SlideShare uma empresa Scribd logo
1 de 30
[object Object],[object Object],[object Object],Werner Blessing,  22.09.10
 
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A modified Video camera is used for iris identification.
Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
 
+ Face „only“ also underlies the „ replay attack = fakeable“
 
0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  2 Template  0 1  2  3  4  5  6  7  8  9  0   Password
 
Softwaretesting done by specialized Institute ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fusion: ComBiom, 4 figures, EER
[object Object],[object Object],[object Object],[object Object]
 
Softbutton Start MobiComBiom
 
 
Webcam
 
„ out of the box products“
Permanent  Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication  with four figures Face, Voice, and Word Recognition
 
 
ID ComBiom  is an All in One Software. The user is always free to decide whether he wants to use  ComBiom  as a package or just single parts of it, such as  PermaFace  only or  PermaVoice  only.  ID Perma Face  will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice  identifies the user on it‘s biometric voice identification only. For example at night, without light.
Quelle: Frost & Sullivan, World Biometric Market, 2007
Global  e-Access e-Security  e-Comfort One Software Once enroled Many applications on adaptive use
 

Mais conteúdo relacionado

Destaque

Israel Palestina
Israel PalestinaIsrael Palestina
Israel Palestinabarbet
 
ESL Helpful Handouts-Shapes And Places
ESL Helpful Handouts-Shapes And PlacesESL Helpful Handouts-Shapes And Places
ESL Helpful Handouts-Shapes And PlacesSusan Watson
 
##1.b. pkrmmp phase 2 ntb workshop hibah & policy draft 2 tyt-geoff 1
##1.b. pkrmmp phase 2 ntb workshop hibah & policy draft 2 tyt-geoff 1##1.b. pkrmmp phase 2 ntb workshop hibah & policy draft 2 tyt-geoff 1
##1.b. pkrmmp phase 2 ntb workshop hibah & policy draft 2 tyt-geoff 1Indonesia Infrastructure Initiative
 
Business launch survey results 2010 (3)
Business launch survey results 2010 (3)Business launch survey results 2010 (3)
Business launch survey results 2010 (3)Melanie Brandt
 

Destaque (6)

Regalo alla-fidanzata
Regalo alla-fidanzataRegalo alla-fidanzata
Regalo alla-fidanzata
 
Israel Palestina
Israel PalestinaIsrael Palestina
Israel Palestina
 
2 the blackspot investigation process indonesia
2 the blackspot investigation process indonesia2 the blackspot investigation process indonesia
2 the blackspot investigation process indonesia
 
ESL Helpful Handouts-Shapes And Places
ESL Helpful Handouts-Shapes And PlacesESL Helpful Handouts-Shapes And Places
ESL Helpful Handouts-Shapes And Places
 
##1.b. pkrmmp phase 2 ntb workshop hibah & policy draft 2 tyt-geoff 1
##1.b. pkrmmp phase 2 ntb workshop hibah & policy draft 2 tyt-geoff 1##1.b. pkrmmp phase 2 ntb workshop hibah & policy draft 2 tyt-geoff 1
##1.b. pkrmmp phase 2 ntb workshop hibah & policy draft 2 tyt-geoff 1
 
Business launch survey results 2010 (3)
Business launch survey results 2010 (3)Business launch survey results 2010 (3)
Business launch survey results 2010 (3)
 

Semelhante a Low cost webcam provides high security identity verification

Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingMobileMonday Estonia
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionDhimankomal
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
ParanaVision Presentation (English)
ParanaVision Presentation (English)ParanaVision Presentation (English)
ParanaVision Presentation (English)Alphan Manas
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentationmaitretester
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometricssuniljoshi151
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
Techlead Video Analytics (Image Processing)
Techlead Video Analytics (Image Processing)Techlead Video Analytics (Image Processing)
Techlead Video Analytics (Image Processing)techlead-india
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
DHI SMB Access Control Temperature Monitoring Solution Delivery Plan V1.0.pptx
DHI SMB Access Control Temperature Monitoring Solution Delivery Plan V1.0.pptxDHI SMB Access Control Temperature Monitoring Solution Delivery Plan V1.0.pptx
DHI SMB Access Control Temperature Monitoring Solution Delivery Plan V1.0.pptxCesarioOrtiz
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 

Semelhante a Low cost webcam provides high security identity verification (20)

Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
 
2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch
 
2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch
 
Vortrag Cartes in Asia
Vortrag Cartes in AsiaVortrag Cartes in Asia
Vortrag Cartes in Asia
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
ParanaVision Presentation (English)
ParanaVision Presentation (English)ParanaVision Presentation (English)
ParanaVision Presentation (English)
 
Ayonix gen en_v1.4
Ayonix gen en_v1.4Ayonix gen en_v1.4
Ayonix gen en_v1.4
 
Presentation1ubv.pptx
Presentation1ubv.pptxPresentation1ubv.pptx
Presentation1ubv.pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Mobile security
Mobile securityMobile security
Mobile security
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Techlead Video Analytics (Image Processing)
Techlead Video Analytics (Image Processing)Techlead Video Analytics (Image Processing)
Techlead Video Analytics (Image Processing)
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
DHI SMB Access Control Temperature Monitoring Solution Delivery Plan V1.0.pptx
DHI SMB Access Control Temperature Monitoring Solution Delivery Plan V1.0.pptxDHI SMB Access Control Temperature Monitoring Solution Delivery Plan V1.0.pptx
DHI SMB Access Control Temperature Monitoring Solution Delivery Plan V1.0.pptx
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Low cost webcam provides high security identity verification