170 likes | 284 Vues
Biomedical You. Rebekah Tresslar And Kylie Weickum. Main Goals and Objectives. Increase overall security Reduce plastic and paper waste Allow limited access over the phone, inside the bank, and at ATMs Insure trust in new clientele
E N D
Biomedical You RebekahTresslar And Kylie Weickum
Main Goals and Objectives • Increase overall security • Reduce plastic and paper waste • Allow limited access over the phone, inside the bank, and at ATMs • Insure trust in new clientele • Modernize banks in the U.S. through technological advancements • Be cost-effective
Proposal We propose that iris scanners are installed in ATMs to provide access to only members of the bank. When entering the building members must scan their eyes and provide a 10 digit code; members must scan themselves in and out of the building. Facial recognition will be used inside the bank 24 hours a day to increase security. When transactions are made over the phone, voice recognition services will be used.
Iris Recognition Scanning “…iris recognition uses camera technology with subtle infrared illumination to acquire images of the detail-rich, intricate structures of the iris. Digital templates encoded from these patterns by mathematical and statistical algorithms allow unambiguous positive identification of an individual. Databases of enrolled templates are searched by matcher engines at speeds measured in the millions of templates per second per (single-core) CPU, and with infinitesimally small False Match rates.” 1 • Contact and glasses friendly • Considered the most effective form of biometric identification • Only 4% in trials weren’t correctly identified • Decreasing costs • Increasing accuracy
Why is it a good idea? A person’s unique iris patterns are complete by the time they are about 8 months old, and do not change later in life. There is no way to surgically alter the iris without damage to a person’s vision. No two irises are alike, not even in identical twins or in the right or left eye in the same person. When using a certain coordinate system iris images can be represented that are not affected by factors such as distance of eye from camera, pupil size, camera angles, and location of the iris in the image. Iris and computed iris code
How easy is it to beat? • Colored contacts or pupil-enlarging drugs can reduce the effectiveness of the scan • Some scanners have been beat by holding up a very high resolution photo of an eye to the camera • Watery eyes or debris on the surface of the eye can cause problems with the scanner
Success Stories Iris Scanning • “Members of the Priviumprogramme have been using iris recognition for border passage for the past ten years. This application is also used for the staff of companies located at Schiphol who require access to areas which are protected or are not open to the public. The countless numbers of people who work at the airport carry a Schiphol pass containing a unique photograph of their iris. The pass, combined with an iris scan, provides access to protected areas and makes it impossible for anyone to gain access to a protected area by using someone else’s pass.” http://www.schiphol.nl/B2B/SecurityInProgress/SuccessStory.htm
Facial Recognition • Doesn’t work well when/in; • Poor lighting • Profile (side) views • The user is wearing sunglasses • Objects covering individuals faces • Low resolution images • Varying facial expressions • When the user is wearing hats or hoods This will serve as extra security to monitor the behavior of members of the bank and will keep track of suspicious behavior. • Members must; • Remove sunglasses when entering the building • Allow their id picture to be entered into the bank database • Remove hoods and hats when entering the building
How It Works • A traditional facial recognition system will identify peoples faces by examining facial features such as; Size, position, and shape of: eyes, nose, mouth and cheekbonesThis information is taken and compared to a gallery of images. Algorithms can use two approaches when analyzing the facial features. • One approach is geometry that looks directly at the distinguishing facial features. • The other approach is photometric that captures a distil photo then translates it into values that are compared to values of other templates
Success Stories Facial Recognition • “The man said his name was Erik Lopez and his birthday was Nov. 22, 1971, but Deputy Mark Eastty wasn't so sure. The man, a passenger in a car Eastty pulled over in February for expired tags, said he didn't have a driver's license. So the Pinellas deputy took the man's picture. He put the digital image into his laptop and ran it through software that sifted through 7.5 million jail mug shots. Within seconds, he had a hit. The man, it turned out, was Elisur Velazquez-Lopez of Clearwater. He was born in 1973. And he had an active warrant for failing to appear in court for a charge of solicitation of prostitution. Eastty took the man to jail. "If we had played the name game I could've been there 30 minutes," Eastty said. "If I take their picture, it'll take two.”” http://www.tampabay.com/news/publicsafety/crime/article1019492.ece
Why not these? • Fingerprint scanners? • Pros; • No fingerprints exactly alike • Scanners are cheap (some at only $50.00 US) • Cons; • Scanners need constant cleaning • Easy to beat if you know how • Debris or scars on the hands can cause inaccuracy or no match • DNA? • Pros; • DNA has a 1 in 1 billion chance of being like someone else’s • Cannot change or remove DNA • Cons; • Can take days, even weeks to process • Invasive process (requires blood, saliva, hair, semen, or other bodily fluid/tissue)
Voice Recognition When calling the bank, a spoken PIN and password must be provided and compared to data on record in order for the member to access their account. It works by; A microphone records the users voice and a number of features are extracted to form a template or model of the users voice, basically the voice is translated into a format the computer can understand. It is then saved and new data is compared to what was saved on file. • Always use same password and PIN number • PIN number must also be entered into the phone’s dial pad
Voice Recognition continued… • Computer reads and assigns numbers to; • Amplitude • Frequency • Tone • Rhythm And creates a “voice print” that is saved on file. The words spoken over the phone are then compared to the saved voice prints in the system until it is identified.
Pros and Cons • Cons; • Easily affected by the physical condition of the user (i.e. colds) • Affected by background noise • Can be easily beaten • Pros; • Cost effective (some as low as $40.00 US) • Software can “learn” to recognize voices better over time Although the software is easily beaten, by having the user provide their password and PIN number fewer people will be able to access accounts that aren’t theirs when the password and PIN are compared as voices.
Helpful Sites • http://www.cylab.cmu.edu/partners/success-stories/iris-recognition.html • http://www.c4isrjournal.com/story.php?F=4736046 • http://www.pcworld.com/article/120889/biometrics_from_reel_to_real.html • http://www.cse.msu.edu/biometrics/fingerprint.html • http://www.sans.org/reading_room/whitepapers/authentication/dont-blink-iris-recognition-biometric-identification_1341 • http://www.theregister.co.uk/2004/05/07/watery_eyes_iris_scan/ • http://en.wikipedia.org/wiki/Speaker_recognition • http://www.pcmag.com/category2/0,2806,4830,00.asp • http://www.biometricsinfo.org/prosandconsofbiometrics/index.html