The use of special input devices to analyze some physical parameter assumed to be unique to an individual, in order to confirm their identity as part of an authentication procedure.
Examples include fingerprint scanning, iris recognition, facial recognition, voice recognition (speaker recognition), signature, vascular pattern recognition.
1-Introduction to Biometrics and Biometrics Security System
A brief background of biometric and biometric security systems will provide a greater understanding of the concept of network security. Biometrics is defined as the unique (personal) physical/logical characteristics or traits of human body [Jain, 2004]. These characteristics and traits are used to identify each human. Any details of the human body which differs from one human to other will be used as unique biometric data to serve as that person 's unique identification (ID), such as: retinal, iris, fingerprint, palm print and DNA. Biometric systems will collect and store this data in order to use it for verifying personal identity. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometrics is the key to open that lock [Jain, 2006].
There are seven basic criteria for biometric security system:
References: [Jain, 2006]Jain, A.K.; Ross, A.; Pankanti, S., "Biometrics: a tool for information security" Volume: 1 Issue: 2, Issue Date: June 2006, page(s): 125 - 143 [Maestre, 2009] Sandra Maestre, Sean Nichols "DNA Biometrics", 2009 [Reid, 2011] Paul Reid, "Biometrics for network security", Pearson Education Inc., 2004, ISBN 0131015494 [Schuckers, 2001] Michael E [Mosdorf, 2006] Khalid Saeed-Jerzy Pejas-Romuald Mosdorf, "Biometrics, Computer Security, Systems and Artificial Intelligent Applications", S pringer-Verlag Berlin Heidelberg 2006, ISBN 0387362320 [Woodward, 2001]John D [Wikipedia - data metrics] http://en.wikipedia.org/wiki/Data_Matrix [PBworks 2006] PBworks, "Advantages and Disadvantages of technologies", 2006 http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies [Arc Aspicio, 2009] Arc Aspicio "DNA: The last biometric" 2009 http://www.arcaspicio.com/insights/2009/3/19/dna-the-last-biometric.html [Lazaroff, 2004] Mr Last Modified on: November 28, 2011 This and other papers on latest advances in network security are available on line at http://www.cse.wustl.edu/~jain/cse571-11/index.html