This website uses cookies to ensure you have the best experience. Learn more

Research Paper Biometrics

2048 words - 8 pages

Research Paper-Biometrics

“Biometric technologies are defined as "automated methods of identifying or authenticating the identity of a living person based on a physical or behavioral characteristic."(Source #1) Growing up I loved to watch McGyver. He use to run around and break in and out of military compounds that were equipped with all types of security systems. Somehow he would always find the laser beams, or trick the fingerprint security, or voice activation. During that time biometrics was just beginning to come to the surface. Nowadays systems enabled with fingerprinting security, voice activation, or face recognition have come a long way and are close to fool proof.
Biometrics have come even as far to be used at the Super Bowl or other huge sporting events. Cameras have been designed to monitor crowds and be able to take faces and run them through national criminal databases to see if any matches occur. Biometrics is the security of today and tomorrow. In this paper I will explain different types of biometric security systems, mainly fingerprint activation, and give a thourugh explanation of when it was created, who created it, how the product has evolved and where the product is going.

Among all the biometric techniques, fingerprint based identification is the oldest and most familiar method. Fingerprints were first recognised as unique in 1684. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by this pattern of ridges and furrows. The fingerprint scanner captures an image of the fingerprint and uses complex algorithms to either convert the image into a unique "map" of minutiae points or analyze the pattern. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation (split) or a ridge ending.This technique reads specific fingerprint 'ridge' characteristics and assigns an (x,y) coordinate. In most countries, a minimum of twelve of these points are legally required for positive identification in a criminal case, a typical biometric fingerprint reader can record in excess of 40 points. Only the data containing the location of the points of minutiae is stored in the template, not the actual fingerprint image. This keeps the file size to a minimum and helps prevent fraud, as a fingerprint cannot be recreated from the stored template. CSS total security based in the UK has created two different fingerprint readers that allow total security to Laptop PC users. The BioTouch PC Card Fingerprint Reader is state of the art technology. It allows only you to log on to your laptop computer. You simply press the fingerprint reader on the side of your laptop, the reader pops out, you press you finger against the reader. The reader then verifies your fingerprint then you simply press it back in. Another product that CSS Total Security has created is the...

Find Another Essay On Research Paper-Biometrics

Biometrics: Are we the key? Essay

3032 words - 12 pages TABLE OF CONTENTSBIOMETRICS 21. INTRODUCTION 21.1. Biometrics Background 21.2. History of Biometrics 21.3. Areas of Research 22. RESEARCH INFORMATION 42.1. Biometric Methods Used 42.2. Areas of Implementation 52.3. Future Advances 62.4. Negative Aspects 72.5. Positive Aspects 73. CONCLUSION 84. REFERENCES 95. BIBLIOGRAPHY 10Websites 10Books 10Other sources 116. APPENDIX 1 12BIOMETRICS1. INTRODUCTION1.1. Biometrics BackgroundBiometrics comes from

Biometrics Security Essay

1400 words - 6 pages Biometrics Security Biometrics uses personal characteristics to identify users. When it comes to security, mapping unique patterns and traits in fingerprints, irises or voices is considered light years ahead of forcing employees to memorize combination of letters and numbers -- which are easily compromised and easily forgotten. The technology works by taking measurements -- whether it is the weight and length of bones in the hand or the

Biometrics in security

1213 words - 5 pages again. One of the most recent and secure ways to protect information is through the use of biometrics: which compares a user’s biometric data against the data stored in the system.5 The biometric system is designed to use the following four modules: 1. Sensor Module. The sensor module captures the biometric data from an individual. 2. Feature Extraction Module. The feature extraction module processes the biometric data to extract a feature set, or

Biometrics and Ethics

1466 words - 6 pages ). I have taken up the research topic Biometrics and Ethics and would like to analyze how Biometric has become part of our everyday life and with it what are the ethical challenges human race faces. Biometrics is the statistical measure of biological beings; it is a system which is used in identifying a person by verifying a physical characteristic or attribute. The reason for its existence is to provide a single computer system login that can

Biometrics: Iris Recognition

1236 words - 5 pages Iris recognition is one of commonly employed biometric for personal recognition. In this paper, Single Value Decomposition (SVD), Principal Component Analysis (PCA), Automatic Feature Extraction (AFE) and Independent Component Analysis (ICA) are employed to extract the iris feature from a pattern named IrisPattern based on the iris image. The IrisPatterns are classified using a Feedforward Backpropagation Neural Network (BPNN) and Support Vector

biometrics and access control

1356 words - 6 pages Software companies are faced with external security threats from hackers and others, along with a variety of even more threatening internal security threats, like corporate spies. This has resulted in companies being more vigilant thus implementing necessary precautions to prevent unauthorized access to the pool of data within the company. These precautions include access management (access control) as well as access technology (biometrics

Biometrics, Security and Wrinkled Fingerprints

861 words - 4 pages . Euclidean distance vector will be the third and the improved fingerprint characterization. CONCLUSION It can be concluded that while considering applications for security, biometrics is one of traditional and effective method for verification purpose. Out of various biometrics, fingerprint is most frequently as well as commonly used. But some pitfalls in fingerprint recognition system are required to be covered. Various fingerprint matching

The Identification Technology of Biometrics

701 words - 3 pages The recent advances of information technologies and the increasing requirements for security proposed have led to a rapid development of automatic personal identification systems based on biometrics. Biometrics refers to identify an individual based on his or her distinctive physiological (e.g., fingerprints, face, retina, iris) or behavioral (e.g., gait, signature) characteristics accurately [1]. It is inherently more reliable and more capable

Cryptographic Key Generation Using Cancellable Biometrics

1649 words - 7 pages 4.1 CRYPTOGRAPHIC KEY GENERATION USING CANCELLABLE BIOMETRICS Using cancellable biometrics we propose an efficient approach for the generation of a cryptographic key from fingerprint biometrics. This approach takes fingerprint as input and extracts the minutiae points from the preprocessed fingerprint image. We obtain the preprocessed fingerprint image by using processes such as histogram equalization and weiner filtering. Subsequently, a

Biometrics Introduction to Information Systems Security

622 words - 2 pages gathering information on people's travel patterns.Biometric devices and applications have been growing worldwide. They are expected to be the way for accessing personal computer systems. According to research it is expected that biometric expenditure will reach $300 million in 2008. Biometrics works on the principle that everyone in the world is different. A variety of factors are taken into consideration when implementing a biometric system. Each

Security and Privacy on SAT´s (IRS) Electronic Signature

2298 words - 9 pages technological and the legal aspects are fusion together, and both have several challenges. Both sides will be covered in this paper and how do they are managed together. Security and privacy have been important research areas in computing for a long time. Data needs to be protected. That is why methods and techniques have been developed to protect it from attacks. Security and privacy considerations have increased dramatically due to open internet

Similar Essays

Biometrics Essay

1515 words - 6 pages biometric technologies are used for security purposes and in what situations they are best suited. Finally, we discussed the future of biometrics in our world. I learned a great deal from this assignment. Before this term paper I had not even heard of biometrics. After I did the research for this paper, I had learned about the main types of biometrics used and how they are used. I also learned what these biometric technologies actually did and how

Evolving Biometrics Essay

2891 words - 12 pages individual with the data in their system. False-match error rates correlate with the scale of a system; the larger the system there will be more error rates (J.L. Wayman.) The future of biometrics I had a broad understanding of biometrics before conducting research for this paper. Biometrics is not just for top secret agencies high tech companies, it can be used in everyday life and in many ways enhance our security systems in many ways

Biometrics Essay

1520 words - 6 pages identified if biometric identification systems are present in public and government places. Finally they could be useful in gathering information on people’s travel patterns. Biometric devices and applications have been growing worldwide. They are expected to be the way for accessing personal computer systems. According to research it is expected that biometric expenditure will reach $300 million in 2008. Biometrics works on the principle that

Biometrics Essay

2735 words - 11 pages behavioral. Biometrics, by definition, is not a new technology. However, the computer industry has advanced it severely. Some of the traits that biometrics can measure with today?s technological advances are Hand, Retina, Iris, Facial, Voice, and Finger scan. This paper will allow you to learn what each biometric device is used for and it?s current implication amongst financial institutions, the business community, chemical industries, automobile