Innovative Biometric Sensing Technology

biometric sensing and associated devices chris n.w
1 / 15
Embed
Share

Explore the world of biometric sensors and devices, from fingerprint scanning to iris recognition. Learn about the advantages of biometric scanning, how fingerprint sensors work, and the technology behind CMOS scanners. Discover the security benefits and diverse applications of biometric technology in today's world.

  • Biometric sensing
  • Fingerprint scanner
  • Iris recognition
  • Security technology
  • CMOS scanner

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Biometric Sensing and Associated Devices Chris Lange 4/18/16 { Abstract: Biometric sensors are used for many things today, from unlocking your phone to storing your data at a blood bank. Biometrics are unique from person to person, making it a good tool to use for identification.

  2. Table of Contents What is it? Advantages Types of scanners Fingerprint Retina Iris Security issues Uses

  3. What is it? Automated methods of recognizing a person based on unique physical characteristic Fingerprints Hand Geometry Handwriting Iris Retinal Voice Very difficult to reverse engineer or steal

  4. Advantages of Biometric Scanning More secure than password or PIN No need to remember password or PIN No need for a token or key card to gain access Adding a new person is easy

  5. Fingerprint Sensing Everyone has a unique fingerprint Even among identical twins 140 years of research, and no two have ever been found to be alike Easy to build and install, which makes them cheap http://www.askdavetaylor.com/wp-content/uploads/2015/06/hp-elitebook-folio-1020- fingerprint-scanner-800x417.jpg http://www.bayometric.com/media/catalog/product/ cache/1/image/9df78eab33525d08d6e5fb8d27136e95/l /u/lumidigm_v-series-sensor-v30x-usb-fingerprint- scanner.jpg

  6. How does a fingerprint scanner work? Image comparison Capture image of fingerprint and compare ridges and crests to a pre- scanned image Create binary map of ridges and crests Use CMOS to measure capacitances Ridges and crests differ in height so capacitance is different Compare to saved image of fingerprint http://www-micro.deis.unibo.it/~tartagni/Finger/cell_lr.gif

  7. CMOS Scanner Uses array of capacitive sensors along with a microprocessor Ridges and crests create electrical signals based on capacitance Signals are processed and interpreted to create a digital image of the fingerprint http://www.ntt.co.jp/RD/OFIS/active/2005pdfe/hot/img/ct03.gif Much harder to fool than image fingerprint sensor Person must be present for signals to be generated properly http://g01.a.alicdn.com/kf/HTB10JzlHVXXXXa8XXXXq6xXFXXXt/-font- b-Fingerprint-b-font-font-b-module-b-font-font-b-fingerprint-b-font.jpg

  8. Retina Sensing Retina is made up of a network of blood vessels in the back of the eye Everyone has a unique and different retina Typically remains unchanged during a person s life Diabetes, glaucoma, and retinal degenerative disorders can change it http://www.aao.org/image.axd?id=0f878257-588b-43d1-a7a7- 7c17e9610093&t=635859497175800000

  9. Retina Sensing Scanner casts infrared light into the eye Traces path of blood vessels Reflection is encoded and stored as a binary map Image is compared with pre-scanned image Takes about 15 seconds of careful concentration Used in medical world frequently AIDS, syphilis, malaria, chicken pox, leukemia, lymphoma, and sickle cell can be seen in the eyes Congestive heart failure, atherosclerosis, and cholesterol issues first appear in the eyes More secure than fingerprint

  10. Iris Sensing Thin, circular structure in the eye Acts as the aperture, controlling how much light is let in through the pupil Colored part of the eye Every iris is unique from person to person https://s-media-cache- ak0.pinimg.com/236x/57/ef/8d/57ef8d0749a1992b 9db0c6b4b1be8898.jpg More secure than both fingerprint and retina scanning Deteriorates very quickly once removed from the body Much faster and more accurate than retina scanning Iris doesn t change during a person s life https://lh5.googleusercontent.com/o7cR_JiweR37zqgYcBoP2dnwV yWjGa2lONKfaFXaEXOGocy9iQn_hL2z42kjqnx- bCMnbxncS_s0h5nJIDPIb1IB859ji1YIwTYJATghv57M3Syex4lfVN 8Xp2J1YbHe9U6g

  11. Security Issues Can be considered invasive to privacy Facial recognition on security cameras Person is basically under surveillance all the time Stolen data from data centers Credit card can be replaced Good luck replacing or changing your iris Thieves cutting off a finger to gain access or steal a car Rapid-fire camera developed by Carnegie Mellon University Funded by Department of Defense Facial recognition on an entire crowd Law is not yet able to handle most of these issues No court has said whether or not law enforcement can collect this data without the knowledge of the person Extremely useful and helpful but poses a large security risk

  12. Uses Cell phones Laptops Access Airports Cars Blood Bank Schools https://i.ytimg.com/vi/1TMGl- 09Ozk/maxresdefault.jpg http://i.dailymail.co.uk/i/pix/2012/02/17/article-0- 11C5E3C4000005DC-346_468x286.jpg http://blog.m2sys.com/wp- content/uploads/2015/08/Woodoo_WD800_women.j pg http://www.v3.co.uk/IMG/367/297367/vein-scanner.jpg

  13. Summary Very useful in technology today Fingerprint is the most widely used Most research has been done Uses capacitance in the ridges and crests to generate signals Biometrics are used in a wide variety of applications Still more work to be done in the law to standardize

  14. References http://www.bioelectronix.com/what_is_biometrics.html http://www.ievoreader.com/biometrics-explained http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=16 http://blog.m2sys.com/biometric-hardware/iris-recognition-vs-retina- scanning-what-are-the-differences/ http://www.scientificamerican.com/article/biometric-security-poses-huge- privacy-risks/ https://www.fbi.gov/about-us/cjis/fingerprints_biometrics/biometric-center- of-excellence/files/face-recognition.pdf http://nextbiometrics.com/products/the_next_advantage/ http://www.globalspec.com/learnmore/semiconductors/sensor_ic/biometric_ sensors http://www.securityworldmag.com/tech/tech_view.asp?idx=1156&part_code =030170070&page=1 http://blog.m2sys.com/guest-blog-posts/5-ways-biometric-technology-is- used-in-everyday-life/ http://whatis.techtarget.com/definition/capacitive-scanner

  15. Five Key Points Biometric sensing is an automated method of recognizing a person based on unique physical characteristic Much more secure than a password or pin Fingerprint scanning uses capacitance from the ridges and crests on your finger to generate signals which are stored Very difficult to reverse engineer or steal 140 years of research has been done in the area of fingerprints and no two have ever been found to be alike even among identical twins

Related


More Related Content