The idea behind information security is that data, either personal or commercial, will only be viewed by those for whom it was intended and keeping unwanted eyes away. One of the most popular methods to secure data is the use of passwords and/or PIN numbers that only designated persons know. This type of securing information worked well when the password and/or PIN numbers follow a secure policy, but this method quickly fails when the designated persons that use the secure information mistreat the password and/or PIN numbers.5 The user may write down the key needed to access the information or simply tell it to someone who does not have access; then the information is no ...view middle of the document...
Facial recognition should automatically detect whether a face is present in the image acquired; locate the face if one is present; and recognize the face from any pose.6
Fingerprint. The accuracy of fingerprint systems for adequate for verification systems and small to medium scale businesses using the identification system. A problem with the fingerprint system is the large amount of computational resources required, especially when using identification mode. A small fraction of the population may be unable to use automatic identification due to genetic factors, aging, or occupational reasons.6
Hand Geometry. Systems involving hand geometry are based on several measurements of the hand, including shape, palm size, and length and of fingers. Hand geometry is not known to be very distinctive and cannot be used to identify an individual form a large population.3
Iris. The annular region of the eye bounded by the pupil and the sclera on either side is known as the iris. Due to the complex nature of the iris it is very distinctive and useful for personal recognition. The current accuracy and speed of iris systems is promising and the large-scale iris systems seem promising. 3 An image of the iris is easy to capture because it is well protected and due to the complexity of the iris it is difficult to spoof. 5
Keystroke. It is believed that each person has their own individual characteristic ways of typing on a keyboard. The keystroke method is not believed to be distinctive, but offers enough discriminatory information to allow identity verification. 6
Palmprint. Similar to fingerprints, the palmprint of human hands contain patterns of ridges and valleys. This method is more distinctive than fingerprint systems due to the palm being larger in size. The palms also contain principal wrinkles and lines, which are distinctive features that can be captured with a lower resolution scanner. 3
Retinal. The retinal vasculature is a structurally rich characteristic of each individual and each eye making it the most secure biometric characteristic. To scan the retinal vasculature entails contact with the eyepiece from the user, which adversely affects the public acceptability. 6
Signature. The way a person signs their name is a characteristic that has been accepted into various fields of work. The signature is a behavioral characteristic that changes over time and may be influenced by physical and emotional conditions. Professional forgers may be able to fool the system. 6
Voice. The voice biometric is created by a combination of physiological and behavioral characteristics. This method is not very distinctive or appropriate for large scale identification. Text-independent voice recognition will recognize the speak independent of...