speaks into a microphone or other device, such as a
telephone handset
Signature Recognition
User signs name on a device
Keystroke Recognition
User types standard sample on keyboard
Technique
Strengths
Retina
Highly accurate
Iris
Fingerprint
Hand/Finger Geometry
Face Recognition
Voice Recognition
Signature Recognition
Keystroke Recognition
Technique
Weaknesses
Retina
Iris
Fingerprint
Hand/Finger Geometry
Face Recognition
Voice Recognition
Signature Recognition
Keystroke Recognition
Low
FRR
Reject the correct person
Security Level
High
MAJOR PLAYERS
Computer access
Physical access
Handheld devices
Military/Govt. Agencies/DOD
Financial services
Hospitals
Telecommunication
SUMMARY
REFERENCES
Fuller, Scott and Pagan, Kevin 1997. Intranet Firewalls Planning and Implementing
Your Network Security System. Ventana Communications Group, Inc.
Conry-Murray, Andrew. Network Magazine. Oct. 1, 2002. p28 Securing End Users from
Attack.
McCollum, T. Security concerns prompt new initiatives. The Internal Auditor. Oct.
2002.
Short, Bob. September 2002. Getting the 411 on Biometrics. Security Magazine. p48.
Tocci, Salvatore. 2000. High-Tech IDs: From Finger Scans To Voice Patterns. Grolier
Publishing
Mitnick, Kevin & Simon, William L. The Art of Deception: Controlling the Human
Element of Security. Library Journal.