Preview

Multimodal Biometric Authentication System: The Use of More than One Authentication Method

Satisfactory Essays
Open Document
Open Document
553 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multimodal Biometric Authentication System: The Use of More than One Authentication Method
Academic into Business Computing

Student Project Case Study

Student Details:
Name: CHIOMA OKOTCHA
Degree: BSc Computer Networking

Project Details:
Project Name: Multimodal Biometric Authentication System
Client’s Business’s Name: Academic to Business Computing Collaborators:
Supervisor: Vitaly Schetintin
Client Name: Carsten Maple
Student Team Names: Igor P., Yegor U.

Project Brief: Describe the goal of the project. The main aim of the project is to propose the use of more than one authentication method to produce a single authentication system that will be effective and collect biometric data to identify individual persons. The purpose of combining three biometric techniques is to compensate the individual weaknesses of each technique. Explain your involvement in the project The proposal for the biometric authentication system was a team effort. Every team member had a contributing part to the development of the project. I developed the database using Microsoft Excel. Igor had a past knowledge on programming language, so he was able to design a program for feature extraction. Yegor worked on the analysis of the captured data using Mat Lab.

The Solution: Describe the solution produced. The design has two main objectives. The first objective is to increase the level of security when identifying users and to reduce the rate of match and non-match occurrences. The second objective is to integrate the three biometrics and set the threshold that decides a match or a non-match. The design makes use of a finger print scanner, a face scanner and a motion capture suit. Users are enrolled using the three sensors, face scanner, finger print scanners and motion capture. When users are to be identified, a threshold is set for all the biometric devices during testing and training, the database searches for a match based on the three sensors and a decision to accept or reject is

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ch. 2 Quiz

    • 746 Words
    • 6 Pages

    3. A(n) ________ is a hardware-based security control that can identify a person by a retina scan or by mapping a facial pattern.…

    • 746 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Final Paper

    • 2626 Words
    • 8 Pages

    Curt, S., & Fernandez, L. (2012). Aviation Security-biometrics Technology and Risk Based Secuity Aviation Passenger Screening Program.…

    • 2626 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    This is a bit more new invention and not a lot of organisations are using it as it is very expensive security measure. Biometric scanners are used to scan people’s face, fingerprints, iris, hand geometry vein or voice as every single person has it different. The most famous and used identification is through fingerprints as it is easy to check. The scanner will take a picture of one of your fingers and then it will be saved and used in a binary code. Furthermore, the algorithm is assigned to one person so if the same person’s is scanned once more, the system will match it straight with the previous binary code and this is enabling recognition.…

    • 1153 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and which new hairstyles (Allensmith, n.d.).…

    • 325 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This report covers the present scenario and the growth prospects of the Law Enforcement Biometrics market in North America for the period 2014-2018. To calculate the market size, the report considers revenue generated from the sales of biometrics technologies such as fingerprint recognition, facial recognition, signature recognition, iris recognition, voice recognition, palm vein recognition, hand geometry, and keystroke recognition used in the Law Enforcement sector. It also presents the vendor landscape and a corresponding detailed analysis of the top four vendors in the market.…

    • 366 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become possible thanks to the advancements in pattern recognition technology.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    As the foregoing review suggests, the use of biometric technologies poses a host of interrelated policy questions, some of which are of general applicability to all biometric systems and others of which are technology- or use-specific. Among the questions one might ask are: Can the biometric system be narrowly tailored to its task? Who will oversee the program? What alternatives are there to biometric technologies? What information will be stored and in what form? To what facility/location will the biometric give…

    • 668 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Marketing

    • 409 Words
    • 2 Pages

    With the growing concern of online theft and security leaks, Biometric systems could be just the concept to fill the uncertainty knowledge gap. Online companies have been for long trying to narrow this uncertainty gap for online consumers by applying several tracking methods during web site visits, including the use of smart cards, tokens, credit cards and digital certificates, to provide the means to correlate a consumer with an online system. But all suffer from uncertainties and lack of reliability in achieving accurate identification. For example, because a biometric sensor will never capture the exact same data twice, the matching of biometric features requires additional fuzzy logic comparison. This requirement will help in acquiring accurate data on market research. The companies with the help of this data will be in a better position to align its IT and…

    • 409 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Biometric is a tool used to identify and reliably confirm an individual’s identity on the basis of physiological or behavioral characteristic (combination of both) which are unique for a specific human being. Biometric technology has been around for so many years and the technology has being used as the latest weapon to fight against crime. The scope of this paper is reflecting on biometric in terms of ethical and privacy issues. There are a number of ethical issues centering on biometric concerning privacy rights of individuals. Examples of biometric technology are fingerprints, facial recognition, DNA, palm print recognition, hand geometry, iris recognition, odor recognition and etc. These devices are being used more and more around the world each day. Some examples are: places like airports, Walt Disney, office buildings, banks, military, government facilities and the list goes on and on as we rely on this technology to help identify us for our security. This technology has been used in many ways to protect our personal identity. In fact biometric is tightly linked to an individual and it is difficult to duplicate a biometric trait, it can prevent identity theft and rule out the use of several identities by a single individual, however one concern is about the stored biometric data.…

    • 1023 Words
    • 5 Pages
    Better Essays