Hgkjhkj

Only available on StudyMode
  • Topic: Biometrics, Iris recognition, Speaker recognition
  • Pages : 1 (325 words )
  • Download(s) : 69
  • Published : November 8, 2012
Open Document
Text Preview
When referring to computers and security, biometrics is the identification of a person by the measurement of their biological features. For example, a user identifying themselves to a computer or building by their finger print or voice is considered a biometrics identification. When compared to a password, this type of system is much more difficult to fake since it is unique to the person. Below is a listing of all known biometric devices.

Other common methods of a biometrics scan are a person's face, hand, iris, and retina.

Types of biometric devices

Face scanner - Biometric face scanners identify a person by taking measurements of a person face. For example, the distance between the persons chin, eyes, nose, and mouth. These types of scanners can be very secure assuming they are smart enough to distinguish between a picture of a person and a real person. Hand scanner - Like your finger print, the palm of your hand is also unique to you. A biometric hand scanner will identify the person by the palm of their hand. Finger scanner - Like the picture shown on this page a biometric finger scanner identifies the person by their finger print. These can be a secure method of identifying a person, however, cheap and less sophisticated finger print scanners can be duped a number of ways. For example, in the show Myth Busters they were able to fake a finger print using a Gummy Bear candy treat. Retina or iris scanner - A biometric retina or iris scanner identifies a person by scanning the iris or retina of their eyes. These scanners are more secure biometric authentication schemes when compared to the other devices because there is no known way to duplicate the retina or iris. Voice scanner - Finally, a voice analysis scanner will mathematically break down a person's voice to identify them. These scanners can help improve security but with some less sophisticated scanners can be bypassed using a tape recording.
tracking img