alaa elbeheri research_presentation (f)

25
Emerging Technology Biometrics & Computers I/P & O/P

Upload: alaa-el-beheri

Post on 12-Feb-2017

260 views

Category:

Technology


1 download

TRANSCRIPT

Emerging Technology

Emerging TechnologyBiometrics & Computers I/P & O/P

The Emerging Technology for computers inputs, Outputs and User Verifications (Biometrics)

Author: Alaa ElBeheri, www.alaaelbeheri.weebly.comAlgonquin College OttawaOCT-Information Technology and The Business Student

Computer Inputs and Outputs Input: Getting Data from the User to the ComputerKeyboardMouse Trackball

Source Data Automation: Collecting Data Where It StartsMagnetic-Ink Character RecognitionScannerOptical Character Recognition Bar CodesHandwritten CharactersImaging

Data Collection Devices Voice InputTouch Screens

Latest DATA collection Devices

Output:Types of ScreensCRT TerminalsPrintersVoice OutputMusic Output

Latest on Computer Inputs

Computer GraphicsBusiness GraphicsVideo Graphics

Biometrics and Verification

Biometrics is automated methods of recognizing a person based on a physiological or behavioural characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric data are separate and distinct from personal information.

Latest on Computer Graphics

Biometrics and IT security

Authenticationis a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems.Identification Theautomaticidentificationoflivingindividualsbyusingthe physiologicalandbehaviouralcharacteristics;"negativeidentificationcanonlybeaccomplished throughbiometricidentification and Verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.

Physical Biometrics:

Finger Print Recognition techniques

A fingerprint I system needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images.

This is the identification of the individual by the unique pattern in the face.Facial recognition (or face recognition) is a type ofbiometricsoftware application that can identify a specific individual in a digital image by analyzing and comparing patterns

Facial Recognition Facial

Latest on Biometrics

Iris Recognition

This is the identification of the individual by the unique pattern in the iris.It is an automated recognition technique as a biometrically based technology for personal identification and verification.

Retina Recognition

This is an automated method ofbiometricidentification that uses mathematical pattern-recognition techniques on video images of one or both of theirisesof an individual'seyes, whose complex random patterns are unique, stable, and can be seen from some distance.

Behavioral Biometrics: This is the identification of a person from characteristics ofvoices voice recognition there is a difference betweenspeaker recognition(recognizingwhois speaking) andspeech recognition (recognizingwhatis being said).

Signature/handwriting

Signature recognition authentication, or dynamic signature analysis, authenticates identity by measuring and analyzing handwritten signatures

Keystroke/patterning

Keystroke dynamics monitors keyboard inputs at thousands of times per second to identify a user by his or her habitual typing rhythm patterns.

Biometrics and Security

With biometrics, you know that the individual accessing secure areas or information is not just an individual holding the proper credential, but is in fact the person who has been granted access, and this improves security and provides an audit trail.

Biometrics and Security

Conclusion

There are many emerging technologies in computer inputs and outputs that make the Biometrics technology evolving so rapid in the market and its application and utilization is endless! Biometrics offers unparalleled ability to quickly and accurately capture real-

Continue: Time, labour data and provide a non-repudiated audit trail. Biometrics has undergone intense scrutiny and the results are in when Properly deployed, biometrics work well and are safe, secure, and accurate.

References

"Biometrics: Overview Biometrics.cse.msu.edu. 6 September 2007. Retrieved2012-06-10. Jain, A.; Hong, L. and Pankanti, S. (2000)."Biometric Identification".Communications of the ACM, 43(2), p. 9198. DOI 10.1145/328236.328110 Jain, Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain, AK; Flynn; Ross, A.Handbook of Biometrics Springer .ISBN 978-0-387-71040- Sahidullah, Md (2015). "Enhancement of Speaker Recognition Performance Using Block Level, Relative and Temporal Information of Subband Energies". PhD Thesis (Indian Institute of Technology Kharagpur