Upload
gay-keller
View
31
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Biomedical You. Rebekah Tresslar And Kylie Weickum. Main Goals and Objectives. Increase overall security Reduce plastic and paper waste Allow limited access over the phone, inside the bank, and at ATMs Insure trust in new clientele - PowerPoint PPT Presentation
Citation preview
Biomedical YouRebekah Tresslar
AndKylie Weickum
Main Goals and Objectives
Increase overall security Reduce plastic and paper waste Allow limited access over the phone,
inside the bank, and at ATMs Insure trust in new clientele Modernize banks in the U.S. through
technological advancements Be cost-effective
ProposalWe propose that iris scanners are installed in ATMs to provide access to only members of the bank. When entering the building members must scan their eyes and provide a 10 digit code; members must scan themselves in and out of the building. Facial recognition will be used inside the bank 24 hours a day to increase security. When transactions are made over the phone, voice recognition services will be used.
Iris Recognition Scanning
Contact and glasses friendly Considered the most effective form of
biometric identification Only 4% in trials weren’t correctly
identified
“…iris recognition uses camera technology with subtle infrared illumination to acquire images of the detail-rich, intricate structures of the iris. Digital templates encoded from these patterns by mathematical and statistical algorithms allow unambiguous positive identification of an individual. Databases of enrolled templates are searched by matcher engines at speeds measured in the millions of templates per second per (single-core) CPU, and with infinitesimally small False Match rates.” 1
•Decreasing costs•Increasing accuracy
Why is it a good idea?A person’s unique iris patterns are complete by the time they are about 8 months old, and do not change later in life. There is no way to surgically alter the iris without damage to a person’s vision. No two irises are alike, not even in identical twins or in the right or left eye in the same person. When using a certain coordinate system iris images can be represented that are not affected by factors such as distance of eye from camera, pupil size, camera angles, and location of the iris in the image.
Iris and computed iris code
How easy is it to beat?
Colored contacts or pupil-enlarging drugs can reduce the effectiveness of the scan
Some scanners have been beat by holding up a very high resolution photo of an eye to the camera
Watery eyes or debris on the surface of the eye can cause problems with the scanner
Success Stories Iris Scanning
“Members of the Privium programme have been using iris recognition for border passage for the past ten years. This application is also used for the staff of companies located at Schiphol who require access to areas which are protected or are not open to the public. The countless numbers of people who work at the airport carry a Schiphol pass containing a unique photograph of their iris. The pass, combined with an iris scan, provides access to protected areas and makes it impossible for anyone to gain access to a protected area by using someone else’s pass.”
http://www.schiphol.nl/B2B/SecurityInProgress/SuccessStory.htm
Facial RecognitionDoesn’t work well when/in;•Poor lighting•Profile (side) views•The user is wearing sunglasses•Objects covering individuals faces•Low resolution images•Varying facial expressions•When the user is wearing hats or hoods
This will serve as extra security to monitor the behavior of members of the bank and will keep
track of suspicious behavior.
Members must;•Remove sunglasses when entering the building•Allow their id picture to be entered into the bank database•Remove hoods and hats when entering the building
How It Works A traditional facial recognition system will identify
peoples faces by examining facial features such as;Size, position, and shape of: eyes, nose, mouth and
cheekbonesThis information is taken and compared to a gallery of images. Algorithms can use two approaches when analyzing the facial features.
One approach is geometry that looks directly at the distinguishing facial features.
The other approach is photometric that captures a distil photo then translates it into values that are compared to values of other templates
Success Stories Facial Recognition “The man said his name was Erik Lopez
and his birthday was Nov. 22, 1971, but Deputy Mark Eastty wasn't so sure. The man, a passenger in a car Eastty pulled over in February for expired tags, said he didn't have a driver's license. So the Pinellas deputy took the man's picture. He put the digital image into his laptop and ran it through software that sifted through 7.5 million jail mug shots. Within seconds, he had a hit. The man, it turned out, was Elisur Velazquez-Lopez of Clearwater. He was born in 1973. And he had an active warrant for failing to appear in court for a charge of solicitation of prostitution. Eastty took the man to jail. "If we had played the name game I could've been there 30 minutes," Eastty said. "If I take their picture, it'll take two.””
http://www.tampabay.com/news/publicsafety/crime/article1019492.ece
Why not these? Fingerprint scanners?
› Pros; No fingerprints exactly alike Scanners are cheap (some at only $50.00 US)
› Cons; Scanners need constant cleaning Easy to beat if you know how Debris or scars on the hands can cause inaccuracy or no match
DNA?› Pros;
DNA has a 1 in 1 billion chance of being like someone else’s Cannot change or remove DNA
› Cons; Can take days, even weeks to process Invasive process (requires blood, saliva, hair, semen, or other bodily
fluid/tissue)
Voice RecognitionWhen calling the bank, a spoken PIN and password must be provided and compared to data on record in order for the member to access their account.
It works by;A microphone records the users voice and a number of features are extracted to form a template or model of the users voice, basically the voice is translated into a format the computer can understand. It is then saved and new data is compared to what was saved on file.
•Always use same password and PIN number•PIN number must also be entered into the phone’s dial pad
Voice Recognition continued…
Computer reads and assigns numbers to;› Amplitude› Frequency› Tone› Rhythm
And creates a “voice print” that is saved on file. The words spoken over the phone are then compared to the saved voice prints in the system until it is identified.
Pros and Cons
Pros;•Cost effective (some as low as $40.00 US)•Software can “learn” to recognize voices better over time
Cons;•Easily affected by the physical condition of the user (i.e. colds)•Affected by background noise•Can be easily beaten
Although the software is easily beaten, by having the user provide their password and PIN
number fewer people will be able to access accounts that aren’t theirs when the password
and PIN are compared as voices.
Helpful Sites http://www.cylab.cmu.edu/partners/success-stories/iris-recognition.html http://www.c4isrjournal.com/story.php?F=4736046 http://www.pcworld.com/article/120889/biometrics_from_reel_to_real.html http://www.cse.msu.edu/biometrics/fingerprint.html http://
www.sans.org/reading_room/whitepapers/authentication/dont-blink-iris-recognition-biometric-identification_1341
http://www.theregister.co.uk/2004/05/07/watery_eyes_iris_scan/ http://en.wikipedia.org/wiki/Speaker_recognition http://www.pcmag.com/category2/0,2806,4830,00.asp http://www.biometricsinfo.org/prosandconsofbiometrics/index.html