Preview

The Biometric System

Powerful Essays
Open Document
Open Document
5133 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Biometric System
Biometrics System
The use of special input devices to analyze some physical parameter assumed to be unique to an individual, in order to confirm their identity as part of an authentication procedure.
Examples include fingerprint scanning, iris recognition, facial recognition, voice recognition (speaker recognition), signature, vascular pattern recognition.
(http://www.findbiometrics.com/Pages/guide2.html).
1-Introduction to Biometrics and Biometrics Security System
A brief background of biometric and biometric security systems will provide a greater understanding of the concept of network security. Biometrics is defined as the unique (personal) physical/logical characteristics or traits of human body [Jain, 2004]. These characteristics and traits are used to identify each human. Any details of the human body which differs from one human to other will be used as unique biometric data to serve as that person 's unique identification (ID), such as: retinal, iris, fingerprint, palm print and DNA. Biometric systems will collect and store this data in order to use it for verifying personal identity. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometrics is the key to open that lock [Jain, 2006].

There are seven basic criteria for biometric security system:



References: [Jain, 2006]Jain, A.K.; Ross, A.; Pankanti, S., "Biometrics: a tool for information security" Volume: 1 Issue: 2, Issue Date: June 2006, page(s): 125 - 143 [Maestre, 2009] Sandra Maestre, Sean Nichols "DNA Biometrics", 2009 [Reid, 2011] Paul Reid, "Biometrics for network security", Pearson Education Inc., 2004, ISBN 0131015494 [Schuckers, 2001] Michael E [Mosdorf, 2006] Khalid Saeed-Jerzy Pejas-Romuald Mosdorf, "Biometrics, Computer Security, Systems and Artificial Intelligent Applications", S pringer-Verlag Berlin Heidelberg 2006, ISBN 0387362320 [Woodward, 2001]John D [Wikipedia - data metrics] http://en.wikipedia.org/wiki/Data_Matrix [PBworks 2006] PBworks, "Advantages and Disadvantages of technologies", 2006 http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies [Arc Aspicio, 2009] Arc Aspicio "DNA: The last biometric" 2009 http://www.arcaspicio.com/insights/2009/3/19/dna-the-last-biometric.html [Lazaroff, 2004] Mr Last Modified on: November 28, 2011 This and other papers on latest advances in network security are available on line at http://www.cse.wustl.edu/~jain/cse571-11/index.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric element, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    This system alone has improved the speed and exactness of the very popular 10 point process of prints. A fingerprint sent by graphic conduction from a crime scene to another place within a state can be processed instantly. This then allows officials to issue all point bulletins with in ample time of a crime being committed. This kind of technology opens up communication with the population to catch a criminal fast and proficiently.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristics code, the computer grants access. Example of biometric devices include fingerprint readers and face recognition systems.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.…

    • 325 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their identity. It is the latest weapon in the fight against computer crime and identity theft. These technologies work with the help of sampling distinctive biological features, such as tracing patterns of blood vessels in the retina, voice recognition or fingerprinting. Later biological features are extracted and then converted into mathematical codes which are then stored as a biometric template. In order to confirm the identity of the user, they will be required to interact with the system scanner which will process the users identitywith the help of an iris or fingerprint scan. This sample is then compared with the template for a positive match and therefore, access is either granted or denied accordingly.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    What exactly is Biometric Identification? "The term "biometrics" refers strictly speaking to a science involving the statistical analysis of the biological characteristics." (Huopio, 1998) In this case,…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Biometrics is where facial recognition can categorized. According to the Criminal Investigation text book, biometrics is: "the statistical study of biological data and means to positively identify an individual by measuring the person 's unique physical or behavioral characteristics"…

    • 2694 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become possible thanks to the advancements in pattern recognition technology.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Biometric is a tool used to identify and reliably confirm an individual’s identity on the basis of physiological or behavioral characteristic (combination of both) which are unique for a specific human being. Biometric technology has been around for so many years and the technology has being used as the latest weapon to fight against crime. The scope of this paper is reflecting on biometric in terms of ethical and privacy issues. There are a number of ethical issues centering on biometric concerning privacy rights of individuals. Examples of biometric technology are fingerprints, facial recognition, DNA, palm print recognition, hand geometry, iris recognition, odor recognition and etc. These devices are being used more and more around the world each day. Some examples are: places like airports, Walt Disney, office buildings, banks, military, government facilities and the list goes on and on as we rely on this technology to help identify us for our security. This technology has been used in many ways to protect our personal identity. In fact biometric is tightly linked to an individual and it is difficult to duplicate a biometric trait, it can prevent identity theft and rule out the use of several identities by a single individual, however one concern is about the stored biometric data.…

    • 1023 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Answer: Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. Biometric authentication provides strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive. Biometric authentication is in the early stages of adoption. Because of its strength, it likely will see increased usage in the future. It is also likely that legislators will pass laws governing the use, storage, and protection requirements for biometric data.…

    • 4641 Words
    • 19 Pages
    Powerful Essays
  • Best Essays

    Biometrics is a science. It is a science that measures individuals¡¦ physical characteristic properties that are unique. With world changing of every second of everyday; human beings is still the cause of security breaching. On just about every website you need a password or pin number. Passwords and ID cards have been used to control access to restricted systems. However, security can be easily breached in these systems when a password is disclosed to an unauthorized user or a card is stolen by an impostor. We as humans forget password and pin numbers because we have so much to protect and access. Furthermore, simple passwords are easy to guess and difficult passwords may be hard to remember. The coming out of biometrics has addressed the problems that occur in traditional verification methods. Biometrics in this case would be best. With biometrics it¡¦s uniqueness of physical characteristics can never be lost, stolen, shared or forgotten.…

    • 2060 Words
    • 9 Pages
    Best Essays

Related Topics