Thursday, December 26, 2019
Facial Recognition Systems, Is This an Effective Tool for...
April S Professor G P Wright BA 731 Business and Information Technology 08 December 2012 Facial Recognition Systems, Is this an effective tool for security? Facial Recognition software has been used in many atmospheres to assist in security. There has been controversy as to wither or not facial recognition is an accurate tool. The software has been in existence for many years but still can be defeated by criminals, terrorists, and even by citizens in general without malice. History of Facial Recognition Software. Between the years 1964 to 1965; facial recognition started in its infancy by Woody Bledsoe, Helen Chan Wolf, and Charles Bisson. The project name man-machine utilized mug shot photos, the operator wouldâ⬠¦show more contentâ⬠¦If the face matches a ââ¬Å"predetermined identity,â⬠then the person is logged into the device. The software is also capable of having multiple user profiles. Google was not the first with the software; Samsung Galaxy S3, Samsungââ¬â¢s Galaxy Nexus as well as Apple. Apple also filed for a patent for facial recognition simi lar to Googleââ¬â¢s, which could cause patent lawsuits or legal battles. Effectiveness of Facial Recognition Software The effectiveness of facial recognition software comes into question if you look at the disadvantages this concept has. Originally the software was designed using 2D imaging both with the photo database and with the subject themselves. This process was called into question for its accuracy being that the human face is not 2D. 2D is unable to capture the full face, lighting variationsââ¬â¢ effect the outcome of the image to compare with the mug shots. If the person pose changes in anyway, a tilt of the head, this affects the overall results of the image and can affect the accuracy of the comparison to the mug shot, this includes anything from the slight tilt of the head to wearing eye glasses or a hat. 3D imaging software was designed to combat the issues of 2D imaging. 3D is able to process the facial variations with better accuracy. The cameras are able to capture the full face and the cameras are less sensitive to lighting but the 3D software is moreShow MoreRelatedAn Introduction To The Biometric Authentication System And Information Security889 Words à |à 4 Pagesmessage reaches two people.In that case there is very high chance for the confirmation to be granted by the wrong person.Then, there must exist another level of security like a security question which was given to the user in the time of issuing the card.Or it can also ask for confirmation by asking the date of expiry of the card,as this bit of information might not be accessible to the fraud. And also a default message stating probable misuse must be sent to an auxiliary number given by the userRead MoreNational Security Vs. Digital Privacy1735 Words à |à 7 Pagesterrorism rates in America, the optimal solution thus far is enhancing security throughout the nation. By doing so, policies, procedures, and protocols would be amended for the sole purpose of protecting the country. Such alterations should be made because it prevents crime in a timely, reliable, and successful manner, whilst preserving the fundamental rights of all United States Citizens. In light of the controversy over national security versus digital privacy, the government should partake in internationalRead MoreOur Modern Day Era Faces A Never Ending Problem Of Securing Our Most Integrated Data And Messages Essay1416 Words à |à 6 Pagesstresses on keys that are generated by generic function, algorithms or in random key generators. But question remains whether this key is unique and reliable in nature. Moreover how can these keys be unique to one and only one person? The answer to this would be Biometric Cryptosystems. Biometric Cryptosystems are the newest inventions in the field of security. The fundamentals of this Biometric Cryptosystem lies on the very fact that some features of human body are significantly unique to each and everyRead MoreBiometrics Essay1548 Words à |à 7 PagesBiometrics is used in many places and there is a bright future for them. Coca Cola has recently replaced time card system with hand scanning machines. Finger print scanners are being used in many states of the US. They have been used to trace social welfare fraud. An iris pattern identification system is being used in Cook County, Illinois to ensure that right people are released from jail. ATM machines have been installed with finger scanners to prevent theft and fraud in Indiana (Jain, 2005). Read MoreThe Right Of Privacy, By Warren And Brandeis1308 Words à |à 6 PagesS. Constitution) This was a basic structure formed to protect the privacy of Americans at a simpler time but as technology advanced, more protection was needed. The 1890 law review article, ââ¬Å"The Right of Privacyâ⬠, by Warren and Brandeis, which defined privacy as ââ¬Å"the right to be left alone,â⬠was written in response to the intrusion of an individualââ¬â¢s personal life and affairs. This was able to occur through the invention of the portable camera and flexible film. (Wriggins) This article created aRead MoreNotes On N + N1392 Words à |à 6 Pages{ââ"Ë(x_(j+1)=N/k_i (x_j-N_i ) ãâ¬â"+ yãâ¬â"_j mod N/k_i @y_(j+1)=k_i/N (y_j-y_j mod N/k_i )+N_i )â⠤ with {ââ"Ë(k_1+k_2+k_3+â⹠¯=N@N_i=k_1+k_2+â⹠¯+k_(i-1)@N_iâⰠ¤x_jâⰠ¤N_i+k_i@0âⰠ¤y_jâⰠ¤N)â⠤ (6) Key Generator: Many chaotic key generators exist but the one used in this research involves 1-D cubic map [16]. It takes 64-bit random key Key = [Key1, Key2, Key3, Key4] to calculate initial condition based on its 16-bit component (Keyi) such that y(0)=(âËâââ"âãâ¬â"Keyãâ¬â"_i/2^16 )mod(1) [16] of 1-D cubic map and returns values of theRead MoreAn Atm with an Eye2376 Words à |à 10 Pagescom AN ATM WITH AN EYE ABSTRACT There is an urgent need for improving security in banking region. With the advent of ATM though banking became a lot easier it even became a lot vulnerable. The chances of misuse of this much hyped ââ¬Ëinsecureââ¬â¢ baby product (ATM) are manifold due to the exponential growth of ââ¬Ëintelligentââ¬â¢ criminals day by day. ATM systems today use no more than an access card and PIN for identity verification. This situation is unfortunate since tremendous progress has been made in biometricRead MoreThe Surveillance Of Cctv Cameras1613 Words à |à 7 Pagesin large buildings, sharing their space with other occupants. Although security is a key factor in consideration of the location of a bank, smart individuals use this positioning to their advantage. Access is gained by cutting a hole in the floor, and theft occurs. With the passing years, security in banks has been evident with the reliance of CCTV cameras. This ensures monitoring of the users activities in banks by securit y officers who take turns in watching the screens for any uneventful, unexpectedRead MoreWhat Are The Major Principles Of Risk Analysis?1387 Words à |à 6 Pageswhich is to correctly assess and evaluate the existing information technology systems within an organization (Fritsch et al, 2015). Usually, those who conduct the studies tend to focus on external vulnerabilities and threats. However losses of information come from inside. The assessment must include an evaluation of the organizational, managerial, and administrative procedures directly relevant to IT systems. Threats: This is to identify the threats facing an organization. In numerous cases, organizationRead MoreIp Cctv Network: Strengths and Weaknesses2712 Words à |à 11 Pageshave become a tool used in several countries to fight crime and to ensure the safety of the public through surveillance in public places. The use of CCTV cameras is on the rise, and there is little proof of areas where their use has been cut back. IP CCTV technology has been in existence for a long time. It uses a camera that is connected to a network. It works by converting the captured images and audio into data the transmitting this over a network or an internet connection. This leads to a more
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.