SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Touchless 3D –
        A New Dimension in Fingerprint Technology

                  Technology, System Approach & Security Aspects




                        2012 Security Session, FIT VUT, Brno

                               Torsten Meister – CTO
             Touchless Biometric Systems AG, Pfäffikon (SZ), Switzerland


18.02.2012               Touchless 3D Fingerprinting – Technology & Security Aspects   Page 1
Overview


  • Introduction
        –    Biometrics Today – Expectations and Reality
        –    Fingerprint – What Else?
        –    Processes & Parameters
        –    Security Aspects

  • TBS Technology
        – Touchless Technology Basics
        – Advantages of Touchless 3D Technology
        – Technology Comparison

  • From Sensor to System
        – Markets & Applications
        – Sensors  Terminals  Solutions!
        – The New Device Line 2012




18.02.2012                Touchless 3D Fingerprinting – Technology & Security Aspects   Page 2
Part 1: Introduction




             Introduction to Biometrics




18.02.2012             Touchless 3D Fingerprinting – Technology & Security Aspects   Page 3
Expectations & Reality

      Biometrics is key to solve security challenges of the 21th century
       Reality or Fiction?

 • PRO:
        –    Makes secure identification possible, eliminates weak identification
        –    Unique, constant and always available
        –    Flexible, can be adapted to situation and user group
        –    Can be combined with other systems to increase security
        –    Convenient and User friendly


 • CONTRA:
        – Some technologies not mature yet
        – Market consolidation has just started
        – Not deterministic, identification based on probabilities


       Biometrics is just one aspect of a sophisticated security concept!



18.02.2012                 Touchless 3D Fingerprinting – Technology & Security Aspects   Page 4
Fingerprint – What Else?


 • Fingerprint
        – most adoped technology
        – Fingerprint is unique, constant and can be captured fast & easily
        – mature algorithms & broad range of sensors available
 • Face Recognition
        – Emerging technology, driven by security requirements in public areas
          ('Detecting the face in the crowd')
        – Limited accuracy und feature uniqeness
        – Medium to high price segment
 • Iris Recognition
        – Highest accuracy, but not user friendly and with acceptance problems
        – High price segment
 • Others
        – Hand/Finger Vein, Hand geometry etc.
           Limited accuracy and acceptance


  Fingerprint still takes more than 50%
      of market share!

18.02.2012               Touchless 3D Fingerprinting – Technology & Security Aspects   Page 5
Biometric Processes

 • Enrollment (User registration)
        – User data registration and capturing of biometric reference data
          ('Reference Template')
        – crucial importance for overall system performance


 • Matching (User identification or verification)
        – Comparison of live captured sample with reference data

        – Verification (1:1)
             • requires second token to preselect user list
             • comparison against preselected biometric data only
             • lower requirements regarding system accuracy and speed


        – Identification (1:N)
             • no preselection
             • comparison against reference data of all users
             • high requirements regarding system accuracy and speed




18.02.2012                  Touchless 3D Fingerprinting – Technology & Security Aspects   Page 6
Biometric Parameters


 •    Biometrics is based on probability of user recognition (not deterministic)
 •    Performance defined by system accuracy (sensor, algorithm) and speed
      (interface, platform, software)

 •    Accuracy can be measured using statistical parameters:
       – False Rejects  FRR
       – False Accepts  FAR
       – Equal Error Rate defines final parameter for comparison

 •    Speed can be measured directly:
       – Enrollment process time
       – Verification process time
       – Identification process time




18.02.2012              Touchless 3D Fingerprinting – Technology & Security Aspects   Page 7
Security Aspects

 A system is as secure as its weakest part!
        – Biometrics is part of a total security solution
        – Must not limit system security


 Risk factors:

 • Data Security
        –    Secure data storage
        –    Secure data transfer
        –    Can biometric data be interpreted and repeated?
        –    Can biometric data be revoked?


 • Process Security
        – Is biometric process stable?
        – Is biometric process safe against spoofing?




18.02.2012                Touchless 3D Fingerprinting – Technology & Security Aspects   Page 8
Part 2: TBS Technology




                      TBS Technology




18.02.2012         Touchless 3D Fingerprinting – Technology & Security Aspects   Page 9
Touchless Technology Basics

 •    founded in 2003, focusing on development of a new and unique
      fingerprint sensor
 •    Worldwide unique technology
 •    3 cameras surrounding the finger
       TBS Surround Imager
 •    Finger imaging instead of finger
      printing
 •    Complex illumination process




                                    •    Full-3D and Approx-3D variants,
                                         depending on application
                                    •    Full-3D to create rolled equivalent fingerprints
                                    •    Compliant to 2D technology (touch-based)
                                    •    Approx-3D to extend and optimize center image



18.02.2012             Touchless 3D Fingerprinting – Technology & Security Aspects   Page 10
Advantages of Touchless 3D Technology

 • Superior image quality
        – No Failure-To-Enroll
        – Able to handle critical fingers

 • Unparallel image stability
        – Non-intrusive capturing process
        – Almost not affected by finger condition

 • Larger capture area
        – Full-3D is able to provide almost nail-to-nail images
        – Approx-3D captures significantly bigger area than touch sensors
        – More indications available than just fingerprint

 • Build-in user guidance
        – Self-learning experience
        – Avoids sensor misuse

 • Mature Life Finger Detection

      Consequence:
      Better matching performance  Higher Process Security

18.02.2012               Touchless 3D Fingerprinting – Technology & Security Aspects   Page 11
Technology Comparison



 • Accuracy




 • Compatibility




18.02.2012         Touchless 3D Fingerprinting – Technology & Security Aspects   Page 12
Part 3: From Sensor to System Provider




              From Sensor to System




18.02.2012         Touchless 3D Fingerprinting – Technology & Security Aspects   Page 13
Markets and Applications


 • Access Control and Time & Attendance
        –    Early adopter of new technologies
        –    Small to medium sized applications
        –    Targets mainly on single factor identification
        –    Networked environment
            Biometric (sub)system required, rather than sensors
            Focus on Process Security


 • Civil, Governmental and Criminal ID
        –    Long term business
        –    Large sized applications
        –    Targets mainly on AFIS infrastructures
        –    PC based environment
            High-Quality biometric sensors required
            Focus on Data Security




18.02.2012                 Touchless 3D Fingerprinting – Technology & Security Aspects   Page 14
Sensors  Terminals  Solutions!


      Heterogenic markets require heterogenic solutions:

 • Full-3D sensor to create perfect 3D and rolled fingerprint



                    +                            =
     3D-Enroll LP       Demo SW / SDK                        Rolled Equivalent        3D (VRML)

 • Approx-3D based terminals plus web software to form a complete
   biometric subsystem with well defined interfaces



                    +                       +                                         =     Turnkey
                                                                                            Solution


       3D-Enroll         3D-Terminal                      Web Software


18.02.2012              Touchless 3D Fingerprinting – Technology & Security Aspects               Page 15
The New Product Line 2012


      Sensors & Solutions with 3D and 2D technology ...




18.02.2012           Touchless 3D Fingerprinting – Technology & Security Aspects   Page 16
The New Product Line 2012


 ... Consequently focusing on Data Security:

 • Template encryption                           • Channel encryption
 • Database encryption




 ... And Process Security:
 •    Superior image quality and stability
 •    Mature Life Finger Detection
 •    Better handling of critical fingers
 •    Etc.


18.02.2012            Touchless 3D Fingerprinting – Technology & Security Aspects   Page 17
Thank you!
             torsten.meister@tbs-biometrics.com
                   www.tbs-biometrics.com




18.02.2012       Touchless 3D Fingerprinting – Technology & Security Aspects   Page 18

Contenu connexe

Tendances

EyeRing PowerPoint Presentation
EyeRing PowerPoint PresentationEyeRing PowerPoint Presentation
EyeRing PowerPoint PresentationPriyad S Naidu
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its applicationArnab Podder
 
Contactless and less-constrained palmprint recognition - Ph.D. presentation
Contactless and less-constrained palmprint recognition - Ph.D. presentationContactless and less-constrained palmprint recognition - Ph.D. presentation
Contactless and less-constrained palmprint recognition - Ph.D. presentationAngelo Genovese
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemShakti Patil
 
Computer control using hand gestures
Computer control using hand gesturesComputer control using hand gestures
Computer control using hand gesturesRohithND
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-pptMohankumar Ramachandran
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Intel RealSense Hands-on Lab - Rome
Intel RealSense Hands-on Lab - RomeIntel RealSense Hands-on Lab - Rome
Intel RealSense Hands-on Lab - RomeMatteo Valoriani
 
Sherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environmentSherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environmentijsrd.com
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking Systemrahulmonikasharma
 
Designing Apps for Intel RealSense Technology
Designing Apps for Intel RealSense TechnologyDesigning Apps for Intel RealSense Technology
Designing Apps for Intel RealSense TechnologyKevin Arthur
 
Virtual Interaction Using Myo And Google Cardboard (slides)
Virtual Interaction Using Myo And Google Cardboard (slides)Virtual Interaction Using Myo And Google Cardboard (slides)
Virtual Interaction Using Myo And Google Cardboard (slides)Poo Kuan Hoong
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptascg121433
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its applicationArnab Podder
 

Tendances (20)

EyeRing PowerPoint Presentation
EyeRing PowerPoint PresentationEyeRing PowerPoint Presentation
EyeRing PowerPoint Presentation
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 
Contactless and less-constrained palmprint recognition - Ph.D. presentation
Contactless and less-constrained palmprint recognition - Ph.D. presentationContactless and less-constrained palmprint recognition - Ph.D. presentation
Contactless and less-constrained palmprint recognition - Ph.D. presentation
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification System
 
Myo armband project
Myo armband projectMyo armband project
Myo armband project
 
Computer control using hand gestures
Computer control using hand gesturesComputer control using hand gestures
Computer control using hand gestures
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Intel RealSense Hands-on Lab - Rome
Intel RealSense Hands-on Lab - RomeIntel RealSense Hands-on Lab - Rome
Intel RealSense Hands-on Lab - Rome
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Sherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environmentSherlock: Monitoring sensor broadcasted data to optimize mobile environment
Sherlock: Monitoring sensor broadcasted data to optimize mobile environment
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
 
presentation 1
presentation 1presentation 1
presentation 1
 
Designing Apps for Intel RealSense Technology
Designing Apps for Intel RealSense TechnologyDesigning Apps for Intel RealSense Technology
Designing Apps for Intel RealSense Technology
 
Virtual Interaction Using Myo And Google Cardboard (slides)
Virtual Interaction Using Myo And Google Cardboard (slides)Virtual Interaction Using Myo And Google Cardboard (slides)
Virtual Interaction Using Myo And Google Cardboard (slides)
 
Touch screen
Touch screenTouch screen
Touch screen
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
Fingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand guptaFingerprint recognition system by sagar chand gupta
Fingerprint recognition system by sagar chand gupta
 
Finger print sensor and its application
Finger print sensor and its applicationFinger print sensor and its application
Finger print sensor and its application
 

En vedette

Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprintPiyush Mittal
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Leveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile DevicesLeveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile DevicesNok Nok Labs, Inc
 
Fingerprint verification using matlab
Fingerprint verification using matlabFingerprint verification using matlab
Fingerprint verification using matlabPraveen Kumar Kushwah
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacyJernej Virag
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityChhatra Thapa
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless TouchscreenSaptarshi Dey
 
Touch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONTouch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONMrQaz996
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar PresentationAparna Nk
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 

En vedette (18)

Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprint
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Leveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile DevicesLeveraging Fingerprint Verification on Mobile Devices
Leveraging Fingerprint Verification on Mobile Devices
 
Fingerprint verification using matlab
Fingerprint verification using matlabFingerprint verification using matlab
Fingerprint verification using matlab
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Touchless Technology
Touchless TechnologyTouchless Technology
Touchless Technology
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Touchless Touchscreen
Touchless TouchscreenTouchless Touchscreen
Touchless Touchscreen
 
Touch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONTouch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATION
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 

Similaire à Touchless Fingerprint Recognition

IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxS .Ali Raza
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCiscoKorea
 
Things That No One Will Tell You About IoT Solutions
Things That No One Will Tell You About IoT SolutionsThings That No One Will Tell You About IoT Solutions
Things That No One Will Tell You About IoT SolutionsHemang Rindani
 
Convergence of Engineering and ICT will grow IoT
Convergence of Engineering and ICT will grow IoTConvergence of Engineering and ICT will grow IoT
Convergence of Engineering and ICT will grow IoTRekaNext Capital
 

Similaire à Touchless Fingerprint Recognition (20)

IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security system
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
sample assignment
sample assignmentsample assignment
sample assignment
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Access controls
Access controlsAccess controls
Access controls
 
IoTs.pptx
IoTs.pptxIoTs.pptx
IoTs.pptx
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Cisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 novCisco data analytics in ioe_rajiv niles_2015 nov
Cisco data analytics in ioe_rajiv niles_2015 nov
 
Things That No One Will Tell You About IoT Solutions
Things That No One Will Tell You About IoT SolutionsThings That No One Will Tell You About IoT Solutions
Things That No One Will Tell You About IoT Solutions
 
Convergence of Engineering and ICT will grow IoT
Convergence of Engineering and ICT will grow IoTConvergence of Engineering and ICT will grow IoT
Convergence of Engineering and ICT will grow IoT
 

Plus de Security Session

Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Security Session
 
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Security Session
 
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Security Session
 
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Security Session
 
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Security Session
 
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Security Session
 
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Security Session
 
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]Security Session
 
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Security Session
 
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Security Session
 
Exploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýExploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýSecurity Session
 
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin DrábKontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin DrábSecurity Session
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýSecurity Session
 
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýDolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýSecurity Session
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkSecurity Session
 
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
Jak odesílat zprávy, když někdo vypne Internet - 	Pavel TáborskýJak odesílat zprávy, když někdo vypne Internet - 	Pavel Táborský
Jak odesílat zprávy, když někdo vypne Internet - Pavel TáborskýSecurity Session
 
Two Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožTwo Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožSecurity Session
 

Plus de Security Session (20)

Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
 
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
 
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
 
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
 
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
 
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
 
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
 
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
 
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
 
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
 
Prezentace brno
Prezentace brnoPrezentace brno
Prezentace brno
 
OSINT and beyond
OSINT and beyondOSINT and beyond
OSINT and beyond
 
Exploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýExploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan Kopecký
 
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin DrábKontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
 
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýDolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
 
Turris - Robert Šefr
Turris - Robert ŠefrTurris - Robert Šefr
Turris - Robert Šefr
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
 
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
Jak odesílat zprávy, když někdo vypne Internet - 	Pavel TáborskýJak odesílat zprávy, když někdo vypne Internet - 	Pavel Táborský
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
 
Two Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožTwo Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal Ambrož
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Touchless Fingerprint Recognition

  • 1. Touchless 3D – A New Dimension in Fingerprint Technology Technology, System Approach & Security Aspects 2012 Security Session, FIT VUT, Brno Torsten Meister – CTO Touchless Biometric Systems AG, Pfäffikon (SZ), Switzerland 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 1
  • 2. Overview • Introduction – Biometrics Today – Expectations and Reality – Fingerprint – What Else? – Processes & Parameters – Security Aspects • TBS Technology – Touchless Technology Basics – Advantages of Touchless 3D Technology – Technology Comparison • From Sensor to System – Markets & Applications – Sensors  Terminals  Solutions! – The New Device Line 2012 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 2
  • 3. Part 1: Introduction Introduction to Biometrics 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 3
  • 4. Expectations & Reality Biometrics is key to solve security challenges of the 21th century  Reality or Fiction? • PRO: – Makes secure identification possible, eliminates weak identification – Unique, constant and always available – Flexible, can be adapted to situation and user group – Can be combined with other systems to increase security – Convenient and User friendly • CONTRA: – Some technologies not mature yet – Market consolidation has just started – Not deterministic, identification based on probabilities  Biometrics is just one aspect of a sophisticated security concept! 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 4
  • 5. Fingerprint – What Else? • Fingerprint – most adoped technology – Fingerprint is unique, constant and can be captured fast & easily – mature algorithms & broad range of sensors available • Face Recognition – Emerging technology, driven by security requirements in public areas ('Detecting the face in the crowd') – Limited accuracy und feature uniqeness – Medium to high price segment • Iris Recognition – Highest accuracy, but not user friendly and with acceptance problems – High price segment • Others – Hand/Finger Vein, Hand geometry etc.  Limited accuracy and acceptance  Fingerprint still takes more than 50% of market share! 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 5
  • 6. Biometric Processes • Enrollment (User registration) – User data registration and capturing of biometric reference data ('Reference Template') – crucial importance for overall system performance • Matching (User identification or verification) – Comparison of live captured sample with reference data – Verification (1:1) • requires second token to preselect user list • comparison against preselected biometric data only • lower requirements regarding system accuracy and speed – Identification (1:N) • no preselection • comparison against reference data of all users • high requirements regarding system accuracy and speed 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 6
  • 7. Biometric Parameters • Biometrics is based on probability of user recognition (not deterministic) • Performance defined by system accuracy (sensor, algorithm) and speed (interface, platform, software) • Accuracy can be measured using statistical parameters: – False Rejects  FRR – False Accepts  FAR – Equal Error Rate defines final parameter for comparison • Speed can be measured directly: – Enrollment process time – Verification process time – Identification process time 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 7
  • 8. Security Aspects A system is as secure as its weakest part! – Biometrics is part of a total security solution – Must not limit system security Risk factors: • Data Security – Secure data storage – Secure data transfer – Can biometric data be interpreted and repeated? – Can biometric data be revoked? • Process Security – Is biometric process stable? – Is biometric process safe against spoofing? 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 8
  • 9. Part 2: TBS Technology TBS Technology 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 9
  • 10. Touchless Technology Basics • founded in 2003, focusing on development of a new and unique fingerprint sensor • Worldwide unique technology • 3 cameras surrounding the finger  TBS Surround Imager • Finger imaging instead of finger printing • Complex illumination process • Full-3D and Approx-3D variants, depending on application • Full-3D to create rolled equivalent fingerprints • Compliant to 2D technology (touch-based) • Approx-3D to extend and optimize center image 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 10
  • 11. Advantages of Touchless 3D Technology • Superior image quality – No Failure-To-Enroll – Able to handle critical fingers • Unparallel image stability – Non-intrusive capturing process – Almost not affected by finger condition • Larger capture area – Full-3D is able to provide almost nail-to-nail images – Approx-3D captures significantly bigger area than touch sensors – More indications available than just fingerprint • Build-in user guidance – Self-learning experience – Avoids sensor misuse • Mature Life Finger Detection Consequence: Better matching performance  Higher Process Security 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 11
  • 12. Technology Comparison • Accuracy • Compatibility 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 12
  • 13. Part 3: From Sensor to System Provider From Sensor to System 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 13
  • 14. Markets and Applications • Access Control and Time & Attendance – Early adopter of new technologies – Small to medium sized applications – Targets mainly on single factor identification – Networked environment  Biometric (sub)system required, rather than sensors  Focus on Process Security • Civil, Governmental and Criminal ID – Long term business – Large sized applications – Targets mainly on AFIS infrastructures – PC based environment  High-Quality biometric sensors required  Focus on Data Security 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 14
  • 15. Sensors  Terminals  Solutions! Heterogenic markets require heterogenic solutions: • Full-3D sensor to create perfect 3D and rolled fingerprint + = 3D-Enroll LP Demo SW / SDK Rolled Equivalent 3D (VRML) • Approx-3D based terminals plus web software to form a complete biometric subsystem with well defined interfaces + + = Turnkey Solution 3D-Enroll 3D-Terminal Web Software 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 15
  • 16. The New Product Line 2012 Sensors & Solutions with 3D and 2D technology ... 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 16
  • 17. The New Product Line 2012 ... Consequently focusing on Data Security: • Template encryption • Channel encryption • Database encryption ... And Process Security: • Superior image quality and stability • Mature Life Finger Detection • Better handling of critical fingers • Etc. 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 17
  • 18. Thank you! torsten.meister@tbs-biometrics.com www.tbs-biometrics.com 18.02.2012 Touchless 3D Fingerprinting – Technology & Security Aspects Page 18