presentation1
DESCRIPTION
TRANSCRIPT
authentication
Process where user verify that they are who they say they are.
The user who attempts to perform function in a system is in fact the user who is authorized to do so.
Method of
BIOMETRIC
Device that translate personal characteristic into a digital code stored in the database
The example:
FINGERPRINT RECOGNITION FACIAL RECOGNITION HAND GEOMETRY SCANNING IRIS SCANNING RETINAL SCANNING VOICE RECOGNITION SIGNATURE VERIRIFICATION SYSTEM
FINGERPRINT RECOGNITION *To prevent fake finger from being used
*Measure blood flow or check correctly arrayed ridges
FACIAL RECOGNITION *Analyses the characteristic of an individual’s face images
*Capture through a digital video camera
*Touted as a fantastic system for recognizing potential threats
HAND GEOMETRY SCANNING *Measure and analysis of the shape of one’s hand
*Individual features are not descriptive for identification
*Possible to devise a method by combining various individual features and measurement of finger and hands
IRIS SCANNING * Analyses the feature that exist in the coloured tissue surrounding the pupil
* The scan use a regular video camera and can be done from further away than a retinal scan
* Will work perfectly and get the accurate measurement that can be use in identification purpose
* Excellent but expensive
RETINAL SCANNING * Scanning the retina and analysing the layer of blood vessel at the back of the
eye
* using a low-intensity light source and a optical coupler
* Requires user to remove glasses, place their eye to the device and focus on a certain point
* the accuracy is very good and the cost is fair
VOICE RECOGNITION
* Compares a person’s live speech with their stored voice pattern.
* Requires user to speak into a microphone and the word or anything that he speaks can be his password or an access phrase.
* Most voice recognition devices require the high and low frequencies of the sound to match, which is difficult for many recording instrument to recreate well.
* Fair and the cost reasonable.
SIGNATURE VERIFICATION SYSTEM
* Recognizes the shape of user handwritten signature as measuring the pressure exerted and the motion use to write the signature.
* Special pen and tablet are used.
* The authenticity is determined by, comparing an input signature to a stored reference set (template) consisting of three signature.
* The similarity between input signature and reference set is computed using string matching and compared to a threshold.
* Fair and the price is excellent.
Picture 2: Visualization of iris scan and extracted "IrisCode" Picture (C) IriScan, Inc.
Picture 4: Hand with biometric measurements visualized Image (C) Michigan State University
Picture 3: Digitized fingerprint image with the minutiae points extracted. Image (C) 1998 Idex AS
From this assignment I can conclude that authentication is one of the security measure. One of the method of authentication is Biometric Devices. The Biometric method is the method that are commonly use. There are seven example of Biometric. From this assignment, I also find out that the Fingerprint Recognition is the best method because the fingerprint is very unique, different person will have the different fingerprint. It also the best method because the accuracy in this method is good and the cost involved is cheaper than the other method.
BOOK
COMPUTING ESSENTIAL 2000 - 2001,TIMOTHY J. O’LEARY,LINDA I.
O’LEARY,2000. NOTE
INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY,SMK PEKAN,2006.
INTERNET http://www.iriscan.com/basic.htm
http://biometrics.cse.msu.edu/fingerprint.htnl
network security 1998:biometric identification-Microsoft internet explore