Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.
By definition, “biometrics” (Woodward, Orlans, and Higgins, 2003) is the science of using biological properties to identify individuals; for example, fingerprints, retina scans, and voice recognition. We’ve all seen in the movies, how the heroes and the villains have used other’s fingerprints and voice patterns to get into the super, secret vault. While these ideas were fantasy many years ago, today biometrics are being used and you may not even know it.
By combining the Greek words “bio”, which stands for “life”, and “metrics”, which stands for “measure”, you produce the term “biometrics” or “life measurements”. To understand biometrics at the most basic level, all one has to do is to picture a loved one in their mind. A human can specifically recognize another human by remembering an eye color, a hair color, a nose shape, a wart, or any combination of facial features. While the human mind is capable of remembering the physical characteristics of several humans, it is impossible to retain, reference, and sort thousands of biometric data which may contain details down to the molecular level. Today, this has been made easier by computer technology.
The first recorded use of biometrics dates back to the 14th century when the Spanish explorer Joao de Barros witnessed Chinese parents pressing their children’s inked fingers and feet onto paper allowing them to differentiate one child from another. Through Barros’ travels, he noted that Chinese businessmen also closed various financial and business transactions with
Bibliography: Nanavati, S., & Thieme, M., & Nanavati, R. (2002) Biometrics: Identity Verification in a Networked World. New York: Wiley. Fascinating. These authors look at the most highly used biometric identification systems, provide pros and cons, and reference the successes or failures of these systems in real implementations. One thing to note is the authors did not push biometric identification systems to immediately replace current security protocols, but rather to work with and eventually replace them. Vacca, J. R. (2007) Biometric Technologies and Verification Systems. New York: Butterworth-Heinemann. This book goes into depth on the collection and review of biometric data. Vacca discusses the advantages and disadvantages of using intrinsic biometric data over the currently accept security protocols. In addition, discussions are held regarding the development, implementation, maintenance, and ethics of the a biometric security system. Woodward, J. D., & Orlans, N. M., & Higgins, P.T. (2003) Biometrics. New York: McGraw-Hill/Osborne. A very good, informative reference book. The main emphasis was not directed at the history and ethics but more towards the technical aspects of biometrics. Implementation strategies in addition to cost options were the most beneficial aspects of this book.