SlideShare a Scribd company logo
Presented by: Chitransh Saxena Siddarth Kishan Jitendra Nath Gupta
Topic we will cover….. What is  Ubiquitious Security? Ubiquitious Security  using Bio-metrics  Alternatives to biometrics
W hat is Ubiquitious Security?
Definition:- A  Security  system which  identifies users and the surroundings to offer suitable services desired by “Individuals” safely and securely that “dynamically” change security levels according to the situation
Need Of Ubiquitous Security ??
Security is Needed for... Privacy Reasons:   People want to hide certain (culturally specific or personal) things. Economic Reasons:   People (and enterprises) want to protect their property.
 
 
 
Ubiquitious Security  using Bio-metrics devices… What is Bio-metrics .. Why we have need Bio-metrics .. AND
Types of Biometrics …. Face recognition Iris scanning Retina scanning Hand geometry Fingerprinting Voice recognition Signature verification
Face recognition  ?? A facial recognition system is  a computer application for automatically identifying  or verifying a person from a digital image or a video frame from a video source
Iris scanning… It uses mathematical  pattern-recognition  techniques of an individual's eyes,  whose complex random  patterns are unique and  can be seen from some distance.
Recognized After 17 Years….
Retina scanning…. A biometric identifier known as a  retina scan  is used to map the unique patterns of a person's retina.
Finger  printing Individual’s fingerprints are defined by a complex combination of patterns .............................. Lines Arches  Loops Whorls
Hand geometry… A hand scanner is a fairly simple device that measures hand geometry to obtain a template of the user’s hand  The user puts his or her hand in a small device
Voice recognition… The field of computer science  that deals with designing  computer systems that can recognize spoken words.
Signature  verification… systems use pens with motion-sensing and  pressure-sensing devices inside A special pen is used that contains a bi-axial  accelerometer to measure changes in force in the x and y direction
Future of Biometrics….DNA  DNA differs from standard biometrics in several ways: – DNA requires a tangible physical sample as opposed to an impression, image, or recording. – DNA matching is not done in real-time, and currently not all stages of comparison are automated.  – DNA matching does not employ templates or feature extraction, but rather represents the comparison of actual samples.
Brain wave scanning Mapping of Brain Activity
Applications of Biometrics:  Identification Search and apprehension of criminals and suspects Counterterrorism Identification of visitors Shopping mall security Identification of shoppers
Applications of Biometrics: Authentication Physical access control Time and attendance Benefit payment systems Border control systems  PC/Network access control Internet verification for  e-commerce  and home workers  ATM applications  National identity cards
Some more Application..On Biometrics ….. Biometric Passport Entry Authentication  System No need to carry ATM-card
Biometrics Comparison…
So…Does  Ubiquitious Security   depend on  Biometrics..??
Alternate security systems for Ubiquitous computing systems. Embedded RFID chips. B arcode I ntelligent Id cards. Traditional passwords. Non-text-based passwords Encryption
Embedded RFID chips. An integrated circuit device or RFID transponder is encased in silicate glass and is implanted in the body of a human being. Are small in size, and are passive tags. Stores a 16 digit number.
B arcode A  barcode  is an optical machine-readable representation of data, which shows data about the object to which it attaches. Read by a scanner. Can be used in a ubiquitous security system.
I ntelligent Id cards. smart cards personal identification Can contains magnetic strip, RFID chip, bar codes or Sim card. Stores information
Traditional passwords. One of the most oldest and the safest way to protect the data The longer the password, the stronger it gets
Non-text-based passwords graphical passwords or mouse-movement based passwords. Images, graphics or colors instead of letters, digits or special characters are used. One system requires users to select a series of faces as a password, utilizing the human brain's ability to recall faces easily.
Encryption    the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge. Requires a ‘key’ to decrypt the data.
Conclusion Questions?
Thank you

More Related Content

PPT
A study on biometric authentication techniques
PPTX
Biometrics security
PPTX
Biometric Security Systems ppt
PPT
Biometric Security advantages and disadvantages
PPTX
Biometricsppt
PPTX
Biometric authentication reiew
PPTX
Biometric authentication
PPTX
Biometrics
A study on biometric authentication techniques
Biometrics security
Biometric Security Systems ppt
Biometric Security advantages and disadvantages
Biometricsppt
Biometric authentication reiew
Biometric authentication
Biometrics

What's hot (20)

PDF
Defending Biometric Security
PPTX
Biometric authentication ppt by navin 6 feb
DOCX
Biometric Authentication Technology - Report
PPTX
Biometric Authentication PPT
DOC
Biometric technology
PPTX
Biometric security system
PPTX
Biometrics Technology In the 21st Century
PPTX
MULTIMODAL BIOMETRIC SECURITY SYSTEM
PPTX
Biometrics Based Authentication AKASH
PPTX
Biometrics Authentication Technology by Sayak Das
DOC
Biometrics poster
PDF
Final Report Biometrics
PPT
biometric technology
PPTX
Ins & Outs of Biometric Authentication
PPT
Biometricstechnology in iot and machine learning
PPTX
Biometric technology
PPT
Biometric
PPTX
Biometric authentication system
PPT
Biometric security Presentation
DOC
Poster on biometrics
Defending Biometric Security
Biometric authentication ppt by navin 6 feb
Biometric Authentication Technology - Report
Biometric Authentication PPT
Biometric technology
Biometric security system
Biometrics Technology In the 21st Century
MULTIMODAL BIOMETRIC SECURITY SYSTEM
Biometrics Based Authentication AKASH
Biometrics Authentication Technology by Sayak Das
Biometrics poster
Final Report Biometrics
biometric technology
Ins & Outs of Biometric Authentication
Biometricstechnology in iot and machine learning
Biometric technology
Biometric
Biometric authentication system
Biometric security Presentation
Poster on biometrics
Ad

Similar to Ubiquitous security- is it just biometrics? (20)

PPTX
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
PPTX
Alaa elbeheri research_presentation
PPTX
Bio-Metric Technology
PDF
Biometrics Research/Thesis Paper
PPTX
Bio-Metric Technology
PPTX
Chapter-Six.pptxhyjhgjghjghjghjghjghjghjghjg
PDF
Enhancing the Cash Point using Multimode Biometric System
PPTX
Biometric security using cryptography
PPT
Shamaas
PPTX
Biometrics Technology
PPT
Input and output devices 2015
PPT
Biomatrics
PDF
International Journal of Computational Engineering Research(IJCER)
PPTX
Finger print and pulse sensor for digital signal processors (dsp)
PPTX
BIOMETRICS
PPT
Bio Metrics
PPTX
Ai presentation on using of Artificial intelligence in smart cities
PPTX
Embedded system
PPTX
2001229094(1).pptx biometrics authentication
PPT
A86eseminar on biometrics
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
Alaa elbeheri research_presentation
Bio-Metric Technology
Biometrics Research/Thesis Paper
Bio-Metric Technology
Chapter-Six.pptxhyjhgjghjghjghjghjghjghjghjg
Enhancing the Cash Point using Multimode Biometric System
Biometric security using cryptography
Shamaas
Biometrics Technology
Input and output devices 2015
Biomatrics
International Journal of Computational Engineering Research(IJCER)
Finger print and pulse sensor for digital signal processors (dsp)
BIOMETRICS
Bio Metrics
Ai presentation on using of Artificial intelligence in smart cities
Embedded system
2001229094(1).pptx biometrics authentication
A86eseminar on biometrics
Ad

Recently uploaded (20)

PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
project resource management chapter-09.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
STKI Israel Market Study 2025 version august
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Architecture types and enterprise applications.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
August Patch Tuesday
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Web App vs Mobile App What Should You Build First.pdf
1 - Historical Antecedents, Social Consideration.pdf
DP Operators-handbook-extract for the Mautical Institute
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
project resource management chapter-09.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Getting started with AI Agents and Multi-Agent Systems
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Zenith AI: Advanced Artificial Intelligence
STKI Israel Market Study 2025 version august
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Module 1.ppt Iot fundamentals and Architecture
Architecture types and enterprise applications.pdf
Developing a website for English-speaking practice to English as a foreign la...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Hindi spoken digit analysis for native and non-native speakers
August Patch Tuesday
NewMind AI Weekly Chronicles - August'25-Week II
Web App vs Mobile App What Should You Build First.pdf

Ubiquitous security- is it just biometrics?

  • 1. Presented by: Chitransh Saxena Siddarth Kishan Jitendra Nath Gupta
  • 2. Topic we will cover….. What is Ubiquitious Security? Ubiquitious Security using Bio-metrics Alternatives to biometrics
  • 3. W hat is Ubiquitious Security?
  • 4. Definition:- A Security system which identifies users and the surroundings to offer suitable services desired by “Individuals” safely and securely that “dynamically” change security levels according to the situation
  • 5. Need Of Ubiquitous Security ??
  • 6. Security is Needed for... Privacy Reasons: People want to hide certain (culturally specific or personal) things. Economic Reasons: People (and enterprises) want to protect their property.
  • 7.  
  • 8.  
  • 9.  
  • 10. Ubiquitious Security using Bio-metrics devices… What is Bio-metrics .. Why we have need Bio-metrics .. AND
  • 11. Types of Biometrics …. Face recognition Iris scanning Retina scanning Hand geometry Fingerprinting Voice recognition Signature verification
  • 12. Face recognition ?? A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source
  • 13. Iris scanning… It uses mathematical pattern-recognition techniques of an individual's eyes, whose complex random patterns are unique and can be seen from some distance.
  • 14. Recognized After 17 Years….
  • 15. Retina scanning…. A biometric identifier known as a retina scan is used to map the unique patterns of a person's retina.
  • 16. Finger printing Individual’s fingerprints are defined by a complex combination of patterns .............................. Lines Arches Loops Whorls
  • 17. Hand geometry… A hand scanner is a fairly simple device that measures hand geometry to obtain a template of the user’s hand The user puts his or her hand in a small device
  • 18. Voice recognition… The field of computer science that deals with designing computer systems that can recognize spoken words.
  • 19. Signature verification… systems use pens with motion-sensing and pressure-sensing devices inside A special pen is used that contains a bi-axial accelerometer to measure changes in force in the x and y direction
  • 20. Future of Biometrics….DNA DNA differs from standard biometrics in several ways: – DNA requires a tangible physical sample as opposed to an impression, image, or recording. – DNA matching is not done in real-time, and currently not all stages of comparison are automated. – DNA matching does not employ templates or feature extraction, but rather represents the comparison of actual samples.
  • 21. Brain wave scanning Mapping of Brain Activity
  • 22. Applications of Biometrics: Identification Search and apprehension of criminals and suspects Counterterrorism Identification of visitors Shopping mall security Identification of shoppers
  • 23. Applications of Biometrics: Authentication Physical access control Time and attendance Benefit payment systems Border control systems PC/Network access control Internet verification for e-commerce and home workers ATM applications National identity cards
  • 24. Some more Application..On Biometrics ….. Biometric Passport Entry Authentication System No need to carry ATM-card
  • 26. So…Does Ubiquitious Security depend on Biometrics..??
  • 27. Alternate security systems for Ubiquitous computing systems. Embedded RFID chips. B arcode I ntelligent Id cards. Traditional passwords. Non-text-based passwords Encryption
  • 28. Embedded RFID chips. An integrated circuit device or RFID transponder is encased in silicate glass and is implanted in the body of a human being. Are small in size, and are passive tags. Stores a 16 digit number.
  • 29. B arcode A  barcode  is an optical machine-readable representation of data, which shows data about the object to which it attaches. Read by a scanner. Can be used in a ubiquitous security system.
  • 30. I ntelligent Id cards. smart cards personal identification Can contains magnetic strip, RFID chip, bar codes or Sim card. Stores information
  • 31. Traditional passwords. One of the most oldest and the safest way to protect the data The longer the password, the stronger it gets
  • 32. Non-text-based passwords graphical passwords or mouse-movement based passwords. Images, graphics or colors instead of letters, digits or special characters are used. One system requires users to select a series of faces as a password, utilizing the human brain's ability to recall faces easily.
  • 33. Encryption    the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge. Requires a ‘key’ to decrypt the data.

Editor's Notes

  • #5: Ubiquitous computing is about networked microprocessors embedded in everyday objects: not just cell phones and home appliances but also books, bookshelves, bus stops and bathtubs--all talking to each other over wireless links. Hundreds of internet-enabled computers per human being, none of them resembling a conventional keyboard-and-monitor machine.
  • #11: What is wrong with traditional security approaches ??? Human guards, police are expensive, prone to error and corruption Keys, PINs, passwords can be stolen, lost, or cracked PIN identifies a card and password identifies a username, not user Biometrics was being used to verify identity in a number of areas before the attacks on the United States on Sept. 11, 2001. After the attacks, the U.S. Congress passed the Enhanced Border Security and Visa Entry Act, which said all people entering the United States had to eventually use passports, visas and other travel documents that used "biometric identifiers recognized by domestic and international standards." At present, the United States uses digital fingerprints and photographs as part of its US-VISIT program for visitors who require visas. The face photograph will soon be used in conjunction with a "globally interoperable biometric" system of face recognition software that is being adopted by the International Civil Aviation Organization. A number of large corporations and organizations, such as American Express and the New York Police Department use biometrics to confirm employee identification. Others such as Continental Airlines use biometrics for those employees who need access to secure areas. The United States, the United Kingdom, Germany and the Netherlands are using biometric measures to help identify some immigrants and international visitors. Canada uses biometrics in its CANPASS program for frequent travellers. More on that below.
  • #14: United Arab Emirates Iris Guard's Homeland Security Border Control has been operating an expellee tracking system in the United Arab Emirates (UAE) since 2001, when the UAE launched a national border-crossing security initiative. Today, all of the UAE's land, air and sea ports of entry are equipped with systems. All foreign nationals who possess a visa to enter the UAE are processed through iris cameras installed at all primary and auxiliary immigration inspection points. To date, the system has apprehended over 330,000 persons re-entering the UAE with fraudulent travel documents. Aadhar, India's UID project uses Iris scan along with fingerprints to uniquely identify people and allocate a Unique Identification Number. Iris is one of three biometric identification technologies internationally standardized by ICAO for use in future passports (the other two are fingerprint and face recognition)
  • #15: The Afghan woman, Sharbat Gula, was photographed 17 years ago in a refugee camp in Pakistan. She was found by the original phographer in the beginning of 2002. Her identity was confirmed by iris analysis .
  • #16: Highly reliable because no two people have the same retinal pattern Speedy results: Identity of the subject is verified very quickly
  • #17: The technique of fingerprinting is known as dactyloscopy
  • #18: A solid-state digital camera captures side and top views of the hand, and sends the data to a microprocessor for analysis Data compressed down to about 9 bytes worth of essential information (all other information about the hand is essentially the same for each person) and compared against a stored profile
  • #19: The first speech recognizer appeared in 1952 and consisted of a device for the recognition of single spoken digits [1] Another early device was the IBM Shoebox , exhibited at the 1964 New York World's Fair .