Preview

Biometrics

Powerful Essays
Open Document
Open Document
3596 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometrics
Biometrics
Hariri Canadian University
English 210
Mrs Maysa Bannat
Lana Mansour ID#: 20110357
1/December/2011

Outline
Biometrics
I. Introduction to biometrics
A. Definition of biometrics (Dictionary.com, Wikipedia)
B. What are biometrics? (http://www.globalsecurity.org/security/systems/biometrics-history.htm )
C. Why are they used? (http://www.biometricsinstitute.org/displaycommon.cfm?an=1&subarticlenbr=133 , http://www.nist.gov/itl/biometrics/index.cfm)
D. What is the importance if using biometrics in Lebanon, and why must it be forced?

II. Overview
A. Introduction to Biometrics (http://www.biometrics.org/html/introduction.html )
B. Historical Backgrounds / recent history (faculty.darden.virginia.edu/smithr/Biometrics.doc)
C. Kinds and Types of Biometrics (citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.134...type...)
1. Bertillonge
2. Fingerprint
3. Hand scanning
4. Iris Scanning
5. Vascular patterns
D. How and where are they collected? (http://www.immi.gov.au/allforms/biometrics/offshore/collection.htm , http://www.aimglobal.org/technologies/biometrics/biometricsfaq.asp )
E. Advantages of Biometrics (http://www.globalsecurity.org/security/systems/biometrics.htm )

III. The Advancement of Biomet mkrics
A. biometric technologies (www.biometrics.gov/Documents/biointro.pdf)
B. access controls ( www.utc.edu/Faculty/Li.../access-control-biometrics-p124-sukhai.pdf) Not helpful? You can block www.utc.edu results when you're signed in to search.www.utc.edu
C. process followed to take fingerprints(http://www.fbi.gov/about-us/cjis/fingerprints_biometrics/recording-legible-fingerprints/takingfps)
D. What happens if a person refused to be fingerprinted?
E. What happens if someone cuts his finger off?
F. What is the difference between recognition, verification, and identification?

IV. The Importance of Biometrics in Lebanon
A. For what causes?
B. Fighting crime would be much easier
C. The rate of robberies will decrease

You May Also Find These Documents Helpful

  • Good Essays

    Drug Law Persuasive Essay

    • 1068 Words
    • 5 Pages

    This is true and although your teachers can search you it must be with reasonable cause this is a key piece for you to know if you’re search this is your privacy right. This is important to know because in certain cases the school is allowed to search you. This is important because if they could just search you whenever they want it's a violation of your own…

    • 1068 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Technology affects communication capabilities of specialized databases in the criminal justice system by different systems such as Live Scan, Automated Finger Identification System that is also known as AFIS database, and Mobile data terminal. All these systems were created over the recent years and were made with many modern technological features.…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Good Essays

    At UCC, we are dedicated to keeping all personal information collected of users of our website and its online services secure and private.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Home and business user alike are using biometric security. Through a biometric identifier, such as a fingerprint biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    First and foremost, random locker searches are most indefinitely a invasion of privacy. Privacy is a right we are all given. People today, especially, have meager amounts of privacy. In most schools you have to pay for a locker, if you pay for the locker you should have the right to a private locker.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Funding Hezbollah

    • 1256 Words
    • 6 Pages

    “Lebanon-U.S.” Middle East Reporter (Daily Edition) 11 Feb. 2011: 6. Regional Business News. EBSCO. Web. 25 July 2011.…

    • 1256 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Fingerprinting Process

    • 758 Words
    • 4 Pages

    Fingerprinting is an important process that many employers require in order for a person to obtain a job. Fingerprinting clearance is done to check a person’s background to make sure that he or she has never been convicted of a crime that would prevent him or her from obtaining the job in question. Jobs like teachers and day-care workers need to be fingerprinted to ensure that children who come into contact with these professionals are being taught and taken care of by someone who has not broken the law or been convicted of a crime.…

    • 758 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Profiling has been a method to address security airport’s concerns during the past fifteen years; this method was implemented in order to prevent another tragedy after 9/11. No matter what, safety always comes first, and while it is very understanding why people would not like the government judge them by the way they look, or how they behave, surely everyone appreciates the safety that profiling provides. Nonetheless, this method is not even close to being popular among people, that’s why is essential to understand how it works, which we will discuss later in this essay. We will also talk about what happen to those people that are identified as criminal through profiling, and…

    • 882 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    The cleaning staff was scene reading documents that were thrown in the trash while performing their cleaning duties. Technically the cleaning staff was not violating any laws because the printouts were tossed into the trash which makes them public information. With that being said the cleaning staff should be…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Facial Recognition

    • 930 Words
    • 4 Pages

    Facial memory and recognition are common daily activities and important forensic evidence in a trial or an investigation. Some people have difficulty in social interaction because of having face blindness and sometimes a suspect can be determined by the witness’ facial recognition. However, the reliability of facial recognition is being questioned for years because memory is a recreation of given information. It raises an interesting question to ask what factors improve or affect the accuracy of facial recognition and memory.…

    • 930 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Face Recognition

    • 33246 Words
    • 133 Pages

    Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access articles distributed under the Creative Commons Non Commercial Share Alike Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published articles. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Mirna Cvijic Technical Editor Teodora Smiljanic Cover Designer Jan Hyrat Image Copyright hfng, 2010. Used under license from Shutterstock.com First published July, 2011 Printed in Croatia A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org…

    • 33246 Words
    • 133 Pages
    Powerful Essays
  • Powerful Essays

    Recent technological advancements have made face recognition a very viable identification and verification technique and one reason behind its popularity is the nonintrusive nature of image acquisition. A photo can be acquired easily without the person even being aware of the process.…

    • 15936 Words
    • 64 Pages
    Powerful Essays
  • Satisfactory Essays

    Identification System

    • 432 Words
    • 2 Pages

    We, the selected students of AMA Computer Learning Center, would like to ask permission in your good office to conduct research and study regarding your company ACLC - Cainta Identification System. This is in partial fulfilment of our requirements this semester in our subject Development and Maintains Enterprise-level Web Applications using Microsoft.Net.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays

Related Topics