Premium Essay

Biometric Seminar

In:

Submitted By shreerangv
Words 4528
Pages 19
INTRODUCTION

Remember , Tom cruise having from a rope upside down in mission impossible trying to gain access into a send alone computer of CIA in a black, heat insulating suit and constantly monitoring his body temperature to prevent registering an increase in the preset room temperature, so that thermal radiation measurement devices don’t give away the intrusion?

Any Hollywood action movie these days typically include high-tech gizmos installed for restricting physical access, the likes of which could be seen in Mission Impossible. Prominent among these are high security authentication systems, a manifestation of which can be seen in establishments having access restrictions. In such situations, access is usually granted by a device, which takes into account some physical parameter of the person seeking access or entry, e.g. his fingerprint, eye or face and allows access only when there is a match with a previously existing sample of the same parameter.

Biometrics is the science and technology of measuring and statistically analyzing biological data. Biometric technology is defined as automated methods of identifying or authenticating the identity of a living person based on a physiological of behavioral characteristic. Some examples include measures based on information from handwriting, fingerprints, face, voice, retina, iris, hand, ear shape and gait data.

A biometric system is a pattern recognition system that establishes authenticity of a specific physiological or behavioral characteristic possessed by the user. The ability of monomodal system to reject imposters, who claim a false identity, becomes a critical issue in security applications.

A single feature sometimes fails to be exact enough for identification; for example, in case of identical twins their faces alone may not distinguish them. Other disadvantage of using only one feature is

Similar Documents

Premium Essay

Fall Evaluation for University

...reviewing my lecture notes along with studying for my exams. The first focus that is important for me to keep consistent is my time management skills. Before I did not have a set strategy for how I am going to execute this so I just went with the flow as the day passed. This was a not beneficial for me because for anything that happened unexpected, I was not prepared with a backup plan to get caught up. I would instead wait until later on during the week to catch up on what I missed so I decided to make an schedule/planner. In the morning I go to the gym before lectures that way I have energy to go about my day. In between lectures, I use to walk back to residence to take a nap, but now I stay on campus and spend time in open seminar rooms where I catch up on my readings. When the day finishes, I double check to make sure I have my readings finished before next day’s lecture and if I do, I allow myself to hang out with my friends by going to the gym at night or watching television. Overall, I think I’m doing a decent job of making this an everyday habit. The only criticism I have for myself in regards to time management is making sure I check my email everyday since I learned my lesson for missing assignments for the STEP program. Another focus I am keeping consistent is my attendance. Last term I use to miss some morning classes due to sleeping in, but with the planner I have made for myself that is no longer a problem since I’m a the gym every morning before...

Words: 585 - Pages: 3

Free Essay

Porter Forces

...Student support: Teaching Staff: MODULE AIMS Carol Marshall, (3A40) carol.marshall@stir.ac.uk Lynne McCulloch (3B44) l.a.mcculloch@stir.ac.uk K Davies, J Joseph, C Marshall, S Mawson, C Taylor The first two foundation modules examined the firm and the external environment. The emphasis for the module is the management of organisations in the 21st century. As such, this module concentrates on the management of the functional areas of the business, namely operations management, human resource management and marketing within the broader context of the changing organisation and the global economy. MODULE LEARNING OBJECTIVES By the end of this module, through completion of the assessment, attendance at lectures and participation in seminars you will have gained knowledge and understanding of:  the changing nature of the global economy and its impact on management,  operations management and organisational aspects of the business,  the future for managing human resources  the changing nature of the market place, marketing and consumer behaviour Also, you will have developed skills in being able to:  think critically, conceptually and contextually,  select and apply theoretical academic models,  search and select appropriate reading material,  use case studies to apply theoretical models to real life  present material in both written scholarly essays and oral presentations  understand the dynamics of group work  reflect upon the learning experience to further develop...

Words: 2031 - Pages: 9

Free Essay

Personal Finance

...August 25, 2015 To: Kaci Bray From: Joseph Kolega Subject: Orientation – Freshman Point of view Hello, I am a freshman at KU this semester. Before this, however, I went through an admissions process along with my orientation to follow. For the most part my transition from high school student to college student was nearly seamless. Looking back at the entire process, there are a few air bubbles I think if smoothed out could benefit not only the incoming freshman, but the university as a whole. Seminars? I will admit I’m not fully adept in courses at KU just yet, nor will I ever be. One thing that irked me orientation day was the hour long lecture on how critical a seminar class will be to our KU core. Now I understand this is a huge thing in liberal education, but gearing everyone for an hour to take one course they will never use isn’t justified when there are 100 other courses I could choose that weren’t as heavily endorsed. The school biased common book seminars, and I almost felt as though they were sticking their hand in my education, to be dramatic. Account Issues Once it was time to log in and finally enroll into our courses, I hit a road block when I found out we were supposed to have our KU ID and password already memorized and ready to go. Being told to walk all the way up to a different hall to reset my account was troubling and ultimately put me behind in line to pick ideal class times. I take partial accountability for my lack of knowledge on my own account...

Words: 481 - Pages: 2

Premium Essay

Broadway Cafe

...Having recently acquired the rights to the Broadway Café, we, Gem Global Consulting Group, have developed a new, successful business plan designed to revitalize the Broadway Café. Our strategy will take into account the several factors that make up the current business situation. These factors include the opportunity to implement Information Technology systems and supply chain improvements, the broad range of products offered by the Broadway Café, the competitive environment, and the fact that the café has been a hotspot for several years before the decline in sales over the past 5 years. Our plan will also focus on positioning the Broadway Café to regain market share from competitors, and improving Electronic business procedures, employee ethics, and customer security. In conducting our thorough analysis, we at Gem Global have concluded that the Broadway Café is poised to spring ahead and has the opportunity to become a once more valuable enterprise. We envision the Broadway Café as becoming the market leader via technology implementation, business collaboration, and strategic planning. With regards to the competitive environment, the city of East Lansing has many competitors in the coffee market, including traditional coffee shops, such as Starbucks, Bigbys, Espresso Royal, as well as the residence hall cafeterias and Spartys. Other competitors include sandwich shops, such as Cosi and Panera, which, although not coffee shops, are in competion with the Broadway Café’s...

Words: 3349 - Pages: 14

Premium Essay

Biometrics

...the first biometric security systems appeared in the market, an increasing demand for novel techniques that will cover all different scenarios, has been observed. Every new method appears to outmatch some of its competitors but, at the same time, presents disadvantages compared to others. However, there is still no method that consists a single panacea to all different scenarios and demands for security. This is the reason for which researchers are on a continuous effort for more efficient and generic biometric modalities that can be used in various applications. In this chapter, emerging biometric modalities that appeared in the last years in order to improve the performance of biometric recognition systems, are presented. The presented methods are divided in two major categories, intrusive and non-intrusive ones, according to the level of user nuisance that each system sets off. 1 Introduction Biometric recognition is a well-known research area that aims to provide more efficient solutions to everyday growing human need for security. Biometrics refers to methods that can be used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral characteristics. In information technology, in particular, biometrics are used as a tool for efficient and reliable identity management and access control. Biometrics are also used in surveillance applications in order to identify individuals. The last decade, a large number of novel biometric modalities...

Words: 12845 - Pages: 52

Premium Essay

Essay

...The New Broadway Café Business Plan Designed by Gem Global Consulting Group Group 3, Section 3 Gabriel Kwakyi Zachary Katikos Corey McHenry Mira Bajrami Shivam Patel Having recently acquired the rights to the Broadway Café, we, Gem Global Consulting Group, have developed a new, successful business plan designed to revitalize the Broadway Café. Our strategy will take into account the several factors that make up the current business situation. These factors include the opportunity to implement Information Technology systems and supply chain improvements, the broad range of products offered by the Broadway Café, the competitive environment, and the fact that the café has been a hotspot for several years before the decline in sales over the past 5 years. Our plan will also focus on positioning the Broadway Café to regain market share from competitors, and improving Electronic business procedures, employee ethics, and customer security. In conducting our thorough analysis, we at Gem Global have concluded that the Broadway Café is poised to spring ahead and has the opportunity to become a once more valuable enterprise. We envision the Broadway Café as becoming the market leader via technology implementation, business collaboration, and strategic planning. With regards to the competitive environment, the city of East Lansing has many competitors in the coffee market, including traditional coffee shops, such as Starbucks, Bigbys, Espresso Royal, as well as the residence hall...

Words: 3393 - Pages: 14

Free Essay

Technology & Communication

...terminal system installed in their vehicles. This database can help law enforcement officers with workload management in the communication center and they can also help better time management of officers and help greater efficiency. Mobile data terminals can also help with communication between officers and dispatch by letting the officers have access to dispatch receipts, status updates, access to other unit statuses and they can also view any traffic stop updates. Overall, mobile data terminals have helped increase communication between officers and dispatch in the criminal justice system (Versaterm, 2011). Another type of specialized database that is used in the criminal justice system is known as iris scans. “Iris scans is a method of biometric...

Words: 1044 - Pages: 5

Free Essay

Biometrics

...Biometrics within Financial Institutions Abstract This paper presents a problem with the use of technology within the Credit Unions and Banking industries. Technological innovations have allowed the industry to be more open to consumers and challenges that the current economy has posed. Modern technology is also change the landscape of how, when and where business is conducted with financial institutions and consumers, businesses, and other organizations. Technology driven issues such as privacy, security and trust, have been pushed to the forefront, which makes the line between mobile banking and banking online increasing difficult to distinguish. Credit Unions like other banking institutions rely on gathering, processing, analyzing and providing information to meet the demands of the consumer. Given the importance of information systems within banking its not surprising to find, risks within the systems are developing in nature. History Truliant Federal Credit Union was started in Winston-Salem, North Carolina around 1952. They serve over 180,000 member owners and more than 900 business and organizations with $1.6 billion in assets. Truliant as it will be referred to in this paper has 21 financial locations in North Carolina, South Carolina, and Virginia. One philosophy that stands out or is a representation of what this particular Credit Union stands for is “ people helping people”. Like other not for profit organizations, they provide individuals and small business with...

Words: 1787 - Pages: 8

Free Essay

New Biometrics Process for Conditional Permanent Residents

...U.S. Department of Homeland Security February 28, 2007 UPDATE New Biometrics Process for Conditional Permanent Residents U.S. Citizenship and Immigration Services (USCIS) announces the implementation of a new nationwide biometrics process for conditional permanent residents who file Form I-751, Petition to Remove Conditions on Residence. The new process is effective immediately. Under the old process, following the approval of Form I-751, an approval notice was issued instructing the applicant to appear at a USCIS District Office for processing of his or her Form I-551, Permanent Resident Card (“Green Card”). The approved applicant would manually submit passport-style photographs, index fingerprints, and a signature on Form I-89, I-551 or I-586 Card Data Collection Form, for creation of his or her permanent resident card. The new process, as authorized in 71 Federal Register 15469 (March 28, 2006), requires all conditional permanent residents to appear at a USCIS Application Support Center (ASC) after filing Form I-751 in order to have their biometrics electronically captured. An ASC appointment notice will automatically be sent by mail to the applicant with the specific date, time and location for biometric processing. Biometric processing includes the electronic capture of an applicant’s photograph, signature, index fingerprint and ten-print fingerprints. The photograph, signature and index fingerprint are used to generate the lawful permanent resident card, if the Form...

Words: 769 - Pages: 4

Free Essay

Criminal Identification Procedures in the 21st Century

...officials in identifying a criminal suspect. The technological advances that continue to assist the criminal justice system in these identifications are Deoxyribonucleic Acid (DNA) analysis, biometric identification, Intra-agency databases for DNA, fingerprinting and palm printing, and camera and wiretap surveillance. Each aspect serves a specific purpose in making certain that the right person is properly identified for the crimes that they commit. Each technological aspect makes certain that the criminal justice system can prove without a doubt that the person under arrest is the person responsible for committing the crime. Criminal Identification Procedures Deoxyribonucleic Acid (DNA) analysis is an examination method that allows any organism to be identified, by its genetic sequences. DNA analysis is highly accurate, important, and used all across the world for important reasons. The main purpose for DNA analysis is identifying individuals who are suspects in criminal cases, identifying victims or their remains when other means of identity is not possible. The advantages of DNA analysis are reliable, accurate results, and helps solving old and new cases. The disadvantage of DNA analysis is it reveals information on physical state, this information is sensitive and must be guarded. Biometric Identification is a system based around the main physical characteristics of the human body such as finger print identification, hand geometry, palm vein authentication, retina scan, iris...

Words: 1407 - Pages: 6

Premium Essay

Nt2580 Unit 3 Assignment & Lab

...NT2580 Unit 3 Assignment & Lab Unit 3. Assignment 1 - Remote Access Control Policy Definition There are three key parts I will have to take into account while designing a Remote Access Control Policy for Richman Investments. These three parts (Identification, Authentication and Authorization) will not be all for the Remote Access Control Policy, I will need to include the appropriate access controls for systems, applications and data access. I will also need to include my justification for using the selected access controls for systems, applications and data access. The first part I need to implement for this Remote Access Control Policy is Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentication. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be...

Words: 477 - Pages: 2

Premium Essay

Dbms Function

...1. While users were updating the Premiere Products database, one of the transactions was interrupted. You need to explain to management what steps the DBMS will take to correct the database. Using the sample log in Figure 7-1 1, list and describe the updates that the DBMS will roll back if transaction 2 is interrupted at 8:10. In transaction 2, the DBMS started it at 8:01, added an Orders table record at 8:02, and added an Order Line table record at8:05 and added an Order Line table record at 8:09. To roll back the transaction, the DBMS deletes the three added records. 2. Occasionally, users at Premiere Products obtain incorrect results when they run queries that include built-in (aggregate, summary, or statistical) functions. The DBA told management that unrepeatable reads caused the problems. Use books, articles, and/or the Internet to research the unrepeatable read problem. Write a short report that explains the unrepeatable-read problem to management and use an example with y our explanation. (Unrepeatable reads are also called inconsistent retrievals, dirty reads, and inconsistent reads.) Unrepeatable-Read Problems occur many times when a different result is seen from the same query while still in progress. This usually happens when dealing with the UPDATE command by other transactions. An unrepeatable read (also called an inconsistent retrieval, dirty read, or inconsistent read) occurs when a user’s retrieval transaction reads a set of data that other users’ transactions...

Words: 965 - Pages: 4

Premium Essay

Student Attendance System Using Fingerprint

...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks also...

Words: 3961 - Pages: 16

Free Essay

Biometric Uid Authentication Using Visual Cryptography

...[1] A.K. Jain and A. Ross, “Biometrics: a tool for information security”, IEEE Transaction on Information Forensics and Security, vol. 1, no. 2, Jun. 2006. [2] C. Blundo, A. De Santis, and D.R. Stinson. On the contrast in visual cryptography schemes. J. Cryptogr., 12:261-289, 1999. [3] J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu. Visual secret sharing for multiple secrets. Pattern Recognition, 41:3572-3581, 2008. [4] A. Ross and A. A. Othman, “Visual Cryptography for Biometric privacy”, IEEE Transaction on Information Forensics and Security, vol. 6, no. 1, Mar.2011. [5] M. Naor and B A. Shamir. Visual cryptography. in: A. De San tis (Ed.), Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, 950: 1-12, 1995. [6] C.C. Wu and L.H. Chen. A study on visual cryptography, Master Thesis. PhD thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998. [7] M. Naor and A. Shamir “Visual cryptography:Improving the contrast via the cover base” IACR Eprint archive, 1996. [8] C. Blundo and A. De Santis and D.R. Stinson, “On the contrast in visual cryptography schemes”, Jurnal pf cryptography, vol. 12, pp. 261-289, 1996. [9] G. Ateniese and C. Blundo and A. De Santis and D.R. Stinson,“Extended Schemes for Visual Cryptography”, Theoretical Computer Science, 1996. [10] Z. Zhouand and G. R. Arce and G. Di Crescenzo, “Halftone visual cryptography” IEEE Trans. Image Process, vol. 15, no. 8, pp. 2441-2453...

Words: 715 - Pages: 3

Free Essay

Case Study

...the access to the dormitory. The project will start with dormitory as a pilot project. The project will entail getting the survey of the dormitory and assessing the areas where the card reader will be installed. There will also be the need to integrate the system with the camera system which is already in place. The project will also include having a records system which will include the details of all the people who are authorized to access the dormitory (Liu, & Silverman, 2001). This will mean that there is a server which contains all the details of the students and staff members who are able to gain access to the building. The system will then be connected to the camera system so that there will be the possibility to have a biometric system. The biometric system will make use of the face of the person so that they will be able to get the required information (Kerzner, 2013). The cards will have to be integrated with the information that will be required to give access to the card-owner. Tasks 1. Undertake feasibility study of the dormitory. This is where the dormitory is assessing to check where the system will be installed and how the camera system will be connected to the access control system. 1.1 Assess the physical access and how it has been designed. This is where the access to the dormitories is checked so that it will be clear where the doors and windows have been placed. This will help to design a new access system 1.2 Assess the possibilities of interconnecting...

Words: 930 - Pages: 4