I. BIOMETRIC
Biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes:
- To verify
- or To identify users.
Biometrics is the most secure and convenient authentication tool. It can not be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individual's unique physical or behavioral characteristics to recognize or authenticate their identity.
Biometric technology can help the society to protect itself from possible threats of crimes and other negative effects related to it. It can serve as a surveillanceusing facial and body recognition technologies, The modern researchers hope to use biometrics to automatically identify known suspects entering buildings or traversing crowded security areas.
Here comes a list of biometrics :
|
Image credit from Google.com.ph |
A fingerprint looks at the patterns found on a fingertip.There are a variety of approaches to fingerprint verification, such as traditional police method, using pattern-matching devices, and things like moire fringe patterns and ultrasonics. This seems to be a very good choice for in-house systems.
|
Image Credit from Google.com.ph |
This involves analyzing and measuring the shape of the hand. It might be suitable where there are more users or where user access the system infrequently. Accuracy can be very high if desired, and flexible performance tuning and configuration can accommodate a wide range of applications. Organizations are using hand geometry readers in various scenarios, including time and attendance recording.
|
Image credit from Google.com.ph |
A retina-based biometric involves analyzing the layer of blood vessels situated at the back of the eye. This technique involves using a low intensity light source through an optical coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point
|
Image credit from google.com.ph |
An iris-based biometric involves analyzing features found in the colored ring of tissue that surrounds the pupil. This uses a fairly conventional camera element and requires no close contact between the user and the reader. Further, it has the potential for higher than average template-matching performance.
|
Image credit from Google.com.ph |
Face recognition analyses facial characteristics. It requires a digital camera to develop a facial image of the user for authentication. It was used in most of offices and government institutions to serve as a record of some sort of important file.
|
Image credit from Google.com.ph |
Signature verification analyses the way user signs his name. Signing features such as speed, velocity, and pressure are as important as the finished signature's static shape. People are used to signatures as a means of transaction-related identity verification.
|
Image credit from Google.com.ph |
Voice authentication is based on voice-to-print authentication, where complex technology transforms voice into text. Voice biometrics requires a microphone, which is available with PCs nowadays. Voice biometrics is to replace the currently used methods, such as PINs, passwords, or account names.
But as Biometrics are used these days,
It turns out that it has negative effect such as:
- Some Biometric apparatus or devices are difficult to handle..
Proper training is extremely required.
- Time may affect the accuracy of biometric data. For example a person got old,
Biometric data may cause changes and sometimes bring error to the data.
There are many things that we should remember about these devices.
It is neither it brought cure nor harm to us. Possibility that it may lessen the crime rate to our country is not hard if we just help each other to live our life to its limits with no one is going to be hurt or thrown down.
Internet Reference: http://www.peterindia.net/BiometricsView.html