UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

Similar documents
Biometric Recognition: How Do I Know Who You Are?

Introduction to Biometrics 1

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometrics - A Tool in Fraud Prevention

The Role of Biometrics in Virtual Communities. and Digital Governments

User Awareness of Biometrics

AIMICT.ORG AIMICT Newsletter

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Title Goes Here Algorithms for Biometric Authentication

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

Authenticated Document Management System

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies

New Age Vital Statistics Services: What They Do and Don t Do

Creating a Public Safety Ecosystem

SVC2004: First International Signature Verification Competition

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh

Facial Recognition application in computer system

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

Biometrics redefining the phrase 'don't shoot until you see the whites of their eyes'

BIOMETRICS BY- VARTIKA PAUL 4IT55

Topic: Birth registration as an opportunity to integrate civil registration and identity management systems

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

Facial Image Recognition Model (The Latest trend)

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Fingerprinting. Forensic Science

Human Identifier Tag

The Impact of Facial Recognition Technology on Society

100% Online Combined Honours BA in Criminology and Policing Degree

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

Laser Surface Authentication TM : biometrics for documents and goods

Non-Contact Vein Recognition Biometrics

Security System Using Biometric Technology: Design and Implementation of Voice Recognition System (VRS)

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES

Forensic Sketch Recognition: Matching Forensic Sketches to Mugshot Images

Towards Solving the Identity Challenge Faced by Digital Forensics

Free Online Training

Technologies that will make a difference for Canadian Law Enforcement

1/8/2013. Free Online Training. Using DNA and CODIS to Resolve Missing and Unidentified Person Cases. Click Online Training

Feature Extraction Techniques for Dorsal Hand Vein Pattern

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016

Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design

University of East London Institutional Repository:

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS

Your information - but is it really yours?

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

A Proposal for Security Oversight at Automated Teller Machine System

About user acceptance in hand, face and signature biometric systems

Fingerprint Analysis. Bud & Patti Bertino

INVESTOR PRESENTATION SECURITY BIOMETRIC TECHNOLOGY NOVEMBER 2014

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Shannon Information theory, coding and biometrics. Han Vinck June 2013

ICTen - Invest in Unique ID Schemes and Link CRVS and UHC - a Focus on Concrete Steps and Capacity Building October 29-30, 2015

Historical Development. Historical Development. Chapter 6 Fingerprints By the end of this chapter you will be able to: Ch 6 Fingerprinting Notes

Presentation Outline

Biometric Recognition Techniques

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263

REMOTE SENSING AND PRIVACY ISSUES. Lynn Brien Geography 4810G 11/29/07

Introduction to

BIOMETRIC IDENTIFICATION

WINSTON-SALEM POLICE DEPARTMENT. Remote Lineup Application

Biometrics Acceptance - Perceptions of Use of Biometrics

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

1. First printing, TR , March, 2000.

Biometrical verification based on infrared heat vein patterns

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

ISSN Vol.02,Issue.17, November-2013, Pages:

DOI: /IJCSC Page 210

Sketching Expert System for Crime Investigation Purposes

3 I, Kent Gibson, state the following, of which I have personal knowledge:

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM

Intelligent Identification System Research

Privacy engineering, privacy by design, and privacy governance

Promising technologies to meet tomorrow s security challenges

Chen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室.

Sioux Falls Police Department Partnering with the community to serve, protect, and promote quality of life!

Objectives. You will understand: Fingerprints Fingerprints

presented by March 31, London c. maxine most acuity market intelligence

Autonomous Face Recognition

Security of ATM Using Digital Image Processing

Automatic Locking Door Using Face Recognition

ELG 5121/CSI 7631 Fall Projects Overview. Projects List

PALM VEIN TECHNOLOGY

A MODIFIED ALGORITHM FOR ATTENDANCE MANAGEMENT SYSTEM USING FACE RECOGNITION

The 123 of Biometric Technology

Research and Innovation. Roadmap

Little Fingers. Big Challenges.

Personal Data Protection Competency Framework for School Students. Intended to help Educators

RED TACTON ABSTRACT:

My fingers are all mine: Five reasons why using biometrics may not be a good idea

Transcription:

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information Technology class, COP 4910 during the Spring-2015 semester. In addition, it is worth mentioning that this semester the students attended 76 talksandeach studentgave4presentations.ineachtalktheyhad to present the technical aspects of the selected topic along with its social impact, ethical aspects, and professional impact. 1 P a g e

Biometric Security John Sensback Frontiers in Information Technology University of Central Florida Orlando, United States Brian Salvo Frontiers in Information Technology University of Central Florida Orlando, United States Abstract Biometric systems and the technology is an ever increasing market of our everyday lives. It is used for security to prevent fraud and it aids in the apprehension of criminals, as well as many other applications. The earliest methods of biometric security included fingerprints in clay tablets and signatures on documents. Over the past two centuries, biometrics have evolved to encompass a variety of outlets to increase the value of everyday lives. Today, not only is the government using retinal scans, voice recognition software, and fingerprint recognition, but banks are using voice recognition algorithms to authenticate users and cell phones are now unlocked only with the user s fingerprint. While this technology is clearly more secure and accurate than its predecessor, it is not a perfected science and there are potentially a variety of personal and social problems. With the advancement of this technology, many ethical issues will arise. These vary from government spying to the loss of online anonymity. The science behind biometrics could potentially move us into the newageofsecurity,butatwhatcostofpersonal privacy? Keywords biometric security; biometric I. INTRODUCTION In everyday activities, people rely on some form of security to get us through the day. Whether they are logging into our Facebook or trying to access their emails, they depend on security to ensure the safety of theirdata. Thecurrentwayanendusercanhelpprotect their personal data is to create unique and complicated passwords. Once the passwords have been entered, the user relies on the strength of the encryption method to protect them. Security is not guaranteed, even with these complicated passwords. Ultimately, there is a better way toprotectpersonaldata. Biometricsisawayofusingthe one thing only an individual has access to. Themselves. Using their biometric identity to protect theirdatamaybeoneofthebestwaystoaccomplisha higher level of protection. The term biometryis known to be derived from the Greek words "bios" (life) and "metron" (to measure) [1]. In a sense, biometric recognition is the science used to identify a person based on physical attributes The very first form of biometric recognition starts with the earliest humans. Babies are born into this world recognizing their mother s voice. Soon after, they learn to recognize important facial features. As they develop into adults, they were able to identify family members, friends, and enemies. Even the earliest forms of art in caves left by cavemen have forms of a biometric signature in the form of handprints [2]. Biometric security started to show up around 500 BC when Babylonians would imprint their fingerprint into clay tablets to identify their ownership of cargo or children. It was not until the late 1800s when police departments starting using fingerprint recognition to speed the process of the identification and apprehension of suspects. Within the next century, government and security organizations arenowabletousealmosteverypartofthebodyasan identification method. In section II, we present the different types of biometrics, procedures, and applications such as: Iris recognition, fingerprinting, facial recognition, and DNA analysis. In section III, we will provide technical examples in real world environments. In section IV, we will review the social impact of the growing popularity of biometrics. In section V, we will discuss the ethical issues, impacts, and disadvantages to society. In section VI, we will discuss the professional impact and career opportunities. In section VII, we will review with a conclusion. II.TYPES OF BIOMETRICS Iris recognition is often used in areas of high security and is generally regarded as the most accurate [3]. Within the iris itself are completely random patterns that are unique to the individual. The computer scans the 11 P a g e

iris of the user and computes an algorithm that identifies these random patterns. The user is granted access when the correct patterns are confirmed. Fingerprinting is the most commonly recognized form of biometric security. Fingerprints have long been a way for authorities to identify suspects that were potentially at a crime scene. Fingerprints are also used by consumers toaccesspersonallocksanddevices. TheiPhone6and GalaxyS5 havethe option to use your fingerprint as a way of unlocking your phone. FacialRecognitionisalsoanewanduniquewayyou canunlockyourphone. Oncesetup,allyouhavetodoit lookandyouscreenandblinkandifitmatchesthenyour phone will unlock. Facial recognition can be used in many other ways such as camera surveillance of high securityareas or to auto tag usersin pictures on social networks. A person s DNA can also be analyzed for biometric identities.dnacanbefoundinanykindoffluidsample. Although DNA is not currently used for any kind of biometric security, it is used for crime scenes and paternity tests. One of the newest forms of biometric security is emerging as a palm vein recognition. Fujitsu held an innovation contest to improve and facilitate the use of palm vein recognition. Similar technology has already been implemented in ATMs around the globe. Table I shows the false acceptance and rejection rates for various forms of biometrics with intentional focus on the palm vein results[4]. TABLE I. FUJITSU S PALMSECURE FALSE ACCEPTANCE AND REJECTION RATE COMPARISON. ASOF2014 According to Table I, the procedures of Fujitsu s palm veinrecognition,palmsecure TM,hasthelowestlevelsof false acceptance and false rejection. This means that the palm vein recognition technology could perhaps be the most accurate form of biometric security. Fujitsu also provided a chart displaying the accuracy and practicality of various forms of biometric recognition, as shown in Figure 1[4]. This proves their claim that the palm vein recognition technology has the highest accuracy and practicality. Figure 1: Fujitsu s display of an overall view of the accuracy and practicality of various types of biometric applications. Notice how the fingerprint has high accuracy but low practicality. This is due to the requirement of the person being physically present for the scan. Whereas a facial recognition has low accuracy but high practicality because cameras around the world implement this technology to scan facial features as the person is going about their daily lives. III. TECHNICAL EXAMPLES Biometric Security has many practical uses in today s day and age. With the amount of cyber security attacks, people need to implement a more efficient encryption method to protect themselves and their data. Biometric securitycan do just that. Since everyone has a unique DNAstructure,noonecanhavethesame password as another, in a biometric sense. This allows for a better password system than what is available today. Criminal identification is another useful reason to further current technology in biometrics. Officials can better protect locations of interest, such as banks and schools, if they can identify potential threats as they approach or even enter the building [5].With facial recognition, customers can be ran through a criminal 12 P a g e

database in real time as they pass by the front door cameras. Atypeoftechnologyusedeverydayistheabilityto talk to devices. People use their voice to hands-free type, complete online searches, and do many other tasks. The advancement of technology is allowing this method to go a step further. Not only can the voice be used in a software function, it can be so ONLY a unique voice pattern belonging to the individual can complete these tasks. Nuance Communications creates technology that allowstheuserto usetheir voiceto communicate with technology. They are currently creating a way to recognizepatternsinthevoicestructureanduseitasa password. Currently being on trial with banks, users can call their bank to access accounts by simply saying my voice is my password. This eliminates someone being able to falsely access sensitive information.the largest deployment of any biometric is what makes this technologypossible. Sprint svoicefoncard which makes use of TI s voice-verification engine. IV. SOCIAL IMPACT Biometrics have a huge advantage to the advancement of social lives. Facial recognition can be deployed in interconnected cities to identify a missing person or potential criminals. Cases would be closed faster, freeing up time and allowing for law enforcement to focus on more immediate concerns. Fingerprinting has also workeditswayintoanaspectofeverydayliveswithcell phones now capable of fingerprint recognition. Instead oftypinginapasscodeorswipinginacertainpattern,a usercanjustsimplyhitthehomebutton,whichisusually always the first action performed. The fingerprint is analyzedanditismatchedtothedatabase. Iftheprint hasaccesstothephone,itwillunlock. Oneofthelargest entertainment mediums, video games, will have been impactbythesetoolsaswell[6]. V.ETHICAL ISSUES With the advancement of this technology, ethical issues become a huge concern. This technology can be misused by the government or other entities for various purposes. If facial recognition technology were to be more advanced, who is to stop it from being used on every video recording device? If there is a criminal database with fingerprints, iris scans, and facial recognition, anybody in that database could be tracked, regardlessofwheretheygo. Whatifitexpandedtomore than just criminals? Any person of interest could be trackedanywhereintheworld,inrealtime. Thisleadsto the integral degradation of personal privacy. Anissuethatcanaffectsocietyasearlyasthisyearis theremoval ofonline anonymity. If a user weretotie their online profiles to their physical features, would the time of the anonymous internet be no more? Passwords willalwaysbeanintegralpartoftheinternet,butwhen the majority of websites make biometrics a requirement would a user be inclined to use these biometric methods if it guaranteed data protection? These are all considerations one must make as they choose to proceed down this path as technology advances[7]. VI. PROFESSIONAL IMPACT A. Job Opportunities As with any technological field when the technology advances, so do the career opportunities. Any large government organization will most likely have some form of biometric security. Entities from local law enforcement to government agencies, such as the FBI and CIA, rely on biometric technology almost daily to perform tasks [8]. A career with any of these organizations will most likely merit a situation in which biometrics can be used, but these applications will only beontheenduserlevel. Apersonwillhavetobehighly technicallytrained in order to be part of the force that designs, creates, or implements biometrics. B. Careers An example of a career in biometrics would be a Biometrics Engineer. A biometric engineer is generally a software developer who creates and maintains various biometric systems [9]. A Bachelor s degree in a Computer Science or related field is a common requirement. In addition to having strong computer programming skills, a biometrics engineer will have strong problem-solving skills and an extensive comprehension of biometric systems[10]. According to SimplyHired.com, the average biometric engineer salary is $78,000. Many of these professionals hold graduate degrees, granting them more pay. AsyoucanseeinFigure2,thebiometricindustryis on a steady incline and constantly growing. This information was provided by Acuity Market Intelligence [11]. 13 P a g e

Figure 2: The Future of Biometrics; 2009 Revised Edition VII. CONCLUSION Biometrics are quickly becoming a part of everyday lives whether society wants it or not. As new technologies are developed, so will new biometric methods and algorithms. This technology can be crucial in how sensitive information is secured and how society goes about its everyday life. Biometric characteristics can be used to secure sensitive information such as fingerprint scanning on mobile payments or they can be used by governments and organizations to spy on anybody s every move. As with every advancing technology,therewillbeconsandpros. We,asasociety andspecies,havetobelievethattheproswillalwaysoutweigh cons. REFERENCES N.V. Boulgouris, K. Plataniotis, and E. Tzanakou, Biometrics: Theory, Methods, and Applications, Hoboken, NJ: Wiley, 2009. K. Saeed and T. Nagashima. Biometrics and Kansei Engineering, New York, NY: Springer, 2012. A. Jain, R. Bolle, and S. Pankanti. Biometrics: Personal Identification in Networked Society, Norwell, MA: Kluwer, 1999. FUJITSU PalmSecure Innovation Contest. (n.d.). RetrievedMarch 25, 2015 from https://www.innovation-ideacontest.com Central European Conference on Information & Intelligent Systems. Biometric system reliability as an important factor of influence on Chain of Custody of Digital Evidence. Sep 2014 Information and Privacy Commissioner of Ontario. Facial Recognition withbiometricencryption in Match-on-Card Architecture for Gaming and Other Computer Applications, Torronto, 2014.. Information and Privacy Commissioner of Ontario.Privacy by Design Solutions for Biometric One-to-Many Identification Systems, Torronto, 2014. Biometric Technology Today. RBS and NatWest mobile customer log in with fingerprint biometrics. Volume 2015, Issue 3 Biometric Technology Today. NXT-ID files patent for voice recognition-based payments. Volume 2015, Issue 3 Biometric Technology Today. ZTE Grand S3 to feature eye-based biometrics from EyeVerify. Volume 2015, Issue 3 Acuity Market Research Reports. (n.d.). Retrieved March 27 2015, from http://www.acuitymi.com/fob_report.php 14 P a g e