Student Seminar Report & Project Report With Presentation (PPT,PDF,DOC,ZIP)

Full Version: Computer Aided Identification
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
[attachment=9859]
Introduction
Why do you need New Computer Security?

 Computers are integral part of society
 E-Mail
 E-Commerce
 Online Banking / Bill Pay
Your Personal Information is at Risk!
Biometric Authentication
Iris Scan

 Camera Scans Eye
 Both irises are scanned
 Recognizes small details of each eye
 Compares to Saved Images
 Matches up details of each iris
 Recognizes as a Success or Failure
Why Iris Technology
 Easy to deal with everyone
 Very few people have one or less eyes
 Irises are the same from one year old and remain constant
 Not considered Intrusive
 No contact with the skin is made
 Can be operated without people to access the program
 Can be combined with motion sensors
Uses of Iris Technology
 Today…
 Used in transportation, hospitals, and government
 Used in “Big Business” as a means of security
 Future…
 To be used with wireless technology to prevent fraud during any economical transactions
 To be used as a key
Iris Technology
 Pros
 More accurate than fingerprinting
 Stable over many years
 Very difficult to fake
 Cons
 Requires full cooperation of the subject
 Once someone makes a fake your security is compromised
Capacitance Scan
 Uses semiconductors to check for the ridges and valleys in fingerprints
 The capacitance is varied by the distance the finger is away from the semiconductor plates
 Finger ridges will result in different voltages than finger valleys
 The processor puts together a picture from the readout
 Requires real fingerprint type to match voltage
Conclusion
 Different Computer Aided Identifications
 Iris Scan
 Face Scan
 Finger Print Scan
 Issues and Concerns
 Criminal Acts
 Identity Theft
 Uses
 Present and Future