Fingerprint Bio Metrics 4

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

www.Fullinterview.

com

BIOMETRICS

BIOMETRICS
Biometricsarebestdefinedasthescienceofusinguniquephysiologicalor behavioralcharacteristicstoverifytheidentityofanindividual.Biometriccharacteristics areuniquetoindividualsandcannotbelostorstolenlikepasswords,makingthemnot onlyconvenientbutalsomoreeffectiveinthepreventionoftheftorfraud.Theyinclude fingerprints,irisscanning,handgeometry,voicepatterns,facialrecognition,andother techniques.Biometricsareofinterestinanyareawhereitisimportanttoverifythetrue identityofanindividual. Banks and others who have tested biometricbased security on their clientele, however, say consumers overwhelmingly have a pragmatic response to the technology. Anything that saves the informationoverloaded citizen from having to remember another password or personal identification number comes as a welcome respite.Addingastatisticalfootingtothisanecdotalevidence,anationwidesurveyby ColumbiaUniversityreportedthat83%ofpeopleapproveoftheuseoffingerimaging, anddon'tfeelittreatspeopleascriminals. www.Fullinterview.com

www.Fullinterview.com

Biometricsispreferredovertraditionalmethodsinvolvingpasswordsand PINnumbersforvariousreasons. * Thepersonto beidentified is required tobephysically present atthe pointof identification; * Identification based on biometric techniques obviates the need to remember a passwordorcarryatoken. Withtheincreaseduseofcomputersasvehiclesofinformationtechnology, itisnecessarytorestrictaccesstosensitive/personaldata.ByreplacingPINs,biometric techniquescanpotentiallypreventunauthorizedaccesstoorfraudulentuseofATMs, cellularphones,smartcards,desktopPCs,workstations,andcomputernetworks.PINs andpasswordsmaybeforgotten,andtokenbasedmethodsofidentificationlikepassports and driver'slicenses maybeforged,stolen,orlost.Thusbiometric basedsystems of identificationarereceivingconsiderableinterest.Varioustypesofbiometricsystemsare being used for realtime identification, the most popular are based on face, iris and fingerprintmatching.However,thereareotherbiometricsystemsthatutilizeretinalscan, speech,signaturesandhandgeometry. Biometrics are not a panacea for all our personal identification related issues,butanenhancingtoolinourtechnologytoolbox.Agreatamountoftechnical progresshasbeenmade,providingmoreaccurateandmorerefinedproducts.Theunit costisdroppingtoalevel,whichmakesthemsuitableforbroaderscaleapplication.The knowledgebase concerning their use and integration into other processes has increaseddramatically. Biometricsystemsworkbyfirstcapturingasampleofthefeature,suchas recordingadigitalsoundsignalforvoicerecognition,ortakingadigitalcoloredimage forfacerecognition.Thesampleisthentransformedusingsomesortofmathematical www.Fullinterview.com

www.Fullinterview.com functionintoabiometrictemplate.Thebiometrictemplatewillprovideanormalized, efficient and highly discriminating representation of the feature, which can then be objectivelycomparedwithothertemplatesinordertodetermineidentity. Mostbiometricsystemsallowtwomodesofoperation.Anenrolmentmode for adding templates to a database, and an identification mode, where a template is createdforanindividualandthenamatchissearchedforinthedatabaseofpreenrolled templates.Agoodbiometricischaracterizedbyuseofafeaturethatis;highlyunique,so thatthechanceofanytwopeoplehavingthesamecharacteristicwillbeminimal,stable, sothatthefeaturedoesnotchangeovertime,andbeeasilycaptured,inordertoprovide conveniencetotheuser,andpreventmisrepresentationofthefeature.

Application: Currently, biometric technologies are employed in a broad range of activities.OneoftheapplicationsofthesetechnologiesisIrisrecognition,whichweare takingintoconsideration. Irisrecognition: Theirisisanexternallyvisible,yetprotectedorganwhoseuniqueepigenetic patternremainsstablethroughoutadultlife.Thesecharacteristicsmakeitveryattractive for use as a biometric for identifying individuals. Compared with other biometric technologies,suchasface,speechandfingerrecognition,irisrecognitioncaneasilybe consideredasthemostreliableformofbiometrictechnology. Iris recognition is of course based on the visible qualities of the human iris, which togetherformtheiristexture,seethefollowingfigure.Visiblecharacteristics include rings,furrows,freckles,andtheiriscorona. www.Fullinterview.com

www.Fullinterview.com Image processing techniques can be employed to extract the unique iris patternfromadigitizedimageoftheeye,andencodeitintoabiometrictemplate,which canbestoredinadatabase.Thisbiometrictemplatecontainsanobjectivemathematical representationoftheuniqueinformationstoredintheiris,andallowscomparisonstobe madebetweentemplates. ThebenefitsofusingIrisTechnologyinclude: #Irispatternsareextremelycomplex. #Theirisrecognitionsystemstestforaliveeyebycheckingforthenormalcontinuous fluctuationinpupilsize. #Patternsareindividual(eveninfraternaloridenticaltwins). #Patternsareformedbysixmonthsafterbirth,stableafterayear,andtheyremainthe sameforlife. #Imitationisalmostimpossible. #Patternsareeasytocaptureandencode. Conclusion: Theemergence ofbiometric standards will facilitate growthinthebiometric industryandensurethatbiometricsolutionsbroughttomarketmeetminimumstandards for interoperability from a developer's perspective. Interestingly, corporations and interestsoutsidethebiometricindustryhavedrivenstandardizationasmuchasbiometric vendors.Thereisabroderperspectiveonhowstandardsareessentialtothewidespread distribution and acceptance of the technology. The most fundamental argument of biometrics is increased security, a highly accurate technology such as irisscan has tremendousappeal.Thetechnologyisnottoimproveitsresistancetofalsematching,but www.Fullinterview.com

www.Fullinterview.com to ensure that its capabilities in realworld environments parallel capabilities in a laboratorysetting.

www.Fullinterview.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy