This website uses cookies to ensure you have the best experience. Learn more

Biometric Technology In Verifying A Person's Identity

1774 words - 8 pages

1. Introduction
The process of verifying a person’s identity, also called authentication, plays an important role in various areas of everyday life. Any situation with user interaction where the identity is required needs a means to verify the claimed identity. One of the more obvious and commonly known application areas for identity verifying technologies, i.e. authentication, is the Logical Access Control to computer systems, where authenticity is normally established by confirming aclaimed identity with a secret password or PIN code.Traditional methods of confirming the identity of an unknown person rely either upon some secret knowledge (such as a PIN or password) or upon an object the person possesses (such as a key or card). But testing for secret knowledge or the possession of special objects can only confirm the knowledge or presence, and not, that the rightful owner is present. In fact, both could be stolen. Conversely, biometric technology is capable of establishing a much closer relationship between the user’s identity and a particular body, through its unique features or behavior.
Biometric verification performs comparison of biometric template with the one it has on records. Face recognition is one of the techniques used in biometric verification. While performing face recognition on mobile platform it does not only suffer
from the same problems of a computer based system, such as illumination, occlusion and pose variations,

but is also limited by other factors: Limited Processing Power, Limited Memory [1]. To implement face recognition based authentication for incoming calls on mobile, existing algorithms suffers from recognition time and Accuracy Tradeoff i.e. increasing robustness will increase the time of recognition.
To implement Real Time Recognition i.e. recognition must be performed within few seconds to support incoming call authentication and to make application robust under different illumination conditions. We use Retina illumination normalization [8] followed by simple, but robust and efficient face recognition algorithm for implementation in mobile devices. It is based on Local Binary Patterns (LBP) features [3], which have shown to be a powerful and computationally efficient feature extractor. Then Chi-square based classification method is used for Authentication.
The algorithm constitutes engine of a new face authentication for incoming call application. It restrictsuser to receive call unless proposed entity’s face is not verified with registered entity’s face image. The implementation is made for the Google Android platform, using OpenCV libraries for image processing. It is important to take into account that all the processing is done in the mobile domain, without the need of any external computation.

Figure 1.Flow Chart for Authentication on Incoming Call

An authentication method based on face recognition is designed for restricting access of incoming call for un-authorized entity. It will take...

Find Another Essay On Biometric Technology in Verifying a Person's Identity

Identity Management in Easy A Essay

1598 words - 7 pages For my media analysis I intended to investigate how identity management, including theories of social comparison, reflection appraisal, stereotyping and self-esteem are reflected in the 2010 teen comedy Easy A, written by Bert V. Royal. Throughout the film, the themes of identity management are discussed at length; majority of the characters are given “identifiers” on their social standing in high school, communication patterns between the

Gender, Technology and identity in How Sex Changed

726 words - 3 pages . In there the author also address the importance of the creation of new identities as well as how medication constrain how we think of our self. The author also explain how technological progress dissolve the idea of gender as well as how the study of genetics and eugenics impacts in the ideas about gender/sexuality and identity. But more importantly how technology has change the idea of biological sex as unchangeable. Joanne Meyerowitz follows

Identity is a very important facet in our world

1426 words - 6 pages and her Italian culture. This symbolism explains that part of one's identity is inherited from parents. Parents are a link to the past, and are the ones that bring culture and heritage into the lives of their children, both of which are major parts that compose one's identity. It also emphasises that family relationships is a central factor of a person's identity.Another language feature utilised in this article to explore identity, is the use of

Music, Violence, and Identity in Anthony Burgess’ A Clockwork Orange

1481 words - 6 pages Music, Violence, and Identity in Anthony Burgess’ A Clockwork Orange Linking the fundamental conflict between individual identity and societal identity with musical imagery in Anthony Burgess’ A Clockwork Orange creates a lens through which one can recognize the tendency that violence has to destroy an individual’s identity. Although Alex clearly associates violence with his own individual identity and sense of self, he consistently

The Creation of Identity in To Kill a Mockingbird

689 words - 3 pages A person’s identity is created by his family, friends, and neighbors. These influences can be people that choose to interact or have to interact with each other. The decisions made based on these interactions define a person. In To Kill a Mockingbird, Scout, the narrator, is affected by numerous sources. Scout’s identity is shaped in part by Atticus, Miss Maudie, and her experience with the court case. Atticus is a major influence on Scout’s

Identity as a Name in The Importance of Being Earnest

830 words - 4 pages are ironically hidden (rather poorly) under fake earnestness. Garland states that, “both women attempt to define the existence of their opponent through rapidly shifting expression of Identity” (272), and cause a quiet fire in the atmosphere of the scene. Since their fight is so indirect and blatantly petty, Wilde is able to comically criticize females of victorian society that are represented by Gwendolen and Cecily. Gwendolen and Cecily are

Identity as a Name in The Importance of Being Earnest

1387 words - 6 pages Because this play is meant to embody victorian society, Wilde is able to interpret and criticize the high importance of social identity to Victorians. The encompassing critic that Wilde addresses in his script involves the corrupt nature of society and the hypocrisy of presenting oneself as a wholesome, earnest person when reality indicates otherwise. This play symbolically allows us to view the characters as an example of all elite Victorian

A Struggle for Identity in Shutter Island by Dennis Lehane

1009 words - 5 pages perform lobotomies on him, it is really man vs himself. An internal struggle that Teddy faces to find his real identity. Teddy is constantly haunted by memories of his beloved wife, Dolores Chanel. He is always repressing around her memory, and she claims she died in an apartment that a man by the name of Andrew Laeddis started. His psyche is not handling her memory well and he falls into thoughts about her in random moments and has very intense

A Present Career in Information Technology

2563 words - 10 pages A Present Career in Information TechnologyMarch 12, 2004A Present Career in Information TechnologyI Background Information.a. What is Information Technology?b. How I got into the field.II Information Technology Pre Year 2000.a.Jobs were available.b.Economy was booming.III Jobs in the Information Technology field.a.Helpdesk/Technical Support Representative.b.Desktop/Workstation Representative.c.Network Administrator/Network Engineer.VI Technical

Technology: A Downfall in Modern Society

743 words - 3 pages Technology has grown rapidly in the past few years and has played a massive and beneficial role in modern human life; however, the technology that is present in society today has also become detrimental. Humans have difficulty performing everyday tasks without the aid of technology. Reliance on the Internet is causing humans to lose the ability to spell words, understand concepts, and even learn basic concepts. M.T. Anderson portrays several of

The Internet a Long Leap in Technology

1570 words - 7 pages From the beginning of time when mankind inhabited the Earth for the first time, humanity has made a long leap in technology. It is because of mankind's continuous search for knowledge and making the world an easier place to live in, that humans have been able to invent and discover new things. Out of this continuous search for knowledge, the Internet was invented by a group of people, which is a key tool in today's society for information and

Similar Essays

Exploring The Factors That Define A Person's Identity In The Hobbit By J.R. Tolkien

2678 words - 11 pages Exploring the Factors that Define a Person's Identity in The Hobbit by J.R. Tolkien Identity is the basis of individuality. It determines who one is; who one chooses to be; how one is perceived by others. This philosophy is applied no differently in 'The Hobbit', written by J.R. Tolkien. It is a fantasy-adventure tale about a peaceful creature called a hobbit named Bilbo Baggins, who is hauled into an adventure by a well

Men And Women, What Influences A Person's Identity?

2148 words - 9 pages Men and WomenWhat influences a person's identity? Is it their homes, parents, religion, or maybewhere they live? When do they get one? Do they get it when they understand right fromwrong, or when they can read, or are they born with it? Everyone has one and nobody hasthe same, is there a point in everyone's life when they get one? A person's identity is hisown, nobody put it there and nobody can take it out. Everyone in this world has adifferent

Verifying A Potential Role Of Gh In The Maintenance And Regeneration Of Skeletal Muscle Precursors

547 words - 2 pages Introduction Rapid developments in free radical biology and molecular technology led to the acquisition of data supporting the role of oxidative stress as a major contributor to the aging process and to the pathogenesis of a number of diseases (57, 65, 70). Oxidative damage to DNA, proteins, and lipids accumulates with age and contributes to degenerative diseases and the aging phenomenon by disrupting cellular homeostasis (1, 3, 4, 27). At the

Identity Theft And Possible Risk In Technology

1977 words - 8 pages Identity Theft and Possible Risk in Technology Identity theft has been a major issue of privacy and fraud. In the data breach analysis from the Identity Theft Resource Center (2013), the number of data breaches from the year 2005 to 2012 increased. In 2012, there had been 49% where the data breach exposed people Social Security Number. The data breach of 2012 has a rate of 27.4% caused by hackers. These breaches were commonly from 36.4