This website uses cookies to ensure you have the best experience. Learn more

Biometrics In Security Essay

1213 words - 5 pages

Introduction
The idea behind information security is that data, either personal or commercial, will only be viewed by those for whom it was intended and keeping unwanted eyes away. One of the most popular methods to secure data is the use of passwords and/or PIN numbers that only designated persons know. This type of securing information worked well when the password and/or PIN numbers follow a secure policy, but this method quickly fails when the designated persons that use the secure information mistreat the password and/or PIN numbers.5 The user may write down the key needed to access the information or simply tell it to someone who does not have access; then the information is no ...view middle of the document...

Facial recognition should automatically detect whether a face is present in the image acquired; locate the face if one is present; and recognize the face from any pose.6
Fingerprint. The accuracy of fingerprint systems for adequate for verification systems and small to medium scale businesses using the identification system. A problem with the fingerprint system is the large amount of computational resources required, especially when using identification mode. A small fraction of the population may be unable to use automatic identification due to genetic factors, aging, or occupational reasons.6
Hand Geometry. Systems involving hand geometry are based on several measurements of the hand, including shape, palm size, and length and of fingers. Hand geometry is not known to be very distinctive and cannot be used to identify an individual form a large population.3
Iris. The annular region of the eye bounded by the pupil and the sclera on either side is known as the iris. Due to the complex nature of the iris it is very distinctive and useful for personal recognition. The current accuracy and speed of iris systems is promising and the large-scale iris systems seem promising. 3 An image of the iris is easy to capture because it is well protected and due to the complexity of the iris it is difficult to spoof. 5
Keystroke. It is believed that each person has their own individual characteristic ways of typing on a keyboard. The keystroke method is not believed to be distinctive, but offers enough discriminatory information to allow identity verification. 6
Palmprint. Similar to fingerprints, the palmprint of human hands contain patterns of ridges and valleys. This method is more distinctive than fingerprint systems due to the palm being larger in size. The palms also contain principal wrinkles and lines, which are distinctive features that can be captured with a lower resolution scanner. 3
Retinal. The retinal vasculature is a structurally rich characteristic of each individual and each eye making it the most secure biometric characteristic. To scan the retinal vasculature entails contact with the eyepiece from the user, which adversely affects the public acceptability. 6
Signature. The way a person signs their name is a characteristic that has been accepted into various fields of work. The signature is a behavioral characteristic that changes over time and may be influenced by physical and emotional conditions. Professional forgers may be able to fool the system. 6
Voice. The voice biometric is created by a combination of physiological and behavioral characteristics. This method is not very distinctive or appropriate for large scale identification. Text-independent voice recognition will recognize the speak independent of...

Find Another Essay On Biometrics in security

Biometrics Essay

1515 words - 6 pages although some technologies, like face recognition, can seem an invasion of privacy, they are very important to our security. Biometrics is great, but there are also some ethical issues that must be brought up. We as a society need to understand in what situations biometrics would be helpful to us and not unethical. One example of this is fingerprint scanning. We all know that it is used to identify criminals from a scene of a crime and other

Biometrics Essay

1520 words - 6 pages systems, other businesses and even consumer applications are using such systems. In Japan there has been a proliferation of mobile devices with fingerprint readers. No technology is failed safe. Biometrics is continuing to be developed. Multiple technologies carry the benefit of preventing security gaps and leaks. Biometric devices are getting smaller, accurate and more sophisticated. Multimodal applications are being developed to assist in

Biometrics: Are we the key?

3032 words - 12 pages or behavioural patterns such as voice, keystroke dynamics and signatures (See Appendix 1). Until recently, biometrics was considered intrusive and too expensive for most companies, but now with the need for increased security, the dropping of prices and the improvement in technology more organisations are looking towards biometrics to replace current tasks for example swipe card and password confirmation. It can also be used to keep track of time

Security and Privacy on SAT´s (IRS) Electronic Signature

2298 words - 9 pages against repudiation by the user ID owner (Ratha, Connell, & Bolle, 2001). In recent years the use of biometrics has had a significant surge due to its advantages over other authentication methods. Security-critical applications, such as unattended remote applications, need authentication systems that are designed to resist attacks. Due to the needs of modern technologies systems, passwords and user ID are now inadequate. Biometrics is a rapidly

Biometrics and Ethics

1466 words - 6 pages store to shop and exits, the sales associate might as well have the shopper’s entire history of shopping on the tips of their fingers. (Biometrics security and business ethics, n.d.). Another major ethical concern in the field of Biometrics is the increasing inter-dependence between technology and the human body which is being known as the ‘informatization of the body’; biometrics technologies are issues of serious concern and these are being

Computer security

2637 words - 11 pages for most companies, but now with the need for increased security, the dropping of prices and the improvement in technology more organisations are looking towards biometrics to replace current tasks for example swipe card and password confirmation. It can also be used to keep track of time and attendance within a company. Biometrics has also been introduced to some countries to ensure the integrity of their voting system.Although biometrics is

Biometric identification, can we rely on it in Australia?

827 words - 3 pages We live in a world where technology advances everyday. Due to this there are increasing numbers of identity theft. People are finding new ways to steal other peoples' credit card details, social security numbers and many others. Biometric identification will not reduce the number of identity theft in Australia. It's an invasion of privacy to users, there's still a chance that your identity could be stolen, and a physical identity is almost

The Identification Technology of Biometrics

701 words - 3 pages than traditional token-based or knowledge-based methods in distinguishing between an authorized person and a fraudulent impostor. Among all biometrics, fingerprint recognition is one of the most reliable and promising personal identification technologies. Biometrics authentication is highly reliable, because physical human characteristics are much more difficult to forge the security codes, passwords, hardware keys sensors, fast processing

Sixth Sense Technology

2114 words - 8 pages with sixth sense in order to have better gadgets that make us machine free. Object recognition is basically concerned with the recognition of 3 dimensional objects from image data. Biometrics is mainly divided into two categories, namely, physiological biometrics and behavioural biometrics. Physiological biometrics identifies a person based on his/her physiological characteristics such as eye retina, whereas behavioural

biometrics and access control

1356 words - 6 pages Software companies are faced with external security threats from hackers and others, along with a variety of even more threatening internal security threats, like corporate spies. This has resulted in companies being more vigilant thus implementing necessary precautions to prevent unauthorized access to the pool of data within the company. These precautions include access management (access control) as well as access technology (biometrics

Biometrics

2735 words - 11 pages Jacob Delgado CSYS 3350 ?BIOMETRICS? Delgado 1 Recent technological advances in the computer industry are opening up a brave new world of convenience and security. Once regarded to realms of fantasy, such as the late 60?s show Star Trek, where the ship?s computer would easily respond to Captain James T. Kirk?s voice commands, this technology will soon be viable and affordable. Biometrics is the measurement of living traits, whether physical or

Similar Essays

Biometrics Security Essay

1400 words - 6 pages Biometrics Security Biometrics uses personal characteristics to identify users. When it comes to security, mapping unique patterns and traits in fingerprints, irises or voices is considered light years ahead of forcing employees to memorize combination of letters and numbers -- which are easily compromised and easily forgotten. The technology works by taking measurements -- whether it is the weight and length of bones in the hand or the

Biometrics, Security And Wrinkled Fingerprints Essay

861 words - 4 pages . Euclidean distance vector will be the third and the improved fingerprint characterization. CONCLUSION It can be concluded that while considering applications for security, biometrics is one of traditional and effective method for verification purpose. Out of various biometrics, fingerprint is most frequently as well as commonly used. But some pitfalls in fingerprint recognition system are required to be covered. Various fingerprint matching

Biometrics Introduction To Information Systems Security

622 words - 2 pages proliferation of mobile devices with fingerprint readers. No technology is failed safe. Biometrics is continuing to be developed. Multiple technologies carry the benefit of preventing security gaps and leaks. Biometric devices are getting smaller, accurate and more sophisticated. Multimodal applications are being developed to assist in identification and verification (Philips, 2002).Biometrics can provide security at ports and access points. They can help

Evolving Biometrics Essay

2891 words - 12 pages individual with the data in their system. False-match error rates correlate with the scale of a system; the larger the system there will be more error rates (J.L. Wayman.) The future of biometrics I had a broad understanding of biometrics before conducting research for this paper. Biometrics is not just for top secret agencies high tech companies, it can be used in everyday life and in many ways enhance our security systems in many ways