Preview

Nt1330 Unit 1 Assignment

Powerful Essays
Open Document
Open Document
4577 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 1 Assignment
Acknowledgement

The satisfaction and euphoria that accompany the successful completion of any task would be incomplete without the people who made it possible, whose constant guidance and encouragement crowned our efforts with success.
My primary thanks goes to Almighty Allah by whose Blessing I have completed my report in the given time. I would like to thank Prof. Zain Ul Abideen Valika for his patience, guidance and encouragement in successful completion of this report .
Finally, I would like to immensely thank my parents and all my friends for their constant support and encouragement which was the fuel propelling my effort.

Abstract

In this Hi-Tech era, there is a great demand to identify and authenticate the individuals. Till now we are totally dependent upon Passwords and Pin Numbers for identification. How secure are passwords? With the numerous passwords that an individual has to remember, they are often forgotten,
…show more content…
When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 1 Assignment

    • 908 Words
    • 4 Pages

    The first assignment I have chosen to do my reflection on is the module three newspaper article assignment. I chose this assignment because this module really got me thinking about the type of media we absorb based on external influences. Since the lead comes first in the inverted pyramid format, the reader does not have to take a long time to read the story in order to get a good understanding of what the story is about. Therefore, many would choose to read a newspaper story when they do not have a lot of time on their hands. I enjoyed doing this assignment as I like the concept of taking an iconic fictional story and converting it into a format that makes it appear as if it were non-fictional. It made the creation process entertaining and…

    • 908 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristics code, the computer grants access. Example of biometric devices include fingerprint readers and face recognition systems.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Home and business users alike are using biometric security. Through a biometric identifier, such as a fingerprint, biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 325 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become possible thanks to the advancements in pattern recognition technology.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Biometric Security

    • 3358 Words
    • 14 Pages

    Biometric identification technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of the equipment is going down dramatically due to the integration and increasing processing power. Certain applications of biometric identification technology are now cost-effective, reliable and highly accurate. As a result, there is no technological or financial barriers for stepping from the pilot projects to widespread deployment. This paper introduces the biometric technologies and the problematics incorporated.…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Biometrics

    • 1352 Words
    • 6 Pages

    Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.…

    • 1352 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Information security has always been a topic of concern to most organizations’ around world as an emphasis on new techniques to secure the identity of a legitimate user is regarded as top priority. In addressing such an issue, organizations have used traditional ways of authentication factors “what you have” and “what you know” in the form of smart cards and passwords respectively. But biometrics is based on the factor “who are you” by analyzing human physical or behavioral characteristics. Biometric technology offers advanced verification for humans, identifying them through physical measurements of unique human characteristics such as fingerprints, iris scan, facial recognition etc.…

    • 790 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face fingerprints, hand geometry, handwriting, iris, retinal, vein, voice etc. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions . As the level of security breaches and transaction…

    • 3960 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    The fingerprint-based biometric security system on personal laptop computer is more accessible, secured, accountable and accurate. It is in the registered fingerprint where an account is created for hassle-free admission to the system. Furthermore, transactions do not consume much time and effort since the information needed to connect and to access one’s account is already automated.…

    • 273 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    There are a multitude of biometric techniques either widely used or under investigation. These include, facial imaging, hand and finger geometry, eye based methods, signature, voice, vein geometry, keystroke, finger- and palm-print imaging and DNA. The strength of DNA as a biometric identification tool lies primarily in the uniqueness of the DNA sequence. DNA, as a tool for identity verification and management, is considered to be very strong.…

    • 1900 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Embedded System

    • 2930 Words
    • 12 Pages

    In this paper we have used the biometrics (finger print recognition) for security purpose and embedded system to automate the complete process. There many methods in providing security using biometrics we have gone for the finger print recognition. In embedded system we have gone for PIC micro controller (PIC16F877).…

    • 2930 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Industrial Report

    • 1452 Words
    • 8 Pages

    However, I’m still looking for variety of sources and the results is this report can be prepared by the hard work and the help from colleagues. I am here to express my gratitude to Mrs. Yus Aznita binti Ustadi for being helpful in providing guidance and tutoring me to write this report.…

    • 1452 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    report

    • 950 Words
    • 4 Pages

    Finally, I express my intense gratitude to my parents and God mighty whose blessings had helped me to translate my efforts into fruitful achievement.…

    • 950 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Apartment - title

    • 10765 Words
    • 44 Pages

    According to Harbron (1988), one way of attaining security of a certain area is by means of biometrics. Jain et. al. (1999) identified that biometric system can operate verification and identification mode. It is very important to make our place secured in many aspects to prevent from encroachment issues.…

    • 10765 Words
    • 44 Pages
    Powerful Essays
  • Satisfactory Essays

    * Many institutions and companies are using advanced technologies for their business and reliability of data. Security and data confidentiality is also there. They are using such Biometrics to prevent errors and handling complex situations.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays